David Espes
Orcid: 0000-0003-3445-947X
According to our database1,
David Espes
authored at least 55 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
1
1
1
2
1
1
1
5
6
2
2
7
3
3
4
7
2
1
3
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platforms.
Future Gener. Comput. Syst., 2025
2024
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems.
J. Univers. Comput. Sci., 2024
IDS-DEEP: a strategy for selecting the best IDS for Drones with heterogeneous EmbEdded Platforms.
Proceedings of the 36th IEEE International Symposium on Computer Architecture and High Performance Computing, 2024
Supervised models for detecting GPS attacks and faults in UAVs: a comparative analysis.
Proceedings of the Latin American Robotics Symposium, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Experimental Approach for IR-UWB Radar-Based People Detection in Industry 4.0 Environments.
Proceedings of the 32nd European Signal Processing Conference, 2024
SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Future Gener. Comput. Syst., August, 2023
Explainability-based Metrics to Help Cyber Operators Find and Correct Misclassified Cyberattacks.
SAFE@CoNEXT, 2023
Proceedings of the 14th International Conference on Network of the Future, 2023
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
Ontology-based Solution for Handling Safety and Cybersecurity Interdependency in NFV Safety Architecture.
Proceedings of the 14th International Conference on Ambient Systems, 2023
2022
Sensors, 2022
Int. J. Secur. Networks, 2022
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Token-based authentication and access delegation for HW-accelerated telco cloud solution.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
2021
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021
Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
2020
Proceedings of the 11th International Conference on Network of the Future, 2020
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
Proceedings of the European Conference on Networks and Communications, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Low-Cost High-Tech Robotics for Ambient Assisted Living: From Experiments to a Methodology.
J. Intell. Syst., 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the 7th International Conference on Ambient Systems, 2016
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
A cross-layer MAC and routing protocol based on slotted aloha for wireless sensor networks.
Ann. des Télécommunications, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
2013
New Method for Localization and Human Being Detection using UWB Technology: Helpful Solution for Rescue Robots.
CoRR, 2013
2009
Delay and Bandwidth Constrained Routing with Throughput Optimization in TDMA-Based MANETs.
Proceedings of the NTMS 2009, 2009
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Component Based Methodology for QoS-Aware Network Design.
Proceedings of the ICSOFT 2007, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
2006
Backbone-based location-aided routing algorithm to reduce control packets of AODV protocol.
Proceedings of the 3rd international conference on Mobile technology, 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006