<?xml version="1.0"?>
<dblpperson name="Gaspar Modelo-Howard" pid="66/149" n="11">
<person key="homepages/66/149" mdate="2009-06-08">
<author pid="66/149">Gaspar Modelo-Howard</author>
</person>
<r><article key="journals/tdsc/Villarreal-Vasquez23" mdate="2023-01-31">
<author orcid="0000-0001-7147-3268" pid="205/9212">Miguel Villarreal-Vasquez</author>
<author orcid="0000-0003-1848-9193" pid="66/149">Gaspar Modelo-Howard</author>
<author orcid="0000-0002-8059-531X" pid="83/821">Simant Dube</author>
<author orcid="0000-0003-3803-8672" pid="b/BKBhargava">Bharat K. Bhargava</author>
<title>Hunting for Insider Threats Using LSTM-Based Anomaly Detection.</title>
<pages>451-462</pages>
<year>2023</year>
<volume>20</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TDSC.2021.3135639</ee>
<url>db/journals/tdsc/tdsc20.html#Villarreal-Vasquez23</url>
</article>
</r>
<r><article key="journals/cm/ZandMTLKV17" mdate="2020-08-25">
<author pid="49/10638">Ali Zand</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="84/217">Alok Tongaonkar</author>
<author pid="28/1552">Sung-Ju Lee</author>
<author pid="k/ChristopherKruegel">Christopher Kruegel</author>
<author pid="v/GiovanniVigna">Giovanni Vigna</author>
<title>Demystifying DDoS as a Service.</title>
<pages>14-21</pages>
<year>2017</year>
<volume>55</volume>
<journal>IEEE Commun. Mag.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/MCOM.2017.1600980</ee>
<url>db/journals/cm/cm55.html#ZandMTLKV17</url>
</article>
</r>
<r><inproceedings key="conf/infocom/CarliTMTJ17" mdate="2021-10-14">
<author orcid="0000-0003-0432-3686" pid="23/7380">Lorenzo De Carli</author>
<author pid="33/247">Ruben Torres</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="84/217">Alok Tongaonkar</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<title>Botnet protocol inference in the presence of encrypted traffic.</title>
<pages>1-9</pages>
<year>2017</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2017.8057064</ee>
<crossref>conf/infocom/2017</crossref>
<url>db/conf/infocom/infocom2017.html#CarliTMTJ17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/malware/CarliTMTJ17" mdate="2023-03-24">
<author pid="23/7380">Lorenzo De Carli</author>
<author pid="33/247">Ruben Torres</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="84/217">Alok Tongaonkar</author>
<author pid="j/SomeshJha">Somesh Jha</author>
<title>Kali: Scalable encryption fingerprinting in dynamic malware traces.</title>
<pages>3-10</pages>
<year>2017</year>
<booktitle>MALWARE</booktitle>
<ee>https://doi.org/10.1109/MALWARE.2017.8323951</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MALWARE.2017.8323951</ee>
<crossref>conf/malware/2017</crossref>
<url>db/conf/malware/malware2017.html#CarliTMTJ17</url>
</inproceedings>
</r>
<r><article key="journals/cn/BocchiGMBSMML16" mdate="2020-02-19">
<author pid="143/5703">Enrico Bocchi</author>
<author pid="48/10108">Luigi Grimaudo</author>
<author orcid="0000-0003-1859-6693" pid="18/6316">Marco Mellia</author>
<author pid="77/5283">Elena Baralis</author>
<author pid="59/5831">Sabyasachi Saha</author>
<author pid="71/8355">Stanislav Miskovic</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="28/1552">Sung-Ju Lee</author>
<title>MAGMA network behavior classifier for malware traffic.</title>
<pages>142-156</pages>
<year>2016</year>
<volume>109</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2016.03.021</ee>
<url>db/journals/cn/cn109.html#BocchiGMBSMML16</url>
</article>
</r>
<r><inproceedings key="conf/ccnc/FinamoreSMLBGMB15" mdate="2018-11-02">
<author pid="09/2252">Alessandro Finamore</author>
<author pid="59/5831">Sabyasachi Saha</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="28/1552">Sung-Ju Lee</author>
<author pid="143/5703">Enrico Bocchi</author>
<author pid="48/10108">Luigi Grimaudo</author>
<author orcid="0000-0003-1859-6693" pid="18/6316">Marco Mellia</author>
<author pid="77/5283">Elena Baralis</author>
<title>Macroscopic view of malware in home networks.</title>
<pages>262-266</pages>
<year>2015</year>
<booktitle>CCNC</booktitle>
<ee>https://doi.org/10.1109/CCNC.2015.7157987</ee>
<crossref>conf/ccnc/2015</crossref>
<url>db/conf/ccnc/ccnc2015.html#FinamoreSMLBGMB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/BocchiGMBSMML15" mdate="2018-11-02">
<author pid="143/5703">Enrico Bocchi</author>
<author pid="48/10108">Luigi Grimaudo</author>
<author orcid="0000-0003-1859-6693" pid="18/6316">Marco Mellia</author>
<author pid="77/5283">Elena Baralis</author>
<author pid="59/5831">Sabyasachi Saha</author>
