Publicaciones en las que colabora con JESÚS ESTEBAN DÍAZ VERDEJO (39)

2016

  1. Automatic Generation of HTTP Intrusion Signatures by Selective identification of Anomalies

    Actas de la jornadas nacionales de investigación en ciberseguridad: Granada, 15, 16 y 17 de Junio de 2016 (Universidad de Granada), pp. 29-30

2014

  1. Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks

    Security for Multihop Wireless Networks (CRC Press), pp. 377-400

  2. Monitorización y selección de incidentes en seguridad de redes mediante EDA

    RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014

  3. Tackling the big data 4 vs for anomaly detection

    Proceedings - IEEE INFOCOM

  4. Transmisión de datos y redes de computadores

    Pearson Educación

2011

  1. Multiple vector classification for P2P traffic identification

    DCNET 2011 OPTICS 2011 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication System

  2. Pair-wise similarity criteria for flows identification in P2P/non-P2P traffic classification

    AP2PS 2011 - 3rd International Conference on Advances in P2P Systems

2009

  1. Anomaly detection in P2P networks using Markov modelling

    1st International Conference on Advances in P2P Systems, AP2PS 2009

  2. Anomaly-based network intrusion detection: Techniques, systems and challenges

    Computers and Security, Vol. 28, Núm. 1-2, pp. 18-28

  3. Environmental security in P2P networks

    1st International Conference on Advances in P2P Systems, AP2PS 2009

  4. Fraud in roaming scenarios: An overview

    IEEE Wireless Communications, Vol. 16, Núm. 6, pp. 88-94

  5. Mathematical model for low-rate dos attacks against application servers

    IEEE Transactions on Information Forensics and Security, Vol. 4, Núm. 3, pp. 519-529

2008

  1. A deterministic crowding evolutionary algorithm for optimization of a knn-based anomaly intrusion detection system

    Frontiers in Artificial Intelligence and Applications, Vol. 177, Núm. 1, pp. 111-120

  2. Evaluation of a low-rate DoS attack against application servers

    Computers and Security, Vol. 27, Núm. 7-8, pp. 335-354

  3. LoRDAS: A low-rate DoS attack against application servers

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)