BibTeX records: Gaspar Modelo-Howard

download as .bib file

@article{DBLP:journals/cm/ZandMTLKV17,
  author    = {Ali Zand and
               Gaspar Modelo{-}Howard and
               Alok Tongaonkar and
               Sung{-}Ju Lee and
               Christopher Kruegel and
               Giovanni Vigna},
  title     = {Demystifying DDoS as a Service},
  journal   = {{IEEE} Commun. Mag.},
  volume    = {55},
  number    = {7},
  pages     = {14--21},
  year      = {2017},
  url       = {https://doi.org/10.1109/MCOM.2017.1600980},
  doi       = {10.1109/MCOM.2017.1600980},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cm/ZandMTLKV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CarliTMTJ17,
  author    = {Lorenzo De Carli and
               Ruben Torres and
               Gaspar Modelo{-}Howard and
               Alok Tongaonkar and
               Somesh Jha},
  title     = {Botnet protocol inference in the presence of encrypted traffic},
  booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
               Atlanta, GA, USA, May 1-4, 2017},
  pages     = {1--9},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/INFOCOM.2017.8057064},
  doi       = {10.1109/INFOCOM.2017.8057064},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/infocom/CarliTMTJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CarliTMTJ17,
  author    = {Lorenzo De Carli and
               Ruben Torres and
               Gaspar Modelo{-}Howard and
               Alok Tongaonkar and
               Somesh Jha},
  title     = {Kali: Scalable encryption fingerprinting in dynamic malware traces},
  booktitle = {12th International Conference on Malicious and Unwanted Software,
               {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages     = {3--10},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/MALWARE.2017.8323951},
  doi       = {10.1109/MALWARE.2017.8323951},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/malware/CarliTMTJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BocchiGMBSMML16,
  author    = {Enrico Bocchi and
               Luigi Grimaudo and
               Marco Mellia and
               Elena Baralis and
               Sabyasachi Saha and
               Stanislav Miskovic and
               Gaspar Modelo{-}Howard and
               Sung{-}Ju Lee},
  title     = {{MAGMA} network behavior classifier for malware traffic},
  journal   = {Comput. Networks},
  volume    = {109},
  pages     = {142--156},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.comnet.2016.03.021},
  doi       = {10.1016/j.comnet.2016.03.021},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cn/BocchiGMBSMML16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/FinamoreSMLBGMB15,
  author    = {Alessandro Finamore and
               Sabyasachi Saha and
               Gaspar Modelo{-}Howard and
               Sung{-}Ju Lee and
               Enrico Bocchi and
               Luigi Grimaudo and
               Marco Mellia and
               Elena Baralis},
  title     = {Macroscopic view of malware in home networks},
  booktitle = {12th Annual {IEEE} Consumer Communications and Networking Conference,
               {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015},
  pages     = {262--266},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/CCNC.2015.7157987},
  doi       = {10.1109/CCNC.2015.7157987},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/ccnc/FinamoreSMLBGMB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/BocchiGMBSMML15,
  author    = {Enrico Bocchi and
               Luigi Grimaudo and
               Marco Mellia and
               Elena Baralis and
               Sabyasachi Saha and
               Stanislav Miskovic and
               Gaspar Modelo{-}Howard and
               Sung{-}Ju Lee},
  title     = {Network Connectivity Graph for Malicious Traffic Dissection},
  booktitle = {24th International Conference on Computer Communication and Networks,
               {ICCCN} 2015, Las Vegas, NV, USA, August 3-6, 2015},
  pages     = {1--9},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/ICCCN.2015.7288435},
  doi       = {10.1109/ICCCN.2015.7288435},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icccn/BocchiGMBSMML15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/Modelo-HowardGABQ14,
  author    = {Gaspar Modelo{-}Howard and
               Christopher N. Gutierrez and
               Fahad A. Arshad and
               Saurabh Bagchi and
               Yuan Qi},
  title     = {pSigene: Webcrawling to Generalize {SQL} Injection Signatures},
  booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages     = {45--56},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/DSN.2014.21},
  doi       = {10.1109/DSN.2014.21},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsn/Modelo-HowardGABQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ArshadMB12,
  author    = {Fahad A. Arshad and
               Gaspar Modelo{-}Howard and
               Saurabh Bagchi},
  title     = {To cloud or not to cloud: {A} study of trade-offs between in-house
               and outsourced virtual private network},
  booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP}
               2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages     = {1--6},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/ICNP.2012.6459949},
  doi       = {10.1109/ICNP.2012.6459949},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/icnp/ArshadMB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Modelo-HowardSB11,
  author    = {Gaspar Modelo{-}Howard and
               Jevin Sweval and
               Saurabh Bagchi},
  editor    = {Muttukrishnan Rajarajan and
               Fred Piper and
               Haining Wang and
               George Kesidis},
  title     = {Secure Configuration of Intrusion Detection Sensors for Changing Enterprise
               Systems},
  booktitle = {Security and Privacy in Communication Networks - 7th International
               {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
               Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {96},
  pages     = {39--58},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-31909-9\_3},
  doi       = {10.1007/978-3-642-31909-9\_3},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/conf/securecomm/Modelo-HowardSB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Modelo-HowardBL08,
  author    = {Gaspar Modelo{-}Howard and
               Saurabh Bagchi and
               Guy Lebanon},
  editor    = {Richard Lippmann and
               Engin Kirda and
               Ari Trachtenberg},
  title     = {Determining Placement of Intrusion Detectors for a Distributed Application
               through Bayesian Network Modeling},
  booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5230},
  pages     = {271--290},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4\_15},
  doi       = {10.1007/978-3-540-87403-4\_15},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/raid/Modelo-HowardBL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics