Follow
Gabriela (Cretu) Ciocarlie
Gabriela (Cretu) Ciocarlie
Associate Professor at The University of Texas at San Antonio
Verified email at cs.columbia.edu - Homepage
Title
Cited by
Cited by
Year
Anomalous payload-based worm detection and signature generation
K Wang, G Cretu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 227-246, 2005
4132005
Casting out demons: Sanitizing training data for anomaly sensors
GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis
2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008
2822008
MCI: Modeling-based causality inference in audit logging for attack investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
Network and Distributed Systems Security (NDSS) Symposium, 2018
1132018
Detecting anomalies in cellular networks using an ensemble method
GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck
Proceedings of the 9th international conference on network and service …, 2013
892013
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
792018
Communication pattern monitoring: Improving the utility of anomaly detection for industrial control systems
MK Yoon, GF Ciocarlie
NDSS workshop on security of emerging networking technologies, 2014
792014
Methods, systems and media for software self-healing
ME Locasto, AD Keromytis, SJ Stolfo, A Stavrou, G Cretu, S Sidiroglou, ...
US Patent 7,962,798, 2011
672011
Methods, media, and systems for securing communications between a first node and a second node
SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ...
US Patent 9,419,981, 2016
502016
Hunting for problems with Artemis
GF Creţu-Ciocârlie, M Budiu, M Goldszmidt
Proceedings of the First USENIX Conference on Analysis of system logs, 39-2008, 2008
482008
Blockcis—a blockchain-based cyber insurance system
T Lepoint, G Ciocarlie, K Eldefrawy
2018 IEEE International Conference on Cloud Engineering (IC2E), 378-384, 2018
442018
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
442017
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
G Cretu, A Stavrou, SJ Stolfo, AD Keromytis, ME Locasto
US Patent 8,407,160, 2013
382013
Anomaly detection and diagnosis for automatic radio network verification
GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ...
Mobile Networks and Management: 6th International Conference, MONAMI 2014 …, 2015
372015
ct-fuzz: Fuzzing for Timing Leaks
S He, M Emmi, G Ciocarlie
2020 IEEE 13th International Conference on Software Testing, Validation and …, 2020
362020
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
362014
Method and apparatus for detecting vulnerabilities and bugs in software applications
VC Sreedhar, GF Cretu, JT Dolby
US Patent App. 11/668,889, 2008
362008
From STEM to SEAD: Speculative execution for automated defense
ME Locasto, A Stavrou, GF Cretu, AD Keromytis
362007
Trace: Enterprise-wide provenance tracking for real-time apt detection
H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ...
IEEE Transactions on Information Forensics and Security 16, 4363-4376, 2021
342021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ...
NDSS, 2021
322021
Systems, methods, and media for recovering an application from a fault or attack
ME Locasto, AD Keromytis, A Stavrou, GF Ciocarlie
US Patent 8,924,782, 2014
322014
The system can't perform the operation now. Try again later.
Articles 1–20