Carlos Laorden

Orcid: 0000-0001-7504-0099

According to our database1, Carlos Laorden authored at least 36 papers between 2010 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Static analysis: a brief survey.
Log. J. IGPL, 2016

Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.
Log. J. IGPL, 2016

Developing Interoperable Experiences with OpenUIX.
Proceedings of the 2016 Symposium on Spatial User Interaction, 2016

Collaborative content creation with the OpenUIX Framework.
Proceedings of the 2016 IEEE International Symposium on Mixed and Augmented Reality, 2016

2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015

OpenUIX Demo: A Sneak Peek at a Novel HCI Model for AR Systems.
Proceedings of the 3rd ACM Symposium on Spatial User Interaction, 2015

A Comprehensive Interaction Model for ASystems.
Proceedings of the 2015 IEEE International Symposium on Mixed and Augmented Reality, 2015

2014
Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

An Empirical Study on Word Sense Disambiguation for Adult Content Filtering.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A Survey on Static Analysis and Model Checking.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Reversing the effects of tokenisation attacks against content-based spam filters.
Int. J. Secur. Networks, 2013

Collective classification for spam filtering.
Log. J. IGPL, 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Twitter Content-Based Spam Filtering.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

MADS: Malicious Android Applications Detection through String Analysis.
Proceedings of the Network and System Security - 7th International Conference, 2013

Enhancing cybersecurity learning through an augmented reality-based serious game.
Proceedings of the IEEE Global Engineering Education Conference, 2013

JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering.
Expert Syst. Appl., 2012

Word sense disambiguation for spam filtering.
Electron. Commer. Res. Appl., 2012

PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Towards a more efficient and personalised advertisement content in on-line social networks.
Proceedings of the 5th Ph.D. Workshop on Information and Knowledge Management, 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Using opcode sequences in single-class learning to detect unknown malware.
IET Inf. Secur., 2011

Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Collective Classification for Unknown Malware Detection.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Opcode-Sequence-Based Semi-supervised Unknown Malware Detection.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011

2010
Idea: Opcode-Sequence-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010


  Loading...