Agustín Orfila

According to our database1, Agustín Orfila authored at least 25 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.
IEEE Trans. Dependable Secur. Comput., 2015

An efficient confidentiality-preserving Proof of Ownership for deduplication.
J. Netw. Comput. Appl., 2015

DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015

Access Control for the Cloud Based on Multi-device Authentication.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Randomized Anagram revisited.
J. Netw. Comput. Appl., 2014

Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based Classifiers.
Proceedings of the Intelligent Distributed Computing VIII, 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012

Evaluation of classification algorithms for intrusion detection in MANETs.
Knowl. Based Syst., 2012

2011
Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Netw. Comput. Appl., 2011

A comprehensive RFID solution to enhance inpatient medication safety.
Int. J. Medical Informatics, 2011

Analysis of update delays in signature-based network intrusion detection systems.
Comput. Secur., 2011

A Functional Framework to Evade Network IDS.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
A multi-agent scanner to detect stored-XSS vulnerabilities.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Modeling NIDS Evasion with Genetic Programming.
Proceedings of the 2010 International Conference on Security & Management, 2010

Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming.
Proceedings of the ARES 2010, 2010

2009
Negotiation of Network Security Policy by Means of Agents.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
Proceedings of the Applications of Evolutionary Computing, 2009

2008
Autonomous decision on intrusion detection with trained BDI agents.
Comput. Commun., 2008

2006
Effectiveness Evaluation of Data Mining Based IDS.
Proceedings of the Advances in Data Mining, 2006

Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Intrusion Detection Effectiveness Improvement by a Multiagent System.
Int. J. Comput. Sci. Appl., 2005

2003
Fuzzy logic on decision model for IDS.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Adaptive Agents Applied to Intrusion Detection.
Proceedings of the Multi-Agent Systems and Applications III, 2003

2001
Robust New Method in Frequency Domain Watermarking.
Proceedings of the Information Security, 4th International Conference, 2001


  Loading...