关注
Gabriela (Cretu) Ciocarlie
Gabriela (Cretu) Ciocarlie
Associate Professor at The University of Texas at San Antonio
在 cs.columbia.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Anomalous payload-based worm detection and signature generation
K Wang, G Cretu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 227-246, 2005
4142005
Casting out demons: Sanitizing training data for anomaly sensors
GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis
2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008
2922008
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
1212018
Detecting anomalies in cellular networks using an ensemble method
GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck
Proceedings of the 9th international conference on network and service …, 2013
922013
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
842018
Communication pattern monitoring: Improving the utility of anomaly detection for industrial control systems
MK Yoon, GF Ciocarlie
NDSS workshop on security of emerging networking technologies, 2014
802014
Methods, systems and media for software self-healing
ME Locasto, AD Keromytis, SJ Stolfo, A Stavrou, G Cretu, S Sidiroglou, ...
US Patent 7,962,798, 2011
682011
Methods, media, and systems for securing communications between a first node and a second node
SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ...
US Patent 9,419,981, 2016
512016
Hunting for problems with Artemis
GF Creţu-Ciocârlie, M Budiu, M Goldszmidt
Proceedings of the First USENIX Conference on Analysis of system logs, 39-2008, 2008
482008
Blockcis—a blockchain-based cyber insurance system
T Lepoint, G Ciocarlie, K Eldefrawy
2018 IEEE International Conference on Cloud Engineering (IC2E), 378-384, 2018
442018
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
432017
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
G Cretu, A Stavrou, SJ Stolfo, AD Keromytis, ME Locasto
US Patent 8,407,160, 2013
402013
ct-fuzz: Fuzzing for Timing Leaks
S He, M Emmi, G Ciocarlie
2020 IEEE 13th International Conference on Software Testing, Validation and …, 2020
382020
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
382014
Anomaly detection and diagnosis for automatic radio network verification
GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ...
Mobile Networks and Management: 6th International Conference, MONAMI 2014 …, 2015
372015
Method and apparatus for detecting vulnerabilities and bugs in software applications
VC Sreedhar, GF Cretu, JT Dolby
US Patent App. 11/668,889, 2008
362008
From STEM to SEAD: Speculative execution for automated defense
ME Locasto, A Stavrou, GF Cretu, AD Keromytis
362007
Trace: Enterprise-wide provenance tracking for real-time apt detection
H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ...
IEEE Transactions on Information Forensics and Security 16, 4363-4376, 2021
342021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ...
NDSS, 2021
332021
Systems, methods, and media for recovering an application from a fault or attack
ME Locasto, AD Keromytis, A Stavrou, GF Ciocarlie
US Patent 8,924,782, 2014
322014
系统目前无法执行此操作,请稍后再试。
文章 1–20