PEDRO
GARCÍA TEODORO
CATEDRÁTICO DE UNIVERSIDAD
JESÚS ESTEBAN
DÍAZ VERDEJO
CATEDRÁTICO DE UNIVERSIDAD
Publicaciones en las que colabora con JESÚS ESTEBAN DÍAZ VERDEJO (39)
2016
-
Automatic Generation of HTTP Intrusion Signatures by Selective identification of Anomalies
Actas de la jornadas nacionales de investigación en ciberseguridad: Granada, 15, 16 y 17 de Junio de 2016 (Universidad de Granada), pp. 29-30
2015
-
Automatic generation of HTTP intrusion signatures by selective identification of anomalies
Computers and Security, Vol. 55, pp. 159-174
2014
-
Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks
Security for Multihop Wireless Networks (CRC Press), pp. 377-400
-
Monitorización y selección de incidentes en seguridad de redes mediante EDA
RECSI XIII: actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014
-
Tackling the big data 4 vs for anomaly detection
Proceedings - IEEE INFOCOM
-
Transmisión de datos y redes de computadores
Pearson Educación
2013
-
A generalizable dynamic flow pairing method for traffic classification
Computer Networks, Vol. 57, Núm. 14, pp. 2718-2732
-
Erratum: On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for wireless sensor networks (WSN) (Wireless Personal Communications DOI: 10.1007/s11277-012-0676-5)
Wireless Personal Communications
-
On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for Wireless Sensor Networks (WSN)
Wireless Personal Communications, Vol. 70, Núm. 1, pp. 15-38
2012
-
Segmental parameterisation and statistical modelling of e-mail headers for spam detection
Information Sciences, Vol. 195, pp. 45-61
2011
-
Multiple vector classification for P2P traffic identification
DCNET 2011 OPTICS 2011 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication System
-
Pair-wise similarity criteria for flows identification in P2P/non-P2P traffic classification
AP2PS 2011 - 3rd International Conference on Advances in P2P Systems
2009
-
Anomaly detection in P2P networks using Markov modelling
1st International Conference on Advances in P2P Systems, AP2PS 2009
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
Computers and Security, Vol. 28, Núm. 1-2, pp. 18-28
-
Environmental security in P2P networks
1st International Conference on Advances in P2P Systems, AP2PS 2009
-
Fraud in roaming scenarios: An overview
IEEE Wireless Communications, Vol. 16, Núm. 6, pp. 88-94
-
Mathematical model for low-rate dos attacks against application servers
IEEE Transactions on Information Forensics and Security, Vol. 4, Núm. 3, pp. 519-529
2008
-
A deterministic crowding evolutionary algorithm for optimization of a knn-based anomaly intrusion detection system
Frontiers in Artificial Intelligence and Applications, Vol. 177, Núm. 1, pp. 111-120
-
Evaluation of a low-rate DoS attack against application servers
Computers and Security, Vol. 27, Núm. 7-8, pp. 335-354
-
LoRDAS: A low-rate DoS attack against application servers
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)