Pablo García Bringas

Orcid: 0000-0003-3594-9534

According to our database1, Pablo García Bringas authored at least 123 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep learning applications on cybersecurity: A practical approach.
Neurocomputing, January, 2024

2023
A novel Out-of-Distribution detection approach for Spiking Neural Networks: Design, fusion, performance evaluation and explainability.
Inf. Fusion, December, 2023

Let's do it right the first time: Survey on security concerns in the way to quantum software engineering.
Neurocomputing, June, 2023

Managing the unknown: a survey on Open Set Recognition and tangential areas.
CoRR, 2023

When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs.
IEEE Access, 2023

A New Fractional Reduced-Order Model-Inspired System Identification Method for Dynamical Systems.
IEEE Access, 2023

Efficient Object Detection in Autonomous Driving using Spiking Neural Networks: Performance, Energy Consumption Analysis, and Insights into Open-set Object Discovery.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Probability Density Function for Clustering Validation.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

Assessing the Impact of Noise on Quantum Neural Networks: An Experimental Analysis.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

Supporting Emotion Recognition in Human-Robot Interactions: An Experimental Italian Textual Dataset.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

Improving the Quality of Quantum Services Generation Process: Controlling Errors and Noise.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023

A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic Spaces.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Bytecode-Based Android Malware Detection Applying Convolutional Neural Networks.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

2022
A Novel Explainable Out-of-Distribution Detection Approach for Spiking Neural Networks.
CoRR, 2022

Generalized Fisher Kernel with Bregman Divergence.
Proceedings of the Hybrid Artificial Intelligent Systems - 17th International Conference, 2022

CORE-BCD-mAI: A Composite Framework for Representing, Querying, and Analyzing Big Clinical Data by Means of Multidimensional AI Tools.
Proceedings of the Hybrid Artificial Intelligent Systems - 17th International Conference, 2022

Can Post-hoc Explanations Effectively Detect Out-of-Distribution Samples?
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

2021
Detecting malicious Android applications based on the network packets generated.
Neurocomputing, 2021

Quality assessment methodology based on machine learning with small datasets: Industrial castings defects.
Neurocomputing, 2021

Optimizing Communication Data Streams in Edge Computing Systems Using Bayesian Algorithms.
Proceedings of the 16th International Conference on Soft Computing Models in Industrial and Environmental Applications, 2021

Content-Based Authorship Identification for Short Texts in Social Media Networks.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Fight Detection in Images Using Postural Analysis.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Deep Learning Applications on Cybersecurity.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Hybrid Deep Learning Approach for Efficient Outdoor Parking Monitoring in Smart Cities.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

A Non-parametric Fisher Kernel.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

Financial Forecasting via Deep-Learning and Machine-Learning Tools over Two-Dimensional Objects Transformed from Time Series.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021

The Neverending Story: Memory Corruption 30 Years Later.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021

A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021

2020
A Real Time Vision System Based on Deep Learning for Gesture Based Human Machine Interaction.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

Effective Bin Picking Approach by Combining Deep Learning and Point Cloud Processing Techniques.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

2019
Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019

How IoT and computer vision could improve the casting quality.
Proceedings of the 9th International Conference on the Internet of Things, 2019

Network Traffic Analysis for Android Malware Detection.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019

Surface Defect Modelling Using Co-occurrence Matrix and Fast Fourier Transformation.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019

Can BlockChain Technology Provide Information Systems with Trusted Database? The Case of HyperLedger Fabric.
Proceedings of the Flexible Query Answering Systems - 13th International Conference, 2019

2018
Special issue SOCO 2014: Recent advancements in soft computing and its application in industrial and environmental problems.
Neurocomputing, 2018

2017
Special issue SOCO14-JAL.
J. Appl. Log., 2017

The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017

Motion capture systems for jump analysis.
Log. J. IGPL, 2017

Editorial: Special Issue HAIS15-IGPL.
Log. J. IGPL, 2017

2016
SPECIAL ISSUE SOCO13-JAL.
J. Appl. Log., 2016

Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016

Editorial: Special Issue CISIS13-IGPL.
Log. J. IGPL, 2016

Static analysis: a brief survey.
Log. J. IGPL, 2016

Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.
Log. J. IGPL, 2016

Editorial: Special Issue CISIS14-IGPL.
Log. J. IGPL, 2016

RAMBO: Run-Time Packer Analysis with Multiple Branch Observation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Combined special issue SOCO 2012-2013: Recent advancements in soft computing and its application in industrial and environmental problems.
Neurocomputing, 2015

Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015

OpenUIX Demo: A Sneak Peek at a Novel HCI Model for AR Systems.
Proceedings of the 3rd ACM Symposium on Spatial User Interaction, 2015

