Pedro García-Teodoro

Orcid: 0000-0001-6766-1936

According to our database1, Pedro García-Teodoro authored at least 78 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems.
Sensors, January, 2024

2022
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker.
IET Inf. Secur., 2022

Multi-labeling of complex, multi-behavioral malware samples.
Comput. Secur., 2022

A novel zero-trust network access control scheme based on the security profile of devices and users.
Comput. Networks, 2022

2021
Unveiling the I2P web structure: A connectivity analysis.
Comput. Networks, 2021

ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices.
IEEE Access, 2021

AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Monitoring Android Communications for Security.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2019
Blockchain-based forensic system for collection and preservation of network service evidences.
Digit. Investig., 2019

Group-Wise Principal Component Analysis for Exploratory Intrusion Detection.
IEEE Access, 2019

2018
Anomaly-based exploratory analysis and detection of exploits in android mediaserver.
IET Inf. Secur., 2018

UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs.
Comput. Secur., 2018

R-Locker: Thwarting ransomware action through a honeyfile-based approach.
Comput. Secur., 2018

2017
ADroid: anomaly-based detection of malicious events in Android platforms.
Int. J. Inf. Sec., 2017

A Dynamical Relay node placement solution for MANETs.
Comput. Commun., 2017

Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2016
PCA-based multivariate statistical network monitoring for anomaly detection.
Comput. Secur., 2016

Optimal relay placement in multi-hop wireless networks.
Ad Hoc Networks, 2016

Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

DRNS: Dynamical Relay Node Placement Solution.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

2015
Identification of contamination zones for sinkhole detection in MANETs.
J. Netw. Comput. Appl., 2015

Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Analysis and modelling of resources shared in the BitTorrent network.
Trans. Emerg. Telecommun. Technol., 2015

Automatic generation of HTTP intrusion signatures by selective identification of anomalies.
Comput. Secur., 2015

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping.
Comput. Networks, 2015

2014
Resource monitoring for the detection of parasite P2P botnets.
Comput. Networks, 2014

A Multiagent Self-healing System against Security Incidents in MANETs.
Proceedings of the Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection, 2014

Tackling the Big Data 4 vs for anomaly detection.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Novel Collaborative Approach for Sinkhole Detection in MANETs.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies.
J. Commun., 2013

Survey and taxonomy of botnet research through life-cycle.
ACM Comput. Surv., 2013

A generalizable dynamic flow pairing method for traffic classification.
Comput. Networks, 2013

A Security Response Approach Based on the Deployment of Mobile Agents: A Practical Vision.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013

A Security Response Approach Based on the Deployment of Mobile Agents.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013

Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Segmental parameterisation and statistical modelling of e-mail headers for spam detection.
Inf. Sci., 2012

An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Analysis of Botnets through Life-cycle.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Multiple Vector Classification for P2P Traffic Identification.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

2010
Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Fraud in roaming scenarios: an overview.
IEEE Wirel. Commun., 2009

Mathematical model for low-rate DoS attacks against application servers.
IEEE Trans. Inf. Forensics Secur., 2009

Anomaly-based network intrusion detection: Techniques, systems and challenges.
Comput. Secur., 2009

Anomaly Detection in P2P Networks Using Markov Modelling.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

Environmental Security in P2P Networks.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Evaluation of a low-rate DoS attack against application servers.
Comput. Secur., 2008

2007
Evaluation of a low-rate DoS attack against iterative servers.
Comput. Networks, 2007

A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007

LoRDAS: A Low-Rate DoS Attack against Application Servers.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Low Rate DoS Attack to Monoprocess Servers.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Proceedings of the SECRYPT 2006, 2006

Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
Proceedings of the Computer Security, 2006

Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Detection of Web-Based Attacks through Markovian Protocol Parsing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Anomaly detection methods in wired networks: a survey and taxonomy.
Comput. Commun., 2004

Measuring normality in HTTP traffic for anomaly-based intrusion detection.
Comput. Networks, 2004

N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer.
Proceedings of the Computational Science and Its Applications, 2004

2003
NSDF: a computer network system description framework and its application to network security.
Comput. Networks, 2003

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

2000
Different confidence measures for word verification in speech recognition.
Speech Commun., 2000

1999
A transcription-based approach to determine the difficulty of a speech recognition task.
IEEE Trans. Speech Audio Process., 1999

A new word-confidence threshold technique to enhance the performance of spoken dialogue systems.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

1998
Speech recognitíon and the new technologies in conununication: a continuous speech recognition-based switchboard with an answering module for e-mailing voice messages.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998

On the comparison of speech recognition tasks.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998

Word verification using confidence measures in speech recognition.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

1997
Discriminative feature extraction for speech recognition in noise.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

STACC: an automatic service for information access using continuous speech recognition through telephone line.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

A voice activated dialogue system for fast-food restaurant applications.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

On the influence of frame-asynchronous grammar scoring in a CSR system.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
Generating matrices for the discrete sine transforms.
IEEE Trans. Signal Process., 1996

Discriminative codebook design using multiple vector quantization in HMM-based speech recognizers.
IEEE Trans. Speech Audio Process., 1996

1995
Diagonalizing properties of the discrete cosine transforms.
IEEE Trans. Signal Process., 1995

1994
Multiple VQ hidden Markov modelling for speech recognition.
Speech Commun., 1994

SLHMM: a continuous speech recognition system based on Alphanet-HMM.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1991
Entropic training for HMM speech recognition.
Proceedings of the Second European Conference on Speech Communication and Technology, 1991


  Loading...