Gaspar Modelo-Howard
Gaspar Modelo-Howard
Data Scientist (Security), Palo Alto Networks
Verified email at
Cited by
Cited by
Intrusion response systems: a survey
B Foo, MW Glause, GM Howard, YS Wu, S Bagchi, EH Spafford
Information assurance: dependability and security in networked systems, 377-416, 2008
Determining placement of intrusion detectors for a distributed application through bayesian network modeling
G Modelo-Howard, S Bagchi, G Lebanon
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
Botnet Protocol Inference in the Presence of Encrypted Traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE International Conference on Computer Communications, 2017
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
pSigene: Webcrawling to generalize SQL injection signatures
GM Howard, CN Gutierrez, FA Arshad, S Bagchi, Y Qi
2014 44th annual IEEE/IFIP international conference on dependable systems …, 2014
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
Demystifying DDoS as a Service
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
IEEE Communications Magazine 55 (7), 14-21, 2017
Fault tolerant arima-based aggregation of data in sensor networks
D Herbert, G Modelo-Howard, C Perez-Toro, S Bagchi
IEEE International Conference on Dependable Systems and Networks, 1758-1761, 2007
Application-level DDoS detection using service profiling
A Zand, G Modelo-Howard, A Tongaonkar, SJ Lee, C Kruegel, G Vigna
US Patent 9,521,162, 2016
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems
G Modelo-Howard, J Sweval, S Bagchi
7th ICST Conference on Security and Privacy for Communication Networks …, 2011
Hunting for insider threats using LSTM-based anomaly detection
M Villarreal-Vasquez, GM Howard, S Dube, B Bhargava
IEEE Transactions on Dependable and Secure Computing, 2021
The Search for Efficiency in Automated Intrusion Response for Distributed Applications
YS Wu, G Modelo-Howard, B Foo, S Bagchi, EH Spafford
2008 Symposium on Reliable Distributed Systems, 53-62, 2008
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network
FA Arshad, G Modelo-Howard, S Bagchi
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-6, 2012
Network connectivity graph for malicious traffic dissection
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
2015 24th International Conference on Computer Communication and Networks …, 2015
Macroscopic view of malware in home networks
A Finamore, S Saha, G Modelo-Howard, SJ Lee, E Bocchi, L Grimaudo, ...
2015 12th annual IEEE consumer communications and networking conference …, 2015
Approximation algorithms for determining placement of intrusion detectors
G Modelo-Howard, S Bagchi, G Lebanon
CERIASTech. Report 1, 2011, 2011
The Search for Optimality in Online Intrusion Response for a Distributed E-Commerce System
YS Wu, G Howard, M Glause, B Foo, S Bagchi, E Spafford
Technical Report CERIAS TR, 2007-94, 2007
Kali: Scalable encryption fingerprinting in dynamic malware traces
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
2017 12th International Conference on Malicious and Unwanted Software …, 2017
CERIAS Tech Report 2013-6 Secure Configuration of Intrusion Detection Sensors for Dynamic Enterprise-Class Distributed Systems
G Modelo-Howard
pSigene: generalizing attack signatures
J Avery, G Modelo-Howard, F Arshad, S Bagchi, Y Qi
Proceedings of the 15th Annual Information Security Symposium, 1-1, 2014
The system can't perform the operation now. Try again later.
Articles 1–20