Gabriel Maciá-Fernández
Orcid: 0000-0001-9256-453XAffiliations:
- University of Granada, Spain
According to our database1,
Gabriel Maciá-Fernández
authored at least 59 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dtstc.ugr.es
On csauthors.net:
Bibliography
2024
HoDiNT: Distributed architecture for collection and analysis of Internet Background Radiation.
Comput. Networks, 2024
2022
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection.
IEEE/ACM Trans. Netw., 2022
A novel zero-trust network access control scheme based on the security profile of devices and users.
Comput. Networks, 2022
Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022
2021
ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices.
IEEE Access, 2021
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
2020
Multivariate Statistical Network Monitoring-Sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems.
Int. J. Distributed Sens. Networks, 2020
2019
Semi-Supervised Multivariate Statistical Network Monitoring for Learning Security Threats.
IEEE Trans. Inf. Forensics Secur., 2019
Fusing information from tickets and alerts to improve the incident resolution process.
Inf. Fusion, 2019
Blockchain-based forensic system for collection and preservation of network service evidences.
Digit. Investig., 2019
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle.
Comput. Secur., 2019
IEEE Access, 2019
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
2018
Comput. Secur., 2018
2017
Network-wide intrusion detection supported by multivariate analysis and interactive visualization.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
2016
J. Netw. Syst. Manag., 2016
Comput. Secur., 2016
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
2015
J. Netw. Comput. Appl., 2015
Trans. Emerg. Telecommun. Technol., 2015
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping.
Comput. Networks, 2015
2014
Comput. Networks, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013
On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
Extracting user web browsing patterns from non-content network traces: The online advertising case study.
Comput. Networks, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Analysis of Botnets through Life-cycle.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
Comput. Networks, 2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the Next Generation Internet (NGI), 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Comput. Secur., 2009
Proceedings of the First International Conference on Advances in P2P Systems, 2009
2008
Comput. Secur., 2008
2007
Comput. Networks, 2007
A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Proceedings of the SECRYPT 2006, 2006
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Computer Security, 2006
2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005