Gabriel Maciá-Fernández

Orcid: 0000-0001-9256-453X

Affiliations:
  • University of Granada, Spain


According to our database1, Gabriel Maciá-Fernández authored at least 59 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HoDiNT: Distributed architecture for collection and analysis of Internet Background Radiation.
Comput. Networks, 2024

Collaborative credentials for the Internet of Things.
Comput. Networks, 2024

2022
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection.
IEEE/ACM Trans. Netw., 2022

A novel zero-trust network access control scheme based on the security profile of devices and users.
Comput. Networks, 2022

Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022

2021
Unveiling the I2P web structure: A connectivity analysis.
Comput. Networks, 2021

ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices.
IEEE Access, 2021

Present and Future of Network Security Monitoring.
IEEE Access, 2021

Enabling Identity for the IoT-as-a-Service Business Model.
IEEE Access, 2021

AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Monitoring Android Communications for Security.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
Multivariate Statistical Network Monitoring-Sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems.
Int. J. Distributed Sens. Networks, 2020

2019
Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats.
IEEE Trans. Inf. Forensics Secur., 2019

Fusing information from tickets and alerts to improve the incident resolution process.
Inf. Fusion, 2019

Blockchain-based forensic system for collection and preservation of network service evidences.
Digit. Investig., 2019

Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle.
Comput. Secur., 2019

Group-Wise Principal Component Analysis for Exploratory Intrusion Detection.
IEEE Access, 2019

Keynote speech 2: Cybersecurity and IoT: open challenges and perspectives.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

2018
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs.
Comput. Secur., 2018

2017
On Understanding the Existence of a Deep Torrent.
IEEE Commun. Mag., 2017

Network-wide intrusion detection supported by multivariate analysis and interactive visualization.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2016
A Model for Incident Tickets Correlation in Network Management.
J. Netw. Syst. Manag., 2016

PCA-based multivariate statistical network monitoring for anomaly detection.
Comput. Secur., 2016

Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

2015
Identification of contamination zones for sinkhole detection in MANETs.
J. Netw. Comput. Appl., 2015

Analysis and modelling of resources shared in the BitTorrent network.
Trans. Emerg. Telecommun. Technol., 2015

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping.
Comput. Networks, 2015

2014
Resource monitoring for the detection of parasite P2P botnets.
Comput. Networks, 2014

Tackling the Big Data 4 vs for anomaly detection.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Novel Collaborative Approach for Sinkhole Detection in MANETs.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

Survey and taxonomy of botnet research through life-cycle.
ACM Comput. Surv., 2013

A model-based survey of alert correlation techniques.
Comput. Networks, 2013

NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Extracting user web browsing patterns from non-content network traces: The online advertising case study.
Comput. Networks, 2012

An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Analysis of Botnets through Life-cycle.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Understanding the Network and User-Targeting Properties of Web Advertising Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Defense techniques for low-rate DoS attacks against application servers.
Comput. Networks, 2010

Analyzing content-level properties of the web adversphere.
Proceedings of the 19th International Conference on World Wide Web, 2010

Efficient multimedia transmission in wireless sensor networks.
Proceedings of the Next Generation Internet (NGI), 2010

ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Fraud in roaming scenarios: an overview.
IEEE Wirel. Commun., 2009

Mathematical model for low-rate DoS attacks against application servers.
IEEE Trans. Inf. Forensics Secur., 2009

Anomaly-based network intrusion detection: Techniques, systems and challenges.
Comput. Secur., 2009

Anomaly Detection in P2P Networks Using Markov Modelling.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Evaluation of a low-rate DoS attack against application servers.
Comput. Secur., 2008

2007
Evaluation of a low-rate DoS attack against iterative servers.
Comput. Networks, 2007

A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007

LoRDAS: A Low-Rate DoS Attack against Application Servers.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Low Rate DoS Attack to Monoprocess Servers.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Proceedings of the SECRYPT 2006, 2006

Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
Proceedings of the Computer Security, 2006

2005
PIM-DM Cost Analysis in Loop Free Topologies.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005


  Loading...