Pablo Moriano

Orcid: 0000-0002-1822-8885

According to our database1, Pablo Moriano authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Spatiotemporal features of traffic help reduce automatic accident detection time.
Expert Syst. Appl., 2024

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning.
CoRR, 2024

Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN.
CoRR, 2024

Robustness of graph embedding methods for community detection.
CoRR, 2024

2023
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level.
IEEE Internet Things J., 2023

Developing and Deploying Security Applications for In-Vehicle Networks.
CoRR, 2023

Robustness of community structure under edge addition.
CoRR, 2023

Poster: Cognitive Cyber - Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing Environments.
Proceedings of the 17th ACM International Conference on Distributed and Event-based Systems, 2023

2022
CANShield: Signal-based Intrusion Detection for Controller Area Networks.
CoRR, 2022

Detecting CAN Masquerade Attacks with Signal Clustering Similarity.
CoRR, 2022

2021
Graph-Based Machine Learning Improves Just-in-Time Defect Prediction.
CoRR, 2021

Time-Based CAN Intrusion Detection Benchmark.
CoRR, 2021

Using bursty announcements for detecting BGP routing anomalies.
Comput. Networks, 2021

2020
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
Using Bursty Announcements for Early Detection of BGP Routing Anomalies.
CoRR, 2019

2018
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

2017
Factors in an end user security expertise instrument.
Inf. Comput. Secur., 2017

Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies.
Comput. Secur., 2017

Insider Threat Event Detection in User-System Interactions.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
What Can Johnny Do?–Factors in an End-User Expertise Instrument.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2014
Model-based fraud detection in growing networks.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Characterizing the relationship between degree distributions and community structures.
Proceedings of the American Control Conference, 2014

2013
On the formation of structure in growing networks
CoRR, 2013

Structure of growing networks with no preferential attachment.
Proceedings of the American Control Conference, 2013

2011
Power-law weighted networks from local attachments
CoRR, 2011

Heavy-tailed weighted networks from local attachment strategies.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011


  Loading...