Sal Stolfo

2.9k total citations · 1 hit paper
16 papers, 1.4k citations indexed

About

Sal Stolfo is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Sal Stolfo has authored 16 papers receiving a total of 1.4k indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Information Systems, 8 papers in Computer Networks and Communications and 7 papers in Artificial Intelligence. Recurrent topics in Sal Stolfo's work include Network Security and Intrusion Detection (8 papers), Information and Cyber Security (5 papers) and Spam and Phishing Detection (3 papers). Sal Stolfo is often cited by papers focused on Network Security and Intrusion Detection (8 papers), Information and Cyber Security (5 papers) and Spam and Phishing Detection (3 papers). Sal Stolfo collaborates with scholars based in United States, Netherlands and United Kingdom. Sal Stolfo's co-authors include Eleazar Eskin, Philip K. Chan, Wei Fan, Andreas L. Prodromidis, Matthew L. Miller, Wenke Lee, Wei Fan, David Evans, Ang Cui and Steven M. Bellovin and has published in prestigious journals such as Knowledge and Information Systems, IEEE Security & Privacy and IEEE Intelligent Systems and their Applications.

In The Last Decade

Sal Stolfo

16 papers receiving 1.2k citations

Hit Papers

Data mining methods for detection of new malicious execut... 2002 2026 2010 2018 2002 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sal Stolfo United States 10 862 764 757 547 108 16 1.4k
Natalia Stakhanova Canada 17 902 1.0× 647 0.8× 655 0.9× 449 0.8× 70 0.6× 54 1.2k
M. Abadi United States 21 1.5k 1.8× 1.8k 2.3× 226 0.3× 1.3k 2.3× 67 0.6× 51 2.6k
Marc Daciér France 20 1.7k 1.9× 1.1k 1.4× 914 1.2× 664 1.2× 73 0.7× 57 2.0k
Ulf Lindqvist United States 15 784 0.9× 430 0.6× 437 0.6× 372 0.7× 29 0.3× 55 1.1k
Boon Thau Loo United States 28 2.9k 3.3× 756 1.0× 268 0.4× 1.2k 2.2× 89 0.8× 185 3.3k
Adam Bates United States 25 1.1k 1.3× 744 1.0× 933 1.2× 877 1.6× 73 0.7× 64 1.9k
Frédéric Cuppens France 18 929 1.1× 724 0.9× 457 0.6× 543 1.0× 39 0.4× 92 1.4k
Hervé Debar France 20 1.7k 2.0× 1.1k 1.4× 955 1.3× 610 1.1× 54 0.5× 52 2.0k
Lynn Batten Australia 17 676 0.8× 369 0.5× 635 0.8× 462 0.8× 128 1.2× 92 1.2k
Bradley Reaves United States 19 574 0.7× 392 0.5× 536 0.7× 482 0.9× 125 1.2× 46 1.1k

Countries citing papers authored by Sal Stolfo

Since Specialization
Citations

This map shows the geographic impact of Sal Stolfo's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sal Stolfo with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sal Stolfo more than expected).

Fields of papers citing papers by Sal Stolfo

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sal Stolfo. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sal Stolfo. The network helps show where Sal Stolfo may publish in the future.

Co-authorship network of co-authors of Sal Stolfo

This figure shows the co-authorship network connecting the top 25 collaborators of Sal Stolfo. A scholar is included among the top collaborators of Sal Stolfo based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sal Stolfo. Sal Stolfo is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Yang, Junfeng, Ang Cui, Sal Stolfo, & Simha Sethumadhavan. (2012). Concurrency attacks. 15–15. 32 indexed citations
2.
Pfleeger, Shari Lawrence, Marc Rogers, Masooda Bashir, et al.. (2012). Does Profiling Make Us More Secure?. IEEE Security & Privacy. 10(4). 10–15. 2 indexed citations
3.
Stolfo, Sal, Steven M. Bellovin, & David Evans. (2011). Measuring Security. IEEE Security & Privacy. 9(3). 60–65. 36 indexed citations
4.
Evans, David & Sal Stolfo. (2011). Guest Editors' Introduction: The Science of Security. IEEE Security & Privacy. 9(3). 16–17. 13 indexed citations
5.
Cui, Ang, et al.. (2010). Ethics in security vulnerability research. IEEE Security & Privacy. 8(2). 67–72. 14 indexed citations
6.
Camp, Jean, Lorrie Faith Cranor, Nick Feamster, et al.. (2009). Data for Cybersecurity Research: Process and ‘Wish List’. 5 indexed citations
7.
Stolfo, Sal, et al.. (2004). EMT/MET: systems for modeling and detecting errant email. 2. 290–295. 5 indexed citations
8.
Stolfo, Sal. (2004). Worm and attack early warning: piercing stealthy reconnaissance. IEEE Security & Privacy. 2(3). 73–75. 15 indexed citations
9.
Fan, Wei, Matthew L. Miller, Sal Stolfo, Wenke Lee, & Philip K. Chan. (2004). Using artificial anomalies to detect unknown and known network intrusions. Knowledge and Information Systems. 6(5). 507–527. 147 indexed citations
10.
Keromytis, Angelos D., Janak J. Parekh, Gail E. Kaiser, et al.. (2003). A holistic approach to service survivability. Columbia Academic Commons (Columbia University). 11–22. 23 indexed citations
11.
Fan, Wei, Haixun Wang, Philip S. Yu, & Sal Stolfo. (2002). A Framework for Scalable Cost-sensitive Learning Based on Combining Probabilities and Benefits. 437–453. 2 indexed citations
12.
Eskin, Eleazar, et al.. (2002). Data mining methods for detection of new malicious executables. Columbia Academic Commons (Columbia University). 38–49. 709 indexed citations breakdown →
13.
Fan, Wei, Matthew L. Miller, Sal Stolfo, Wenke Lee, & Philip K. Chan. (2002). Using artificial anomalies to detect unknown and known network intrusions. 123–130. 33 indexed citations
14.
Maguire, Gerald Q., et al.. (2002). The constraint-based paradigm: integrating object-oriented and rule-based programming. ii. 358–366. 1 indexed citations
15.
Ramakrishnan, Raghu, et al.. (2000). Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining. Knowledge Discovery and Data Mining. 8 indexed citations
16.
Chan, Philip K., Wei Fan, Andreas L. Prodromidis, & Sal Stolfo. (1999). Distributed data mining in credit card fraud detection. IEEE Intelligent Systems and their Applications. 14(6). 67–74. 338 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026