Javier Nieves

According to our database1, Javier Nieves authored at least 18 papers between 2009 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Negobot: Detecting paedophile activity with a conversational agent based on game theory.
Log. J. IGPL, 2015

2014
Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

An Empirical Study on Word Sense Disambiguation for Adult Content Filtering.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

MADS: Malicious Android Applications Detection through String Analysis.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries.
Proceedings of the Database and Expert Systems Applications, 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011

Semi-supervised Learning for Unknown Malware Detection.
Proceedings of the International Symposium on Distributed Computing and Artificial Intelligence, 2011

2010
Data Leak Prevention through Named Entity Recognition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Idea: Opcode-Sequence-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Recognizing Banknote Patterns for Protecting Economic Transactions.
Proceedings of the Database and Expert Systems Applications, 2010

Enhanced Foundry Production Control.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

2009
Optimising Machine-Learning-Based Fault Prediction in Foundry Production.
Proceedings of the Distributed Computing, 2009

Mechanical properties prediction in high-precision foundry production.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009


  Loading...