Intrusion response systems: a survey B Foo, MW Glause, GM Howard, YS Wu, S Bagchi, EH Spafford Information assurance: dependability and security in networked systems, 377-412, 2008 | 87* | 2008 |
Determining placement of intrusion detectors for a distributed application through bayesian network modeling G Modelo-Howard, S Bagchi, G Lebanon Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 64 | 2008 |
Botnet Protocol Inference in the Presence of Encrypted Traffic L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha IEEE International Conference on Computer Communications, 2017 | 31 | 2017 |
MAGMA network behavior classifier for malware traffic E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ... Computer Networks 109, 142-156, 2016 | 25 | 2016 |
Systems and methods for reverse-engineering malware protocols RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha US Patent 10,050,982, 2018 | 22 | 2018 |
pSigene: Webcrawling to generalize SQL injection signatures GM Howard, CN Gutierrez, FA Arshad, S Bagchi, Y Qi 2014 44th annual IEEE/IFIP international conference on dependable systems …, 2014 | 22 | 2014 |
Demystifying DDoS as a Service A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna IEEE Communications Magazine 55 (7), 14-21, 2017 | 17 | 2017 |
Fault tolerant arima-based aggregation of data in sensor networks D Herbert, G Modelo-Howard, C Perez-Toro, S Bagchi IEEE International Conference on Dependable Systems and Networks, 1758-1761, 2007 | 13 | 2007 |
Hunting for insider threats using LSTM-based anomaly detection M Villarreal-Vasquez, GM Howard, S Dube, B Bhargava IEEE Transactions on Dependable and Secure Computing, 2021 | 12 | 2021 |
Application-level DDoS detection using service profiling A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna US Patent 9,521,162, 2016 | 12 | 2016 |
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems G Modelo-Howard, J Sweval, S Bagchi 7th ICST Conference on Security and Privacy for Communication Networks …, 2011 | 8 | 2011 |
The Search for Efficiency in Automated Intrusion Response for Distributed Applications YS Wu, G Modelo-Howard, B Foo, S Bagchi, EH Spafford 2008 Symposium on Reliable Distributed Systems, 53-62, 2008 | 8 | 2008 |
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network FA Arshad, G Modelo-Howard, S Bagchi 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-6, 2012 | 7 | 2012 |
IEEE INFOCOM 2017-IEEE Conference on Computer Communications L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha IEEE, 2017 | 6 | 2017 |
Network connectivity graph for malicious traffic dissection E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ... 2015 24th International Conference on Computer Communication and Networks …, 2015 | 4 | 2015 |
Macroscopic view of malware in home networks A Finamore, S Saha, G Modelo-Howard, SJ Lee, E Bocchi, L Grimaudo, ... 2015 12th annual IEEE consumer communications and networking conference …, 2015 | 4 | 2015 |
Approximation algorithms for determining placement of intrusion detectors G Modelo-Howard, S Bagchi, G Lebanon CERIASTech. Report 1, 2011, 2011 | 3 | 2011 |
The Search for Optimality in Online Intrusion Response for a Distributed E-Commerce System YS Wu, G Howard, M Glause, B Foo, S Bagchi, E Spafford Technical Report CERIAS TR, 2007-94, 2007 | 3 | 2007 |
Kali: Scalable encryption fingerprinting in dynamic malware traces L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha 2017 12th International Conference on Malicious and Unwanted Software …, 2017 | 2 | 2017 |
CERIAS Tech Report 2013-6 Secure Configuration of Intrusion Detection Sensors for Dynamic Enterprise-Class Distributed Systems G Modelo-Howard | 1* | 2013 |