Sebastián García

Orcid: 0000-0001-6238-9910

According to our database1, Sebastián García authored at least 56 papers between 2012 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2026
Building adaptative and transparent cyber agents with local language models.
Expert Syst. Appl., 2026

2025
TUC-RedTeam30: A Dataset for Evaluating ML-Based Network Intrusion Detection Systems.
Dataset, June, 2025

ARACNE: An LLM-Based Autonomous Shell Pentesting Agent.
CoRR, February, 2025

Probabilistic Forecasting Framework Oriented to Distribution Networks and Microgrids.
IEEE Trans Autom. Sci. Eng., 2025

DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems.
Proceedings of the 19th USENIX WOOT Conference on Offensive Technologies, 2025

VelLMes: A High-Interaction AI-Based Deception Framework.
Proceedings of the IEEE European Symposium on Security and Privacy, 2025

2024
A Survey of Privacy Attacks in Machine Learning.
ACM Comput. Surv., April, 2024


Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments.
CoRR, 2024

Exploring Agent Behaviors in Network Security through Trajectory Clustering.
Proceedings of the Joint Proceedings of the xAI 2024 Late-breaking Work, 2024

Prompt. Exploit. Repeat: Automating Network Security Testing with LLMs.
Proceedings of the Agents and Artificial Intelligence - 16th International Conference, 2024

Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Bridging the Explanation Gap in AI Security: A Task-Driven Approach to XAI Methods Evaluation.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

LLM in the Shell: Generative Honeypots.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Trust in Shapley: A Cooperative Quest for Global Trust in P2P Network.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

Fine-tuning Large Language Models for DGA and DNS Exfiltration Detection.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
Stealing and evading malware classifiers and antivirus at low false positive conditions.
Comput. Secur., June, 2023

Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning.
CoRR, 2023

Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots.
CoRR, 2023

Towards a better labeling process for network security datasets.
CoRR, 2023

Catch Me if You Can: Improving Adversaries in Cyber-Security with Q-Learning Algorithms.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Design and Evaluation of a Heterogeneous Lightweight Blockchain-Based Marketplace.
Sensors, 2022

Entanglement: cybercrime connections of a public forum population.
J. Cybersecur., 2022

Stealing Malware Classifiers and AVs at Low False Positive Conditions.
CoRR, 2022

Entanglement: Cybercrime Connections of an Internet Marketing Forum Population.
CoRR, 2022

Fleet management systems in Logistics 4.0 era: a real time distributed and scalable architectural proposal.
Proceedings of the 4th International Conference on Industry 4.0 and Smart Manufacturing (ISM 2022), 2022

Artificial Intelligence Model to Predict the Virality of Press Articles.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Large Scale Analysis of DoH Deployment on the Internet.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
OpenADR and Agreement Audit Architecture for a Complete Cycle of a Flexibility Solution.
Sensors, 2021

Large Scale Measurement on the Adoption of Encrypted DNS.
CoRR, 2021

Current State of IPv6 Security in IoT.
CoRR, 2021

Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Disrupting Active Directory Attacks with Deep Learning for Organic Honeyuser Placement.
Proceedings of the Deep Learning Theory and Applications, 2021

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users.
Proceedings of the 2nd International Conference on Deep Learning Theory and Applications, 2021

2020
Flexibility Services Based on OpenADR Protocol for DSO Level.
Sensors, 2020

DNS Tunneling: A Deep Learning based Lexicographical Detection Approach.
CoRR, 2020

Recharging prioritization method for the integration of electric vehicle fleets with the Smart Grid: an evolutionary computation approach.
Proceedings of the Fifteenth International Conference on Ecological Vehicles and Renewable Energies, 2020

Growth and Commoditization of Remote Access Trojans.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Heterogeneous LoRa-Based Wireless Multimedia Sensor Network Multiprocessor Platform for Environmental Monitoring.
Sensors, 2019

Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Geost Botnet. Operational Security Failures of a New Android Banking Threat.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Better Infected Hosts Detection Combining Ensemble Learning and Threat Intelligence.
Proceedings of the Computer Science - CACIC 2019, 2019

2018
Collision avoidance method for multi-operator multi-robot teleoperation system.
Robotica, 2018

Analysis of Botnet behavior as a Distributed System.
Proceedings of the IV School on Systems and Networks, 2018

Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Deep Convolutional Neural Networks for DGA Detection.
Proceedings of the Computer Science - CACIC 2018, 2018

2017
Reliable Machine Learning for Networking: Key Issues and Approaches.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior.
Proceedings of the Computer Science - CACIC 2017, 2017

2016
PD-like controller with impedance for delayed bilateral teleoperation of mobile robots.
Robotica, 2016

Detecting the Behavioral Relationships of Malware Connections.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

2014
Survey on network-based botnet detection methods.
Secur. Commun. Networks, 2014

An empirical comparison of botnet detection methods.
Comput. Secur., 2014

An Empirical Study of the Robustness of Energy-Aware Schedulers for High Performance Computing Systems under Uncertainty.
Proceedings of the High Performance Computing - First HPCLATAM, 2014

2012
Teleoperation of a mobile robot with time-varying delay and force feedback.
Robotica, 2012


  Loading...