| Anomaly-based network intrusion detection: Techniques, systems and challenges P Garcia-Teodoro, J Diaz-Verdejo, G Maciá-Fernández, E Vázquez computers & security 28 (1-2), 18-28, 2009 | 2796 | 2009 |
| Comunicaciones y redes de computadoras. 7 W Stallings Pearson Educación. SA, 2004 | 1189 | 2004 |
| UGR ‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs G Maciá-Fernández, J Camacho, R Magán-Carrión, P García-Teodoro, ... Computers & Security 73, 411-424, 2018 | 321 | 2018 |
| Anomaly detection methods in wired networks: a survey and taxonomy JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo Computer Communications 27 (16), 1569-1584, 2004 | 300 | 2004 |
| R-Locker: Thwarting ransomware action through a honeyfile-based approach JA Gómez-Hernández, L Álvarez-González, P García-Teodoro Computers & Security 73, 389-398, 2018 | 206 | 2018 |
| PCA-based multivariate statistical network monitoring for anomaly detection J Camacho, A Pérez-Villegas, P García-Teodoro, G Maciá-Fernández Computers & Security 59, 118-137, 2016 | 190 | 2016 |
| Survey and taxonomy of botnet research through life-cycle RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013 | 178 | 2013 |
| Measuring normality in HTTP traffic for anomaly-based intrusion detection JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo Computer Networks 45 (2), 175-193, 2004 | 117 | 2004 |
| Detection of web-based attacks through Markovian protocol parsing JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo 10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005 | 105 | 2005 |
| Stochastic protocol modeling for anomaly based network intrusion detection JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003 | 102 | 2003 |
| Tackling the big data 4 vs for anomaly detection J Camacho, G Macia-Fernandez, J Diaz-Verdejo, P Garcia-Teodoro 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014 | 96 | 2014 |
| Mathematical model for low-rate DoS attacks against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro IEEE Transactions on Information Forensics and Security 4 (3), 519-529, 2009 | 83 | 2009 |
| Evaluation of a low-rate DoS attack against iterative servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro Computer Networks 51 (4), 1013-1030, 2007 | 67 | 2007 |
| A novel zero-trust network access control scheme based on the security profile of devices and users P García-Teodoro, J Camacho, G Maciá-Fernández, ... Computer networks 212, 109068, 2022 | 64 | 2022 |
| Optimal relay placement in multi-hop wireless networks R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro Ad Hoc Networks 46, 23-36, 2016 | 56 | 2016 |
| Evaluation of a low-rate DoS attack against application servers G Macia-Fernandez, JE Díaz-Verdejo, P Garcia-Teodoro computers & security 27 (7-8), 335-354, 2008 | 52 | 2008 |
| A model of data forwarding in MANETs for lightweight detection of malicious packet dropping L Sánchez-Casado, G Macia-Fernandez, P Garcia-Teodoro, ... Computer Networks 87, 44-58, 2015 | 50 | 2015 |
| LoRDAS: A low-rate DoS attack against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro, ... International Workshop on Critical Information Infrastructures Security, 197-209, 2007 | 49 | 2007 |
| Crypto-ransomware: A revision of the state of the art, advances and challenges JA Gómez Hernández, P García Teodoro, R Magán Carrión, ... Electronics 12 (21), 4494, 2023 | 39 | 2023 |
| A Dynamical Relay node placement solution for MANETs R Magan-Carrion, J Camacho, P Garcia-Teodoro, EF Flushing, ... Computer Communications 114, 36-50, 2017 | 38 | 2017 |