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

A Comprehensive Interaction Model for ASystems.
Proceedings of the 2015 IEEE International Symposium on Mixed and Augmented Reality, 2015

Using Dalvik Opcodes for Malware Detection on Android.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

Tracking Users Like There is No Tomorrow: Privacy on the Current Internet.
Proceedings of the International Joint Conference, 2015

The Evolution of Permission as Feature for Android Malware Detection.
Proceedings of the International Joint Conference, 2015

2014
Procedural approach to volumetric terrain generation.
Vis. Comput., 2014

Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

On the adoption of anomaly detection for packed executable filtering.
Comput. Secur., 2014

Anomalous User Comment Detection in Social News Websites.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

An Empirical Study on Word Sense Disambiguation for Adult Content Filtering.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A Survey on Static Analysis and Model Checking.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Procedural Playable Cave Systems Based on Voronoi Diagram and Delaunay Triangulation.
Proceedings of the 2014 International Conference on Cyberworlds, 2014

2013
Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013

Reversing the effects of tokenisation attacks against content-based spam filters.
Int. J. Secur. Networks, 2013

Collective classification for spam filtering.
Log. J. IGPL, 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

NOA: An Information Retrieval Based Malware Detection System.
Comput. Informatics, 2013

Social News Website Moderation through Semi-supervised Troll User Filtering.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Twitter Content-Based Spam Filtering.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

Filtering Trolling Comments through Collective Classification.
Proceedings of the Network and System Security - 7th International Conference, 2013

MADS: Malicious Android Applications Detection through String Analysis.
Proceedings of the Network and System Security - 7th International Conference, 2013

Enhancing cybersecurity learning through an augmented reality-based serious game.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Volumetric Virtual Worlds with Layered Terrain Generation.
Proceedings of the 2013 International Conference on Cyberworlds, 2013

JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Automatic categorisation of comments in social news websites.
Expert Syst. Appl., 2012

Enhanced Topic-based Vector Space Model for semantics-aware spam filtering.
Expert Syst. Appl., 2012

Word sense disambiguation for spam filtering.
Electron. Commer. Res. Appl., 2012

Service Authentication via Electronic Identification Cards: VoIP Service Authentication through the DNIe.
Proceedings of the 2012 Annual SRII Global Conference, San Jose, CA, USA, July 24-27, 2012, 2012

PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Adult Content Filtering through Compression-Based Text Classification.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

C&C Techniques in Botnet Development.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries.
Proceedings of the Database and Expert Systems Applications, 2012

Supervised classification of packets coming from a HTTP botnet.
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012

Towards a more efficient and personalised advertisement content in on-line social networks.
Proceedings of the 5th Ph.D. Workshop on Information and Knowledge Management, 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Using opcode sequences in single-class learning to detect unknown malware.
IET Inf. Secur., 2011

An efficient Security Solution for Dealing with Shortened URL Analysis.
Proceedings of the WOSIS 2011, 2011

Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Collective Classification for Unknown Malware Detection.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Semi-supervised learning for packed executable detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Network Planning of a VoIP-cable PBX - The Use of Data Profiling Techniques for an Efficient Network Planning.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

Challenges and Limitations in Current Botnet Detection.
Proceedings of the 2011 Database and Expert Systems Applications, 2011

Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011

Semi-supervised Learning for Unknown Malware Detection.
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011

Structural Feature Based Anomaly Detection for Packed Executable Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Opcode-Sequence-Based Semi-supervised Unknown Malware Detection.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Boosting Scalability in Anomaly-Based Packed Executable Filtering.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011

2010
Fraud Detection for Voice over IP Services on Next-Generation Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Data Leak Prevention through Named Entity Recognition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Automatic Behaviour-based Analysis and Classification System for Malware Detection.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 2, AIDSS, Funchal, Madeira, Portugal, June 8, 2010

Idea: Opcode-Sequence-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Recognizing Banknote Patterns for Protecting Economic Transactions.
Proceedings of the Database and Expert Systems Applications, 2010

Enhanced Foundry Production Control.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

Automatic Morphological Categorisation of Carbon Black Nano-aggregates.
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010

A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Optimising Machine-Learning-Based Fault Prediction in Foundry Production.
Proceedings of the Distributed Computing, 2009

Mechanical properties prediction in high-precision foundry production.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

N-grams-based File Signatures for Malware Detection.
Proceedings of the ICEIS 2009, 2009

2008
Bayesian-Networks-Based Misuse and Anomaly Prevention System.
Proceedings of the ICEIS 2008, 2008

Next-Generation Misuse and Anomaly Prevention System.
Proceedings of the Enterprise Information Systems, 10th International Conference, 2008

Efficient failure-free foundry production.
Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, 2008

Experiences on Designing an Integral Intrusion Detection System.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

2007
Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007


  Loading...