Pedro Malagón
Orcid: 0000-0002-8167-508X
According to our database1,
Pedro Malagón
authored at least 43 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Annual Modeling and Simulation Conference, 2024
2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications.
Simul. Model. Pract. Theory, 2020
Toward hardware-accelerated QoS-aware 5G network slicing based on data plane programmability.
Trans. Emerg. Telecommun. Technol., 2020
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the XXXV Conference on Design of Circuits and Integrated Systems, 2020
2019
Design and Evaluation of a Heuristic Optimization Tool Based on Evolutionary Grammars Using PSoCs.
Proceedings of the Artificial Life and Evolutionary Computation - 14th Italian Workshop, 2019
Anomaly Detection Using Gaussian Mixture Probability Model to Implement Intrusion Detection System.
Proceedings of the Hybrid Artificial Intelligent Systems - 14th International Conference, 2019
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019
Proceedings of the 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2019
2018
Towards an FPGA-Accelerated programmable data path for edge-to-core communications in 5G networks.
J. Netw. Comput. Appl., 2018
Proceedings of the 28th International Symposium on Power and Timing Modeling, 2018
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the Hybrid Artificial Intelligent Systems - 13th International Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Building accurate models to determine the current CPU utilization of a host within a virtual machine allocated on it.
Proceedings of the Summer Simulation Multi-Conference, 2017
2016
Proceedings of the Summer Computer Simulation Conference, 2016
Proceedings of the Summer Computer Simulation Conference, 2016
2015
Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres.
Log. J. IGPL, 2015
Proceedings of the 10th Workshop on Embedded Systems Security, 2015
2013
Inf. Sci., 2013
2012
Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices.
Sensors, 2012
Log. J. IGPL, 2012
2011
J. Netw. Comput. Appl., 2011
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011
2010
Proceedings of the International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, 2010
Detecting and Confining Sybil Attack in Wireless Sensor Networks Based on Reputation Systems Coupled with Self-organizing Maps.
Proceedings of the Artificial Intelligence Applications and Innovations, 2010
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
2009
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Sensors, 2009
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009
Proceedings of the Distributed Computing, 2009
Proceedings of the Distributed Computing, 2009
Proceedings of the Distributed Computing, 2009
Proceedings of the Reconfigurable Computing: Architectures, 2009
2007
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor.
Proceedings of the First International Conference on Emerging Security Information, 2007