Pablo García Bringas
Orcid: 0000-0003-3594-9534
According to our database1,
Pablo García Bringas
authored at least 123 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Neurocomputing, January, 2024
2023
A novel Out-of-Distribution detection approach for Spiking Neural Networks: Design, fusion, performance evaluation and explainability.
Inf. Fusion, December, 2023
Let's do it right the first time: Survey on security concerns in the way to quantum software engineering.
Neurocomputing, June, 2023
CoRR, 2023
IEEE Access, 2023
A New Fractional Reduced-Order Model-Inspired System Identification Method for Dynamical Systems.
IEEE Access, 2023
Efficient Object Detection in Autonomous Driving using Spiking Neural Networks: Performance, Energy Consumption Analysis, and Insights into Open-set Object Discovery.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023
Supporting Emotion Recognition in Human-Robot Interactions: An Experimental Italian Textual Dataset.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023
Improving the Quality of Quantum Services Generation Process: Controlling Errors and Noise.
Proceedings of the Hybrid Artificial Intelligent Systems - 18th International Conference, 2023
A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic Spaces.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
2022
A Novel Explainable Out-of-Distribution Detection Approach for Spiking Neural Networks.
CoRR, 2022
Proceedings of the Hybrid Artificial Intelligent Systems - 17th International Conference, 2022
CORE-BCD-mAI: A Composite Framework for Representing, Querying, and Analyzing Big Clinical Data by Means of Multidimensional AI Tools.
Proceedings of the Hybrid Artificial Intelligent Systems - 17th International Conference, 2022
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022
2021
Neurocomputing, 2021
Quality assessment methodology based on machine learning with small datasets: Industrial castings defects.
Neurocomputing, 2021
Optimizing Communication Data Streams in Edge Computing Systems Using Bayesian Algorithms.
Proceedings of the 16th International Conference on Soft Computing Models in Industrial and Environmental Applications, 2021
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Hybrid Deep Learning Approach for Efficient Outdoor Parking Monitoring in Smart Cities.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Financial Forecasting via Deep-Learning and Machine-Learning Tools over Two-Dimensional Objects Transformed from Time Series.
Proceedings of the Hybrid Artificial Intelligent Systems - 16th International Conference, 2021
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021
A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021
2020
A Real Time Vision System Based on Deep Learning for Gesture Based Human Machine Interaction.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020
Effective Bin Picking Approach by Combining Deep Learning and Point Cloud Processing Techniques.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020
2019
Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019
Proceedings of the 9th International Conference on the Internet of Things, 2019
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019
Can BlockChain Technology Provide Information Systems with Trusted Database? The Case of HyperLedger Fabric.
Proceedings of the Flexible Query Answering Systems - 13th International Conference, 2019
2018
Special issue SOCO 2014: Recent advancements in soft computing and its application in industrial and environmental problems.
Neurocomputing, 2018
2017
The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017
2016
Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016
Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying.
Log. J. IGPL, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Combined special issue SOCO 2012-2013: Recent advancements in soft computing and its application in industrial and environmental problems.
Neurocomputing, 2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015
Proceedings of the 3rd ACM Symposium on Spatial User Interaction, 2015
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE International Symposium on Mixed and Augmented Reality, 2015
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the International Joint Conference, 2015
2014
Comput. Secur., 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Procedural Playable Cave Systems Based on Voronoi Diagram and Delaunay Triangulation.
Proceedings of the 2014 International Conference on Cyberworlds, 2014
2013
Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013
Int. J. Secur. Networks, 2013
Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013
Comput. Informatics, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE Global Engineering Education Conference, 2013
Proceedings of the 2013 International Conference on Cyberworlds, 2013
JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
Expert Syst. Appl., 2012
Expert Syst. Appl., 2012
Service Authentication via Electronic Identification Cards: VoIP Service Authentication through the DNIe.
Proceedings of the 2012 Annual SRII Global Conference, San Jose, CA, USA, July 24-27, 2012, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries.
Proceedings of the Database and Expert Systems Applications, 2012
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012
Towards a more efficient and personalised advertisement content in on-line social networks.
Proceedings of the 5th Ph.D. Workshop on Information and Knowledge Management, 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
IET Inf. Secur., 2011
An efficient Security Solution for Dealing with Shortened URL Analysis.
Proceedings of the WOSIS 2011, 2011
Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Collective Classification for Unknown Malware Detection.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Network Planning of a VoIP-cable PBX - The Use of Data Profiling Techniques for an Efficient Network Planning.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011
Proceedings of the 2011 Database and Expert Systems Applications, 2011
Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the 8th Annual Collaboration, 2011
2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Automatic Behaviour-based Analysis and Classification System for Malware Detection.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 2, AIDSS, Funchal, Madeira, Portugal, June 8, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Database and Expert Systems Applications, 2010
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010
Proceedings of the Database and Expert Systems Applications, 21th International Conference, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
2009
Proceedings of the Distributed Computing, 2009
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009
N-grams-based File Signatures for Malware Detection.
Proceedings of the ICEIS 2009, 2009
2008
Bayesian-Networks-Based Misuse and Anomaly Prevention System.
Proceedings of the ICEIS 2008, 2008
Proceedings of the Enterprise Information Systems, 10th International Conference, 2008
Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, 2008
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008
2007
Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007