Gaspar Modelo-Howard
Gaspar Modelo-Howard
Data Scientist (Security), Palo Alto Networks
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα acm.org
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Intrusion response systems: a survey
B Foo, MW Glause, GM Howard, YS Wu, S Bagchi, EH Spafford
Information assurance: dependability and security in networked systems, 377-412, 2008
71*2008
Determining placement of intrusion detectors for a distributed application through bayesian network modeling
G Modelo-Howard, S Bagchi, G Lebanon
International Workshop on Recent Advances in Intrusion Detection, 271-290, 2008
502008
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
33*2018
pSigene: Webcrawling to generalize SQL injection signatures
GM Howard, CN Gutierrez, FA Arshad, S Bagchi, Y Qi
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
192014
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
172016
Fault tolerant arima-based aggregation of data in sensor networks
D Herbert, G Modelo-Howard, C Perez-Toro, S Bagchi
IEEE International Conference on Dependable Systems and Networks, 1758-1761, 2007
122007
Botnet Protocol Inference in the Presence of Encrypted Traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE International Conference on Computer Communications, 2017
112017
Demystifying DDoS as a Service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
82017
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems
G Modelo-Howard, J Sweval, S Bagchi
7th ICST Conference on Security and Privacy for Communication Networks …, 2011
82011
The Search for Efficiency in Automated Intrusion Response for Distributed Applications
YS Wu, G Modelo-Howard, B Foo, S Bagchi, EH Spafford
2008 Symposium on Reliable Distributed Systems, 53-62, 2008
62008
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
52016
Network connectivity graph for malicious traffic dissection
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
2015 24th International Conference on Computer Communication and Networks …, 2015
42015
Macroscopic view of malware in home networks
A Finamore, S Saha, G Modelo-Howard, SJ Lee, E Bocchi, L Grimaudo, ...
2015 12th annual IEEE consumer communications and networking conference …, 2015
42015
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network
FA Arshad, G Modelo-Howard, S Bagchi
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-6, 2012
42012
Approximation algorithms for determining placement of intrusion detectors
G Modelo-Howard, S Bagchi, G Lebanon
CERIASTech. Report 1, 2011, 2011
32011
Network Security: Know It All
J James
Morgan Kaufmann, 2008
22008
Kali: Scalable encryption fingerprinting in dynamic malware traces.
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
MALWARE, 3-10, 2017
12017
pSigene: generalizing attack signatures
J Avery, G Modelo-Howard, F Arshad, S Bagchi, Y Qi
Proceedings of the 15th Annual Information Security Symposium, 1-1, 2014
2014
Estudio de Medición de la Actividad de Botnets en la República de Panamá
MG Blandón, GM Howard, R Torres
2013
CERIAS Tech Report 2013-6 Secure Configuration of Intrusion Detection Sensors for Dynamic Enterprise-Class Distributed Systems
G Modelo-Howard
2013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20