Jorge Maestre Vidal

According to our database1, Jorge Maestre Vidal authored at least 32 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge.
Future Gener. Comput. Syst., 2021

Battling against cyberattacks: towards pre-standardization of countermeasures.
Clust. Comput., 2021

A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection.
IEEE Access, 2021

The Stress as Adversarial Factor for Cyber Decision Making.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Adaptive Mitigation of Tactical Denial of Sustainability.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features.
Sensors, 2020

Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics.
Sensors, 2020

EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats.
Future Gener. Comput. Syst., 2020

Denial of sustainability on military tactical clouds.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Evaluation methodology for mission-centric cyber situational awareness capabilities.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Traffic-flow analysis for source-side DDoS recognition on 5G environments.
J. Netw. Comput. Appl., 2019

Detection of economic denial of sustainability (EDoS) threats in self-organizing networks.
Comput. Commun., 2019

Framework for Anticipatory Self-Protective 5G Environments.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Adaptive artificial immune networks for mitigating DoS flooding attacks.
Swarm Evol. Comput., 2018

A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences.
Knowl. Based Syst., 2018

Orchestration of use-case driven analytics in 5G scenarios.
J. Ambient Intell. Humaniz. Comput., 2018

Source-side DDoS Detection on IoT-enabled 5G Environments.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Reasoning and Knowledge Acquisition Framework for 5G Network Analytics.
Sensors, 2017

Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Netw. Comput. Appl., 2017

Towards Incidence Management in 5G Based on Situational Awareness.
Future Internet, 2017

Advanced Payload Analyzer Preprocessor.
Future Gener. Comput. Syst., 2017

Entropy-Based Economic Denial of Sustainability Detection.
Entropy, 2017

An Approach to Data Analysis in 5G Networks.
Entropy, 2017

2016
Online masquerade detection resistant to mimicry.
Expert Syst. Appl., 2016

2015
Network Intrusion Detection Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

2012
Concurrency Optimization for NIDS (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012


  Loading...