Pedro García-Teodoro
Orcid: 0000-0001-6766-1936
According to our database1,
Pedro García-Teodoro
authored at least 79 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring.
Sensors, May, 2024
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems.
Sensors, January, 2024
2022
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker.
IET Inf. Secur., 2022
A novel zero-trust network access control scheme based on the security profile of devices and users.
Comput. Networks, 2022
2021
ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices.
IEEE Access, 2021
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
2019
Blockchain-based forensic system for collection and preservation of network service evidences.
Digit. Investig., 2019
IEEE Access, 2019
2018
IET Inf. Secur., 2018
Comput. Secur., 2018
Comput. Secur., 2018
2017
Int. J. Inf. Sec., 2017
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
2016
Comput. Secur., 2016
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016
2015
J. Netw. Comput. Appl., 2015
Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Trans. Emerg. Telecommun. Technol., 2015
Automatic generation of HTTP intrusion signatures by selective identification of anomalies.
Comput. Secur., 2015
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping.
Comput. Networks, 2015
2014
Comput. Networks, 2014
Proceedings of the Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013
On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN).
Wirel. Pers. Commun., 2013
J. Commun., 2013
Comput. Networks, 2013
A Security Response Approach Based on the Deployment of Mobile Agents: A Practical Vision.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2013
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
Segmental parameterisation and statistical modelling of e-mail headers for spam detection.
Inf. Sci., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Analysis of Botnets through Life-cycle.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Multiple Vector Classification for P2P Traffic Identification.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011
2010
Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Comput. Secur., 2009
Proceedings of the First International Conference on Advances in P2P Systems, 2009
Proceedings of the First International Conference on Advances in P2P Systems, 2009
2008
Comput. Secur., 2008
2007
Comput. Networks, 2007
A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Proceedings of the SECRYPT 2006, 2006
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Computer Security, 2006
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
2004
Comput. Commun., 2004
Comput. Networks, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
NSDF: a computer network system description framework and its application to network security.
Comput. Networks, 2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
2000
Speech Commun., 2000
1999
A transcription-based approach to determine the difficulty of a speech recognition task.
IEEE Trans. Speech Audio Process., 1999
A new word-confidence threshold technique to enhance the performance of spoken dialogue systems.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999
1998
Speech recognitíon and the new technologies in conununication: a continuous speech recognition-based switchboard with an answering module for e-mailing voice messages.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998
On the comparison of speech recognition tasks.
Proceedings of the First International Conference on Language Resources and Evaluation, 1998
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998
1997
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997
STACC: an automatic service for information access using continuous speech recognition through telephone line.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997
1996
IEEE Trans. Signal Process., 1996
Discriminative codebook design using multiple vector quantization in HMM-based speech recognizers.
IEEE Trans. Speech Audio Process., 1996
1995
IEEE Trans. Signal Process., 1995
1994
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994
1991
Proceedings of the Second European Conference on Speech Communication and Technology, 1991