Volgen
Gabriela (Cretu) Ciocarlie
Gabriela (Cretu) Ciocarlie
Associate Professor at The University of Texas at San Antonio
Geverifieerd e-mailadres voor cs.columbia.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Anomalous payload-based worm detection and signature generation
K Wang, G Cretu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 227-246, 2005
4072005
Casting out demons: Sanitizing training data for anomaly sensors
GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis
2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008
2362008
Detecting anomalies in cellular networks using an ensemble method
GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck
Proceedings of the 9th international conference on network and service …, 2013
772013
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
712018
Communication pattern monitoring: Improving the utility of anomaly detection for industrial control systems
MK Yoon, GF Ciocarlie
NDSS workshop on security of emerging networking technologies, 2014
642014
Methods, systems and media for software self-healing
ME Locasto, AD Keromytis, SJ Stolfo, A Stavrou, G Cretu, S Sidiroglou, ...
US Patent 7,962,798, 2011
642011
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
462018
Hunting for problems with Artemis
GF Creţu-Ciocârlie, M Budiu, M Goldszmidt
Proceedings of the First USENIX Conference on Analysis of system logs, 39-2008, 2008
462008
Methods, media, and systems for securing communications between a first node and a second node
SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ...
US Patent 9,419,981, 2016
452016
Method and apparatus for detecting vulnerabilities and bugs in software applications
VC Sreedhar, GF Cretu, JT Dolby
US Patent App. 11/668,889, 2008
362008
From STEM to SEAD: Speculative execution for automated defense
ME Locasto, A Stavrou, GF Cretu, AD Keromytis
362007
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
352017
Anomaly detection and diagnosis for automatic radio network verification
GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ...
International Conference on Mobile Networks and Management, 163-176, 2014
342014
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
332014
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
G Cretu, A Stavrou, SJ Stolfo, AD Keromytis, ME Locasto
US Patent 8,407,160, 2013
332013
Blockcis—a blockchain-based cyber insurance system
T Lepoint, G Ciocarlie, K Eldefrawy
2018 IEEE International Conference on Cloud Engineering (IC2E), 378-384, 2018
312018
Systems, methods, and media for recovering an application from a fault or attack
ME Locasto, AD Keromytis, A Stavrou, GF Ciocarlie
US Patent 8,924,782, 2014
292014
Intrusion and anomaly detection model exchange for mobile ad-hoc networks
GF Cretu, JJ Parekh, K Wang, S Stolfo
292006
Data sanitization: Improving the forensic utility of anomaly detection systems
GF Cretu, A Stavrou, S Stolfo, AD Keromytis
222007
Building hardened Internet-of-Things clients with language-theoretic security
P Anantharaman, M Locasto, GF Ciocarlie, U Lindqvist
2017 IEEE Security and Privacy Workshops (SPW), 120-126, 2017
202017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20