Anomalous payload-based worm detection and signature generation K Wang, G Cretu, SJ Stolfo Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006 | 412 | 2006 |
Casting out demons: Sanitizing training data for anomaly sensors GF Cretu, A Stavrou, ME Locasto, SJ Stolfo, AD Keromytis 2008 IEEE Symposium on Security and Privacy (sp 2008), 81-95, 2008 | 249 | 2008 |
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation. Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ... NDSS 2, 4, 2018 | 88 | 2018 |
Detecting anomalies in cellular networks using an ensemble method GF Ciocarlie, U Lindqvist, S Nováczki, H Sanneck Proceedings of the 9th international conference on network and service …, 2013 | 82 | 2013 |
Communication pattern monitoring: Improving the utility of anomaly detection for industrial control systems MK Yoon, GF Ciocarlie NDSS workshop on security of emerging networking technologies, 2014 | 73 | 2014 |
Methods, systems and media for software self-healing ME Locasto, AD Keromytis, SJ Stolfo, A Stavrou, G Cretu, S Sidiroglou, ... US Patent 7,962,798, 2011 | 65 | 2011 |
Kernel-supported cost-effective audit logging for causality tracking S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ... 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 241-254, 2018 | 59 | 2018 |
Hunting for problems with Artemis GF Creţu-Ciocârlie, M Budiu, M Goldszmidt Proceedings of the First USENIX Conference on Analysis of system logs, 39-2008, 2008 | 48 | 2008 |
Methods, media, and systems for securing communications between a first node and a second node SJ Stolfo, GF Ciocarlie, V Frias-Martinez, J Parekh, AD Keromytis, ... US Patent 9,419,981, 2016 | 46 | 2016 |
Jumping the air gap: Modeling cyber-physical attack paths in the Internet-of-Things I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ... Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017 | 40 | 2017 |
Anomaly detection and diagnosis for automatic radio network verification GF Ciocarlie, C Connolly, CC Cheng, U Lindqvist, S Nováczki, H Sanneck, ... Mobile Networks and Management: 6th International Conference, MONAMI 2014 …, 2015 | 37 | 2015 |
On the feasibility of deploying cell anomaly detection in operational cellular networks G Ciocarlie, U Lindqvist, K Nitz, S Nováczki, H Sanneck 2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014 | 36 | 2014 |
Method and apparatus for detecting vulnerabilities and bugs in software applications VC Sreedhar, GF Cretu, JT Dolby US Patent App. 11/668,889, 2008 | 36 | 2008 |
From STEM to SEAD: Speculative execution for automated defense ME Locasto, A Stavrou, GF Cretu, AD Keromytis | 36 | 2007 |
Blockcis—a blockchain-based cyber insurance system T Lepoint, G Ciocarlie, K Eldefrawy 2018 IEEE International Conference on Cloud Engineering (IC2E), 378-384, 2018 | 35 | 2018 |
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models G Cretu, A Stavrou, SJ Stolfo, AD Keromytis, ME Locasto US Patent 8,407,160, 2013 | 34 | 2013 |
Systems, methods, and media for recovering an application from a fault or attack ME Locasto, AD Keromytis, A Stavrou, GF Ciocarlie US Patent 8,924,782, 2014 | 30 | 2014 |
ct-fuzz: Fuzzing for Timing Leaks S He, M Emmi, G Ciocarlie 2020 IEEE 13th International Conference on Software Testing, Validation and …, 2020 | 29 | 2020 |
Intrusion and anomaly detection model exchange for mobile ad-hoc networks GF Cretu, JJ Parekh, K Wang, S Stolfo | 29 | 2006 |
Data sanitization: Improving the forensic utility of anomaly detection systems GF Cretu, A Stavrou, S Stolfo, AD Keromytis | 22 | 2007 |