Line

Malek Ben Salem, PhD, PMP®, CISSP®

Icon Publications
  • Malek Ben Salem and C. Wacek. "Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology". In Proceedings of the 10th Conference on Semantic Technologies for Intelligence, Defense and Security, November 2015. .[PDF]
  • Malek Ben Salem, Jonathan Voris and Salvatore J. Stolfo. "Decoy Applications for Continuous Authentication on Mobile Devices-Extended Abstract". In the Proceedings of the 2014 IEEE Who Are You? (WAY) Workshop, Menlo Park, California, July 2014.
  • Yingbo Song, Malek Ben Salem, Shlomo Hershkop and Salvatore J. Stolfo. "System-level User Behavior Biometrics Using Fisher Features and Gaussian Mixture Models". In the Proceedings of the 2013 IEEE S&P Workshop on Research for Insider Threat, WRIT 2013, San Francisco, California, May 2013.
  • Salvatore J. Stolfo, Malek Ben Salem, and Angelos D. Keromytis. "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud – Position Paper". In the Proceedings of the 2012 IEEE S&P Workshop on Research for Insider Threat, WRIT 2012, San Francisco, California, May 2012.
  • Malek Ben Salem. "Security Challenges and Requirements for Industrial Control Systems in the Semiconductor Manufacturing Sector – Extended Abstract". In the Proceedings of the 2012 NIST Workshop on Cyber Physical Systems, Gaithersburg, Maryland, April 2012.
  • Malek Ben Salem and Salvatore J. Stolfo. "Combining Baiting and User Search Profiling Techniques for Masquerade Detection". Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications. Vol. 3 No. 1, March 2012.
  • Malek Ben Salem and Salvatore J. Stolfo. "Modeling User Search Behavior for Masquerade Detection". Proceedings of the Fourteenth Symposium on Recent Advances in Intrusion Detection, RAID 2011, Pages 181-200, Menlo Park, California, September 2011.[PDF]
  • Malek Ben Salem and Salvatore J. Stolfo. "On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned". Proceedings of the Fourth Workshop on Cyber Security Experimentation and Test, CSET’11, San Francisco, California, August 2011.[PDF]
  • Malek Ben Salem and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection". Proceedings of the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2011, Pages 35-54, Amsterdam, The Netherlands, July 2011. [PDF]
  • Malek Ben Salem and Salvatore J. Stolfo. "A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques for Masquerade Detection". Security and Communications Networks Journal, To Appear in Vol. 4, 2011, Wiley InterScience.
  • Malek Ben Salem and Salvatore J. Stolfo. "Modeling User Search-Behavior for Masquerade Detection", In 'The Innovator', Special Issue on "Understanding Human Behavior and Its Impact on Fraud, Security, Risk Management, economics/Finance and Interface Design", BITS Publications by the Financial Services Roundtable, Vol. 4, Issue 1, Feb. 2011.
  • Malek Ben Salem and Salvatore J. Stolfo. "Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques". Proceedings of the Second International Workshop on Managing Insider Security Threats, MIST'10, Morioka, Iwate, Japan. June 2010.
  • Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo.. "Designing host and network sensors to mitigate the insider threat". IEEE Security and Privacy, September 2009.
  • Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo. "A Survey of Insider Attack Detection Research" in Insider Attack and Cyber Security: Beyond the Hacker, Springer, 2008.
  • Taxonomy-Based Multinomial Modeling Approach in Unix Systems". Columbia University Computer Science Department, Technical Report # cucs-021-08, 2008.