Gabriela (Cretu) Ciocarlie
Gabriela (Cretu) Ciocarlie
Sr. Technical Manager, SRI International
Verified email at cs.columbia.edu - Homepage
TitleCited byYear
Anomalous payload-based worm detection and signature generation
K Wang, G Cretu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 227-246, 2005
3692005
Methods, media, and systems for securing communications between a first node and a second node
SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ...
US Patent App. 10/178,104, 2019
1902019
Casting out demons: Sanitizing training data for anomaly sensors
GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis
2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008
1492008
Detecting anomalies in cellular networks using an ensemble method
GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck
Proceedings of the 9th international conference on network and service …, 2013
542013
Methods, systems and media for software self-healing
ME Locasto, AD Keromytis, SJ Stolfo, A Stavrou, G Cretu, S Sidiroglou, ...
US Patent 7,962,798, 2011
532011
Communication pattern monitoring: Improving the utility of anomaly detection for industrial control systems
MK Yoon, GF Ciocarlie
NDSS Workshop on Security of Emerging Networking Technologies, 2014
492014
Methods, media, and systems for securing communications between a first node and a second node
SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ...
US Patent 9,419,981, 2016
462016
Method and apparatus for detecting vulnerabilities and bugs in software applications
VC Sreedhar, GF Cretu, JT Dolby
US Patent App. 11/668,889, 2008
352008
From STEM to SEAD: Speculative execution for automated defense
ME Locasto, A Stavrou, GF Cretu, AD Keromytis
352007
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
G Cretu, A Stavrou, SJ Stolfo, AD Keromytis, ME Locasto
US Patent 8,407,160, 2013
332013
Intrusion and anomaly detection model exchange for mobile ad-hoc networks
GF Cretu, JJ Parekh, K Wang, S Stolfo
292006
Anomaly detection and diagnosis for automatic radio network verification
GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ...
International Conference on Mobile Networks and Management, 163-176, 2014
272014
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
222014
On the feasibility of deploying cell anomaly detection in operational cellular networks
G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
222014
Hunting for problems with Artemis
GF Creţu-Ciocârlie, M Budiu, M Goldszmidt
Proceedings of the First USENIX conference on Analysis of system logs, 2-2, 2008
222008
Data sanitization: Improving the forensic utility of anomaly detection systems
GF Cretu, A Stavrou, S Stolfo, AD Keromytis
202007
Systems, methods, and media for recovering an application from a fault or attack
ME Locasto, AD Keromytis, A Stavrou, GF Ciocarlie
US Patent 8,924,782, 2014
192014
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS, 2018
162018
Quantifying Application Behavior Space for Detection and Self-Healing
ME Locasto, A Stavrou, GF Cretu, AD Keromytis, S Stolfo
142006
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20