Pedro Malagón

Orcid: 0000-0002-8167-508X

According to our database1, Pedro Malagón authored at least 42 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Constant Multiplier FFT.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications.
Simul. Model. Pract. Theory, 2020

An FPGA Based Tracking Implementation for Parkinson's Patients.
Sensors, 2020

Toward hardware-accelerated QoS-aware 5G network slicing based on data plane programmability.
Trans. Emerg. Telecommun. Technol., 2020

CACHE SNIPER : Accurate timing control of cache evictions.
CoRR, 2020

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Microarchitectural Isolation Guarantees Through Execution Based Signatures.
Proceedings of the XXXV Conference on Design of Circuits and Integrated Systems, 2020

2019
Design and Evaluation of a Heuristic Optimization Tool Based on Evolutionary Grammars Using PSoCs.
Proceedings of the Artificial Life and Evolutionary Computation - 14th Italian Workshop, 2019

Anomaly Detection Using Gaussian Mixture Probability Model to Implement Intrusion Detection System.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019

NetFPGA-Based Firewall Solution for 5G Multi-Tenant Architectures.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019

P4-NetFPGA-based network slicing solution for 5G MEC architectures.
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019

2018
Towards an FPGA-Accelerated programmable data path for edge-to-core communications in 5G networks.
J. Netw. Comput. Appl., 2018

Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms.
Proceedings of the 28th International Symposium on Power and Timing Modeling, 2018

Applying Cost-Sensitive Classifiers with Reinforcement Learning to IDS.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

Hardware-Accelerated Firewall for 5G Mobile Networks.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

Tuning CNN Input Layout for IDS with Genetic Algorithms.
Proceedings of the Hybrid Artificial Intelligent Systems - 13th International Conference, 2018

CacheShield: Detecting Cache Attacks through Self-Observation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
CacheShield: Protecting Legacy Processes Against Cache Attacks.
CoRR, 2017

Building accurate models to determine the current CPU utilization of a host within a virtual machine allocated on it.
Proceedings of the Summer Simulation Multi-Conference, 2017

2016
Real-time hardware/software co-design using devs-based transparent M&S framework.
Proceedings of the Summer Computer Simulation Conference, 2016

Modeling side-channel cache attacks on AES.
Proceedings of the Summer Computer Simulation Conference, 2016

2015
Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres.
Log. J. IGPL, 2015

Bitslice software implementation of KeeLoq as a side-channel countermeasure.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

2013
Bio-inspired enhancement of reputation systems for intelligent environments.
Inf. Sci., 2013

2012
Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices.
Sensors, 2012

Using clustering techniques for intelligent camera-based user interfaces.
Log. J. IGPL, 2012

2011
Improving security in WMNs with reputation systems and self-organizing maps.
J. Netw. Comput. Appl., 2011

Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Image Processing Algorithms for AAL Services.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

RFID Performance in Localization Systems.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

2010
Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches.
Proceedings of the International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, 2010

Detecting and Confining Sybil Attack in Wireless Sensor Networks Based on Reputation Systems Coupled with Self-organizing Maps.
Proceedings of the Artificial Intelligence Applications and Innovations, 2010

Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces.
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010

Eliminating routing protocol anomalies in wireless sensor networks using AI techniques.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Sensors, 2009

A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Image Processing Based Services for Ambient Assistant Scenarios.
Proceedings of the Distributed Computing, 2009

Analysis and Design of an Object Tracking Service for Intelligent Environments.
Proceedings of the Distributed Computing, 2009

Modular Framework for Smart Home Applications.
Proceedings of the Distributed Computing, 2009

SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems.
Proceedings of the Reconfigurable Computing: Architectures, 2009

2007
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor.
Proceedings of the First International Conference on Emerging Security Information, 2007


  Loading...