[go: up one dir, main page]

Follow
pedro GARCIA TEODORO
pedro GARCIA TEODORO
Verified email at go.ugr.es - Homepage
Title
Cited by
Cited by
Year
Anomaly-based network intrusion detection: Techniques, systems and challenges
P Garcia-Teodoro, J Diaz-Verdejo, G Maciá-Fernández, E Vázquez
computers & security 28 (1-2), 18-28, 2009
27962009
Comunicaciones y redes de computadoras. 7
W Stallings
Pearson Educación. SA, 2004
11892004
UGR ‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs
G Maciá-Fernández, J Camacho, R Magán-Carrión, P García-Teodoro, ...
Computers & Security 73, 411-424, 2018
3212018
Anomaly detection methods in wired networks: a survey and taxonomy
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
Computer Communications 27 (16), 1569-1584, 2004
3002004
R-Locker: Thwarting ransomware action through a honeyfile-based approach
JA Gómez-Hernández, L Álvarez-González, P García-Teodoro
Computers & Security 73, 389-398, 2018
2062018
PCA-based multivariate statistical network monitoring for anomaly detection
J Camacho, A Pérez-Villegas, P García-Teodoro, G Maciá-Fernández
Computers & Security 59, 118-137, 2016
1902016
Survey and taxonomy of botnet research through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013
1782013
Measuring normality in HTTP traffic for anomaly-based intrusion detection
JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo
Computer Networks 45 (2), 175-193, 2004
1172004
Detection of web-based attacks through Markovian protocol parsing
JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo
10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005
1052005
Stochastic protocol modeling for anomaly based network intrusion detection
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003
1022003
Tackling the big data 4 vs for anomaly detection
J Camacho, G Macia-Fernandez, J Diaz-Verdejo, P Garcia-Teodoro
2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014
962014
Mathematical model for low-rate DoS attacks against application servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro
IEEE Transactions on Information Forensics and Security 4 (3), 519-529, 2009
832009
Evaluation of a low-rate DoS attack against iterative servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro
Computer Networks 51 (4), 1013-1030, 2007
672007
A novel zero-trust network access control scheme based on the security profile of devices and users
P García-Teodoro, J Camacho, G Maciá-Fernández, ...
Computer networks 212, 109068, 2022
642022
Optimal relay placement in multi-hop wireless networks
R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro
Ad Hoc Networks 46, 23-36, 2016
562016
Evaluation of a low-rate DoS attack against application servers
G Macia-Fernandez, JE Díaz-Verdejo, P Garcia-Teodoro
computers & security 27 (7-8), 335-354, 2008
522008
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
L Sánchez-Casado, G Macia-Fernandez, P Garcia-Teodoro, ...
Computer Networks 87, 44-58, 2015
502015
LoRDAS: A low-rate DoS attack against application servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro, ...
International Workshop on Critical Information Infrastructures Security, 197-209, 2007
492007
Crypto-ransomware: A revision of the state of the art, advances and challenges
JA Gómez Hernández, P García Teodoro, R Magán Carrión, ...
Electronics 12 (21), 4494, 2023
392023
A Dynamical Relay node placement solution for MANETs
R Magan-Carrion, J Camacho, P Garcia-Teodoro, EF Flushing, ...
Computer Communications 114, 36-50, 2017
382017
The system can't perform the operation now. Try again later.
Articles 1–20