Gabriela F. Ciocarlie

Orcid: 0000-0001-8502-5140

Affiliations:
  • SRI International
  • Columbia University, New York City, USA (former)


According to our database1, Gabriela F. Ciocarlie authored at least 44 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

Adversarial scratches: Deployable attacks to CNN classifiers.
Pattern Recognit., 2023

Securing Critical Infrastructure Across Cyber and Physical Dimensions.
IEEE Secur. Priv., 2023

Delay Tolerant Networks for Industry 4.0.
Proceedings of the 18th Annual System of Systems Engineering Conference, 2023

Digital Twin of Cyber-Physical CNC for Smart Manufacturing.
Proceedings of the IEEE 3rd International Conference on Digital Twins and Parallel Intelligence, 2023

2022
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing.
IEEE Secur. Priv., 2022

Wireless and Mobile Security Research and Teaching in the Post-Pandemic World.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Everything is Connected: Security and Reliability for Critical Infrastructure.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Model-Based Security Analysis in Additive Manufacturing Systems.
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation.
Computer, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Formal Specification and Verification of Solidity Contracts with Events.
CoRR, 2020

Behavioral simulation for smart contracts.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

IoTHound: environment-agnostic device identification and monitoring.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

ct-fuzz: Fuzzing for Timing Leaks.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

On Uncertainty and Robustness in Large-Scale Intelligent Data Fusion Systems.
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020

Formal Specification and Verification of Solidity Contracts with Events (Short Paper).
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020

2019
Scratch that! An Evolution-based Adversarial Attack against Neural Networks.
CoRR, 2019

Application of Trust Assessment Techniques to IoBT Systems.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

A Consensus-based Approach for Distributed Quickest Detection of Significant Events in Networks.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

BlockCIS - A Blockchain-Based Cyber Insurance System.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Risks and Benefits of Side-Channels in Battlefields.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Building Hardened Internet-of-Things Clients with Language-Theoretic Security.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Low-Leakage Secure Search for Boolean Expressions.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Diagnosis cloud: Sharing knowledge across cellular networks.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2015
Alarm Prioritization and Diagnosis for Cellular Networks.
Proceedings of the Mobile Networks and Management - 7th International Conference, 2015

2014
DCAD: Dynamic Cell Anomaly Detection for operational cellular networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

On the feasibility of deploying cell anomaly detection in operational cellular networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Anomaly Detection and Diagnosis for Automatic Radio Network Verification.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

Managing scope changes for cellular network-level anomaly detection.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Demo: SONVer: SON verification for operational cellular networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

2013
Detecting anomalies in cellular networks using an ensemble method.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2009
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Hunting for Problems with Artemis.
Proceedings of the First USENIX Workshop on the Analysis of System Logs, 2008

Return Value Predictability Profiles for Self-healing.
Proceedings of the Advances in Information and Computer Security, 2008

2007
From STEM to SEAD: Speculative Execution for Automated Defense.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

2006
Intrusion and anomaly detection model exchange for mobile ad-hoc networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Anomalous Payload-Based Worm Detection and Signature Generation.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005


  Loading...