Sergio de los Santos

According to our database1, Sergio de los Santos authored at least 13 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Machine-Learning based analysis and classification of Android malware signatures.
Future Gener. Comput. Syst., 2019

User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Android Malware Pattern Recognition for Fraud Detection and Attribution: A Case Study.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Analysing HSTS and HPKP implementation in both browsers and servers.
IET Inf. Secur., 2018

Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

SignatureMiner: A Fast Anti-Virus Signature Intelligence Tool.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
On labeling Android malware signatures using minhashing and further classification with Structural Equation Models.
CoRR, 2017

Macro Malware Detection using Machine Learning Techniques - A New Approach.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Implementation State of HSTS and HPKP in Both Browsers and Servers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Chasing shuabang in apps stores.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015


  Loading...