<author pid="71/8355">Stanislav Miskovic</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="28/1552">Sung-Ju Lee</author>
<title>Network Connectivity Graph for Malicious Traffic Dissection.</title>
<pages>1-9</pages>
<year>2015</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2015.7288435</ee>
<crossref>conf/icccn/2015</crossref>
<url>db/conf/icccn/icccn2015.html#BocchiGMBSMML15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/Modelo-HowardGABQ14" mdate="2023-03-24">
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="55/8297">Christopher N. Gutierrez</author>
<author pid="22/2512">Fahad A. Arshad</author>
<author pid="57/95">Saurabh Bagchi</author>
<author pid="32/6684">Yuan Qi</author>
<title>pSigene: Webcrawling to Generalize SQL Injection Signatures.</title>
<pages>45-56</pages>
<year>2014</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN.2014.21</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2014.21</ee>
<crossref>conf/dsn/2014</crossref>
<url>db/conf/dsn/dsn2014.html#Modelo-HowardGABQ14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icnp/ArshadMB12" mdate="2023-03-24">
<author pid="22/2512">Fahad A. Arshad</author>
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="57/95">Saurabh Bagchi</author>
<title>To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network.</title>
<pages>1-6</pages>
<year>2012</year>
<crossref>conf/icnp/2012</crossref>
<booktitle>ICNP</booktitle>
<ee>https://doi.org/10.1109/ICNP.2012.6459949</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICNP.2012.6459949</ee>
<url>db/conf/icnp/icnp2012.html#ArshadMB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/Modelo-HowardSB11" mdate="2024-10-06">
<author pid="66/149">Gaspar Modelo-Howard</author>
<author orcid="0009-0004-6243-1831" pid="118/9767">Jevin Sweval</author>
<author pid="57/95">Saurabh Bagchi</author>
<title>Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems.</title>
<pages>39-58</pages>
<year>2011</year>
<booktitle>SecureComm</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31909-9_3</ee>
<crossref>conf/securecomm/2011</crossref>
<url>db/conf/securecomm/securecomm2011.html#Modelo-HowardSB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/Modelo-HowardBL08" mdate="2017-05-23">
<author pid="66/149">Gaspar Modelo-Howard</author>
<author pid="57/95">Saurabh Bagchi</author>
<author pid="31/4315">Guy Lebanon</author>
<title>Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.</title>
<pages>271-290</pages>
<year>2008</year>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87403-4_15</ee>
<crossref>conf/raid/2008</crossref>
<url>db/conf/raid/raid2008.html#Modelo-HowardBL08</url>
</inproceedings>
</r>
<coauthors n="24" nc="2">
<co c="0"><na f="a/Arshad:Fahad_A=" pid="22/2512">Fahad A. Arshad</na></co>
<co c="0"><na f="b/Bagchi:Saurabh" pid="57/95">Saurabh Bagchi</na></co>
<co c="0"><na f="b/Baralis:Elena" pid="77/5283">Elena Baralis</na></co>
<co c="1"><na f="b/Bhargava:Bharat_K=" pid="b/BKBhargava">Bharat K. Bhargava</na></co>
<co c="0"><na f="b/Bocchi:Enrico" pid="143/5703">Enrico Bocchi</na></co>
<co c="0"><na f="c/Carli:Lorenzo_De" pid="23/7380">Lorenzo De Carli</na></co>
<co c="1"><na f="d/Dube:Simant" pid="83/821">Simant Dube</na></co>
<co c="0"><na f="f/Finamore:Alessandro" pid="09/2252">Alessandro Finamore</na></co>
<co c="0"><na f="g/Grimaudo:Luigi" pid="48/10108">Luigi Grimaudo</na></co>
<co c="0"><na f="g/Gutierrez:Christopher_N=" pid="55/8297">Christopher N. Gutierrez</na></co>
<co c="0"><na f="j/Jha:Somesh" pid="j/SomeshJha">Somesh Jha</na></co>
<co c="0" n="2"><na f="k/Kr=uuml=gel:Christopher" pid="k/ChristopherKruegel">Christopher Kr&#252;gel</na><na>Christopher Kruegel</na></co>
<co c="0"><na f="l/Lebanon:Guy" pid="31/4315">Guy Lebanon</na></co>
<co c="0"><na f="l/Lee:Sung=Ju" pid="28/1552">Sung-Ju Lee</na></co>
<co c="0"><na f="m/Mellia:Marco" pid="18/6316">Marco Mellia</na></co>
<co c="0"><na f="m/Miskovic:Stanislav" pid="71/8355">Stanislav Miskovic</na></co>
<co c="0"><na f="q/Qi:Yuan" pid="32/6684">Yuan Qi</na></co>
<co c="0"><na f="s/Saha:Sabyasachi" pid="59/5831">Sabyasachi Saha</na></co>
<co c="0"><na f="s/Sweval:Jevin" pid="118/9767">Jevin Sweval</na></co>
<co c="0"><na f="t/Tongaonkar:Alok" pid="84/217">Alok Tongaonkar</na></co>
<co c="0"><na f="t/Torres:Ruben" pid="33/247">Ruben Torres</na></co>
<co c="0"><na f="v/Vigna:Giovanni" pid="v/GiovanniVigna">Giovanni Vigna</na></co>
<co c="1"><na f="v/Villarreal=Vasquez:Miguel" pid="205/9212">Miguel Villarreal-Vasquez</na></co>
<co c="0"><na f="z/Zand:Ali" pid="49/10638">Ali Zand</na></co>
</coauthors>
</dblpperson>

