Igor Santos

Orcid: 0000-0002-9511-8612

Affiliations:
  • University of Deusto, Bilbao, Spain


According to our database1, Igor Santos authored at least 86 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Keep your Identity Small: Privacy-preserving Client-side Fingerprinting.
CoRR, 2023

When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs.
IEEE Access, 2023

2022
Sentiment analysis using convolutional neural network via word embeddings.
Evol. Intell., 2022

Best Practices and Scoring System on Reviewing A.I. based Medical Imaging Papers: Part 1 Classification.
CoRR, 2022

2021
The Neverending Story: Memory Corruption 30 Years Later.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021

2020
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019

Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

BakingTimer: privacy analysis of server-side request processing time.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Clock Around the Clock: Time-Based Device Fingerprinting.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017

Editorial: Special Issue HAIS15-IGPL.
Log. J. IGPL, 2017

The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services.
Proceedings of the 26th International Conference on World Wide Web, 2017

Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies.
Proceedings of the 26th USENIX Security Symposium, 2017

Sentiment analysis using convolutional neural network with fastText embeddings.
Proceedings of the IEEE Latin American Conference on Computational Intelligence, 2017

2016
Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering.
Knowl. Based Syst., 2016

Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016

Static analysis: a brief survey.
Log. J. IGPL, 2016

Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.
Log. J. IGPL, 2016

Data Is Flowing in the Wind: A Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Epidemic model for malware targeting telephony networks.
Proceedings of the 23rd International Conference on Telecommunications, 2016

RAMBO: Run-Time Packer Analysis with Multiple Branch Observation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Using Dalvik Opcodes for Malware Detection on Android.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

Tracking Users Like There is No Tomorrow: Privacy on the Current Internet.
Proceedings of the International Joint Conference, 2015

The Evolution of Permission as Feature for Android Malware Detection.
Proceedings of the International Joint Conference, 2015

2014
Procedural approach to volumetric terrain generation.
Vis. Comput., 2014

Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

On the adoption of anomaly detection for packed executable filtering.
Comput. Secur., 2014

Anomalous User Comment Detection in Social News Websites.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

An Empirical Study on Word Sense Disambiguation for Adult Content Filtering.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A Survey on Static Analysis and Model Checking.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Procedural Playable Cave Systems Based on Voronoi Diagram and Delaunay Triangulation.
Proceedings of the 2014 International Conference on Cyberworlds, 2014

2013
Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013

Reversing the effects of tokenisation attacks against content-based spam filters.
Int. J. Secur. Networks, 2013

Collective classification for spam filtering.
Log. J. IGPL, 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

NOA: An Information Retrieval Based Malware Detection System.
Comput. Informatics, 2013

Social News Website Moderation through Semi-supervised Troll User Filtering.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Twitter Content-Based Spam Filtering.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

Filtering Trolling Comments through Collective Classification.
Proceedings of the Network and System Security - 7th International Conference, 2013

MADS: Malicious Android Applications Detection through String Analysis.
Proceedings of the Network and System Security - 7th International Conference, 2013

JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Automatic categorisation of comments in social news websites.
Expert Syst. Appl., 2012

Enhanced Topic-based Vector Space Model for semantics-aware spam filtering.
Expert Syst. Appl., 2012

Word sense disambiguation for spam filtering.
Electron. Commer. Res. Appl., 2012

PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Adult Content Filtering through Compression-Based Text Classification.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

C&C Techniques in Botnet Development.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries.
Proceedings of the Database and Expert Systems Applications, 2012

Supervised classification of packets coming from a HTTP botnet.
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Using opcode sequences in single-class learning to detect unknown malware.
IET Inf. Secur., 2011

Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Collective Classification for Unknown Malware Detection.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Semi-supervised learning for packed executable detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Structuring E-Brainstorming to Better Support Innovation Processes.
Proceedings of the Social Innovation and Social Media, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Challenges and Limitations in Current Botnet Detection.
Proceedings of the 2011 Database and Expert Systems Applications, 2011

Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011

Semi-supervised Learning for Unknown Malware Detection.
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011

Structural Feature Based Anomaly Detection for Packed Executable Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Opcode-Sequence-Based Semi-supervised Unknown Malware Detection.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Boosting Scalability in Anomaly-Based Packed Executable Filtering.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011

2010
Data Leak Prevention through Named Entity Recognition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Automatic Behaviour-based Analysis and Classification System for Malware Detection.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 2, AIDSS, Funchal, Madeira, Portugal, June 8, 2010

Idea: Opcode-Sequence-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Enhanced Foundry Production Control.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Automatic Morphological Categorisation of Carbon Black Nano-aggregates.
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010

2009
Optimising Machine-Learning-Based Fault Prediction in Foundry Production.
Proceedings of the Distributed Computing, 2009

Mechanical properties prediction in high-precision foundry production.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

N-grams-based File Signatures for Malware Detection.
Proceedings of the ICEIS 2009, 2009

2008
SME Maturity, Requirement for Interoperability.
Proceedings of the Enterprise Interoperability III, 2008

Tutorial 4: Adopting SOA.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008


  Loading...