Folgen
Gaspar Modelo-Howard
Gaspar Modelo-Howard
Data Scientist (Security), Palo Alto Networks
Bestätigte E-Mail-Adresse bei acm.org
Titel
Zitiert von
Zitiert von
Jahr
Intrusion response systems: a survey
B Foo, MW Glause, GM Howard, YS Wu, S Bagchi, EH Spafford
Information assurance: dependability and security in networked systems, 377-412, 2008
88*2008
Determining placement of intrusion detectors for a distributed application through bayesian network modeling
G Modelo-Howard, S Bagchi, G Lebanon
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
662008
Botnet Protocol Inference in the Presence of Encrypted Traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE International Conference on Computer Communications, 2017
352017
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
262016
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
222018
pSigene: Webcrawling to generalize SQL injection signatures
GM Howard, CN Gutierrez, FA Arshad, S Bagchi, Y Qi
2014 44th annual IEEE/IFIP international conference on dependable systems …, 2014
222014
Hunting for insider threats using LSTM-based anomaly detection
M Villarreal-Vasquez, GM Howard, S Dube, B Bhargava
IEEE Transactions on Dependable and Secure Computing, 2021
172021
Demystifying DDoS as a Service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
172017
Fault tolerant arima-based aggregation of data in sensor networks
D Herbert, G Modelo-Howard, C Perez-Toro, S Bagchi
IEEE International Conference on Dependable Systems and Networks, 1758-1761, 2007
132007
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
122016
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems
G Modelo-Howard, J Sweval, S Bagchi
7th ICST Conference on Security and Privacy for Communication Networks …, 2011
82011
The Search for Efficiency in Automated Intrusion Response for Distributed Applications
YS Wu, G Modelo-Howard, B Foo, S Bagchi, EH Spafford
2008 Symposium on Reliable Distributed Systems, 53-62, 2008
82008
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network
FA Arshad, G Modelo-Howard, S Bagchi
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-6, 2012
72012
IEEE INFOCOM 2017-IEEE Conference on Computer Communications
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE, 2017
62017
Macroscopic view of malware in home networks
A Finamore, S Saha, G Modelo-Howard, SJ Lee, E Bocchi, L Grimaudo, ...
2015 12th annual IEEE consumer communications and networking conference …, 2015
52015
Network connectivity graph for malicious traffic dissection
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
2015 24th International Conference on Computer Communication and Networks …, 2015
42015
Approximation algorithms for determining placement of intrusion detectors
G Modelo-Howard, S Bagchi, G Lebanon
CERIASTech. Report 1, 2011, 2011
32011
The Search for Optimality in Online Intrusion Response for a Distributed E-Commerce System
YS Wu, G Howard, M Glause, B Foo, S Bagchi, E Spafford
Technical Report CERIAS TR, 2007-94, 2007
32007
Kali: Scalable encryption fingerprinting in dynamic malware traces
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
2017 12th International Conference on Malicious and Unwanted Software …, 2017
22017
CERIAS Tech Report 2013-6 Secure Configuration of Intrusion Detection Sensors for Dynamic Enterprise-Class Distributed Systems
G Modelo-Howard
1*2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20