Остановите войну!
for scientists:
default search action
Gabriel Maciá-Fernández
Publications
- 2022
- [j31]Pedro García-Teodoro, José Camacho, Gabriel Maciá-Fernández, José Antonio Gómez-Hernández, Victor José López-Marín:
A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Networks 212: 109068 (2022) - 2021
- [j29]José Antonio Gómez-Hernández, José Camacho, Juan A. Holgado-Terriza, Pedro García-Teodoro, Gabriel Maciá-Fernández:
ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices. IEEE Access 9: 101321-101334 (2021) - [j26]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: A connectivity analysis. Comput. Networks 194: 108158 (2021) - [c24]José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino:
Monitoring Android Communications for Security. INFOCOM Workshops 2021: 1-2 - [c23]José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, M. Robles-Carrillo:
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments. SP (Workshops) 2021: 31-36 - [i2]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: a connectivity analysis. CoRR abs/2101.03212 (2021) - 2019
- [j24]José Camacho, Roberto Therón, José Manuel García-Giménez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Group-Wise Principal Component Analysis for Exploratory Intrusion Detection. IEEE Access 7: 113081-113093 (2019) - [j22]Gabriel Maciá-Fernández, José Antonio Gómez-Hernández, Margarita Robles, Pedro García-Teodoro:
Blockchain-based forensic system for collection and preservation of network service evidences. Digit. Investig. 28 Supplement: S141 (2019) - 2018
- [j19]Gabriel Maciá-Fernández, José Camacho, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73: 411-424 (2018) - 2017
- [c21]José Camacho, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández:
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. IEEE Symposium on Security and Privacy Workshops 2017: 241-246 - 2016
- [j17]José Camacho, Alejandro Pérez-Villegas, Pedro García-Teodoro, Gabriel Maciá-Fernández:
PCA-based multivariate statistical network monitoring for anomaly detection. Comput. Secur. 59: 118-137 (2016) - [c19]Gabriel Maciá-Fernández, José Camacho, Pedro Garcia-Teodoro, Rafael A. Rodríguez-Gómez:
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection. WIFS 2016: 1-6 - 2015
- [j15]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Roberto Magán-Carrión:
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Comput. Networks 87: 44-58 (2015) - [j14]Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Leovigildo Sánchez-Casado, Pedro García-Teodoro:
Analysis and modelling of resources shared in the BitTorrent network. Trans. Emerg. Telecommun. Technol. 26(10): 1189-1200 (2015) - [j13]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck:
Identification of contamination zones for sinkhole detection in MANETs. J. Netw. Comput. Appl. 54: 62-77 (2015) - 2014
- [j12]Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro, Moritz Steiner, Davide Balzarotti:
Resource monitoring for the detection of parasite P2P botnets. Comput. Networks 70: 302-311 (2014) - [c18]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck:
A Novel Collaborative Approach for Sinkhole Detection in MANETs. ADHOC-NOW Workshops 2014: 123-136 - [c17]José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Tackling the Big Data 4 vs for anomaly detection. INFOCOM Workshops 2014: 500-505 - 2013
- [j10]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45(4): 45:1-45:33 (2013) - [j9]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 15-38 (2013) - [j8]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 39 (2013) - [c16]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. NSS 2013: 1-13 - 2012
- [c14]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. TrustCom 2012: 231-238 - 2011
- [c12]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
Analysis of Botnets through Life-cycle. SECRYPT 2011: 257-262 - 2009
- [j5]Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Enrique Vázquez:
Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1-2): 18-28 (2009) - [j4]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical model for low-rate DoS attacks against application servers. IEEE Trans. Inf. Forensics Secur. 4(3): 519-529 (2009) - [j3]Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Fraud in roaming scenarios: an overview. IEEE Wirel. Commun. 16(6): 88-94 (2009) - [c8]Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, J. Nuno-Garcia:
Anomaly Detection in P2P Networks Using Markov Modelling. AP2PS 2009: 156-159 - 2008
- [j2]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers. Comput. Secur. 27(7-8): 335-354 (2008) - 2007
- [j1]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. Comput. Networks 51(4): 1013-1030 (2007) - [c7]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Francisco de Toro-Negro:
LoRDAS: A Low-Rate DoS Attack against Application Servers. CRITIS 2007: 197-209 - [c6]Francisco de Toro-Negro, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández:
A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System. DMBiz@PAKDD 2007: 111-120 - 2006
- [c5]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. ESORICS 2006: 512-526 - [c4]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). ICICS 2006: 282-291 - [c3]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - [c2]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Low Rate DoS Attack to Monoprocess Servers. SPC 2006: 43-57
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint