Hugo Gonzalez

Orcid: 0000-0002-7322-4019

According to our database1, Hugo Gonzalez authored at least 16 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation.
Sensors, 2022

2019
Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course.
Res. Comput. Sci., 2019

Code Authorship Attribution: Methods and Challenges.
ACM Comput. Surv., 2019

2018
Unmasking Android Obfuscation Tools Using Spatial Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Authorship Attribution of Android Apps.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Cybersecurity Teaching through Gamification: Aligning Training Resources to our Syllabus.
Res. Comput. Sci., 2017

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017

Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Measuring code reuse in Android apps.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Exploring reverse engineering symptoms in Android apps.
Proceedings of the Eighth European Workshop on System Security, 2015

Enriching reverse engineering through visual exploration of Android binaries.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones.
J. Cyber Secur. Mobil., 2014

DroidKin: Lightweight Detection of Android Apps Similarity.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...