Jesús Esteban Díaz Verdejo

Orcid: 0000-0002-8424-9932

According to our database1, Jesús Esteban Díaz Verdejo authored at least 66 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection.
J. Univers. Comput. Sci., 2024

InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Insights into anomaly-based intrusion detection systems usability. A case study using real http requests.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

2023
Smart home anomaly-based IDS: Architecture proposal and case study.
Internet Things, July, 2023

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges.
Comput. Secur., 2023

HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2020
A methodology for conducting efficient sanitization of HTTP training datasets.
Future Gener. Comput. Syst., 2020

How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection.
IEEE Access, 2020

2019
Fusing information from tickets and alerts to improve the incident resolution process.
Inf. Fusion, 2019

Network Traffic Classification based on Class Weight based K-NN Classifier (CWK-NN).
Proceedings of the 2nd International Conference on Big Data and Cyber-Security Intelligence, 2019

2016
A Model for Incident Tickets Correlation in Network Management.
J. Netw. Syst. Manag., 2016

2015
Network traffic application identification based on message size analysis.
J. Netw. Comput. Appl., 2015

Automatic generation of HTTP intrusion signatures by selective identification of anomalies.
Comput. Secur., 2015

2014
A multilevel taxonomy and requirements for an optimal traffic-classification model.
Int. J. Netw. Manag., 2014

Tackling the Big Data 4 vs for anomaly detection.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2013
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013

Performance of OpenDPI in Identifying Sampled Network Traffic.
J. Networks, 2013

A model-based survey of alert correlation techniques.
Comput. Networks, 2013

A generalizable dynamic flow pairing method for traffic classification.
Comput. Networks, 2013

2012
Segmental parameterisation and statistical modelling of e-mail headers for spam detection.
Inf. Sci., 2012

2011
Multiple Vector Classification for P2P Traffic Identification.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

Performance of OpenDPI to Identify Truncated Network Traffic.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

2010
Defense techniques for low-rate DoS attacks against application servers.
Comput. Networks, 2010

Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Fraud in roaming scenarios: an overview.
IEEE Wirel. Commun., 2009

Mathematical model for low-rate DoS attacks against application servers.
IEEE Trans. Inf. Forensics Secur., 2009

Anomaly-based network intrusion detection: Techniques, systems and challenges.
Comput. Secur., 2009

Anomaly Detection in P2P Networks Using Markov Modelling.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

Environmental Security in P2P Networks.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Evaluation of a low-rate DoS attack against application servers.
Comput. Secur., 2008

2007
Evaluation of a low-rate DoS attack against iterative servers.
Comput. Networks, 2007

Features Extraction for Music Notes Recognition using Hidden Markov Models.
Proceedings of the SIGMAP 2007, 2007

A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007

LoRDAS: A Low-Rate DoS Attack against Application Servers.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Low Rate DoS Attack to Monoprocess Servers.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Proceedings of the SECRYPT 2006, 2006

Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
Proceedings of the Computer Security, 2006

Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
PIM-DM Cost Analysis in Loop Free Topologies.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Detection of Web-Based Attacks through Markovian Protocol Parsing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Anomaly detection methods in wired networks: a survey and taxonomy.
Comput. Commun., 2004

Measuring normality in HTTP traffic for anomaly-based intrusion detection.
Comput. Networks, 2004

N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer.
Proceedings of the Computational Science and Its Applications, 2004

2003
NSDF: a computer network system description framework and its application to network security.
Comput. Networks, 2003

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Musical Style Recognition by Detection of Compass.
Proceedings of the Pattern Recognition and Image Analysis, First Iberian Conference, 2003

2002
Validación de un Sistema de Diálogo Mediante el uso de diferentes umbrales de poda en el proceso de reconocimiento automático de voz.
Proces. del Leng. Natural, 2002

2000
Evaluation of a Dialogue System Based on a Generic Model that Combines Robust Speech Understanding and Mixed-initiative Control.
Proceedings of the Second International Conference on Language Resources and Evaluation, 2000

1999
A transcription-based approach to determine the difficulty of a speech recognition task.
IEEE Trans. Speech Audio Process., 1999

1998
ALBAYZIN: a task-oriented spanish speech corpus.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998

Speech recognitíon and the new technologies in conununication: a continuous speech recognition-based switchboard with an answering module for e-mailing voice messages.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998

On the comparison of speech recognition tasks.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998

Word verification using confidence measures in speech recognition.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

1997
STACC: an automatic service for information access using continuous speech recognition through telephone line.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

A voice activated dialogue system for fast-food restaurant applications.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

On the influence of frame-asynchronous grammar scoring in a CSR system.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
An application of minimum classification error to feature space transformations for speech recognition.
Speech Commun., 1996

1995
MCE estimation of VQ parameters for MVQHMM speech recognition.
Proceedings of the Fourth European Conference on Speech Communication and Technology, 1995

1994
SLHMM: a continuous speech recognition system based on Alphanet-HMM.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
A new neuron model for an Alphanet-semicontinuous HMM.
Proceedings of the IEEE International Conference on Acoustics, 1993

1991
Recurrent Neural Networks for Speech Recognition.
Proceedings of the Artificial Neural Networks, 1991

Entropic training for HMM speech recognition.
Proceedings of the Second European Conference on Speech Communication and Technology, 1991


  Loading...