Roberto Magán-Carrión

Orcid: 0000-0002-7744-7308

According to our database1, Roberto Magán-Carrión authored at least 24 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems.
Sensors, January, 2024

2023
Exploring Hidden Anomalies in UGR'16 Network Dataset with Kitsune.
Proceedings of the Flexible Query Answering Systems - 15th International Conference, 2023

2022
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration.
IEEE Trans. Emerg. Top. Comput., 2022

Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study.
J. Inf. Secur. Appl., 2022

A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022

2021
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring.
J. Inf. Secur. Appl., 2021

Unveiling the I2P web structure: A connectivity analysis.
Comput. Networks, 2021

Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs.
Proceedings of the 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021

2020
Multivariate Statistical Network Monitoring-Sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems.
Int. J. Distributed Sens. Networks, 2020

A Distributed Digital Object Architecture to Support Secure IoT Ecosystems.
Proceedings of the Optimization and Learning - Third International Conference, 2020

2019
MSNM-S: An Applied Network Monitoring Tool for Anomaly Detection in Complex Networks and Systems.
CoRR, 2019

2018
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs.
Comput. Secur., 2018

On the Way of Protecting MANETs Against Security Threats: A Proactive Approach.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, 2018

2017
A Dynamical Relay node placement solution for MANETs.
Comput. Commun., 2017

Network-wide intrusion detection supported by multivariate analysis and interactive visualization.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

2016
Optimal relay placement in multi-hop wireless networks.
Ad Hoc Networks, 2016

DRNS: Dynamical Relay Node Placement Solution.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

2015
Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping.
Comput. Networks, 2015

2014
A Multiagent Self-healing System against Security Incidents in MANETs.
Proceedings of the Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection, 2014

2013
Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies.
J. Commun., 2013

NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

A Security Response Approach Based on the Deployment of Mobile Agents: A Practical Vision.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013

A Security Response Approach Based on the Deployment of Mobile Agents.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013


  Loading...