Xabier Ugarte-Pedrero

According to our database1, Xabier Ugarte-Pedrero authored at least 30 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
How Machine Learning Is Solving the Binary Function Similarity Problem.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
A Close Look at a Daily Dataset of Malware Samples.
ACM Trans. Priv. Secur., 2019

2017
The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017

2016
Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016

RAMBO: Run-Time Packer Analysis with Multiple Branch Observation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Tracking Users Like There is No Tomorrow: Privacy on the Current Internet.
Proceedings of the International Joint Conference, 2015

2014
Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

On the adoption of anomaly detection for packed executable filtering.
Comput. Secur., 2014

Anomalous User Comment Detection in Social News Websites.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

NOA: An Information Retrieval Based Malware Detection System.
Comput. Informatics, 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

2012
PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Supervised classification of packets coming from a HTTP botnet.
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Semi-supervised learning for packed executable detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011

Structural Feature Based Anomaly Detection for Packed Executable Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Boosting Scalability in Anomaly-Based Packed Executable Filtering.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011


  Loading...