Anomaly-based network intrusion detection: Techniques, systems and challenges P Garcia-Teodoro, J Diaz-Verdejo, G Maciá-Fernández, E Vázquez computers & security 28 (1-2), 18-28, 2009 | 2490 | 2009 |
Comunicaciones y redes de computadores W Stallings México: Pearson Educación,, 2004 | 1188 | 2004 |
Anomaly detection methods in wired networks: a survey and taxonomy JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo Computer Communications 27 (16), 1569-1584, 2004 | 294 | 2004 |
UGR ‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs G Maciá-Fernández, J Camacho, R Magán-Carrión, P García-Teodoro, ... Computers & Security 73, 411-424, 2018 | 277 | 2018 |
R-Locker: Thwarting ransomware action through a honeyfile-based approach JA Gómez-Hernández, L Álvarez-González, P García-Teodoro Computers & Security 73, 389-398, 2018 | 184 | 2018 |
Survey and taxonomy of botnet research through life-cycle RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013 | 180 | 2013 |
PCA-based multivariate statistical network monitoring for anomaly detection J Camacho, A Pérez-Villegas, P García-Teodoro, G Maciá-Fernández Computers & Security 59, 118-137, 2016 | 171 | 2016 |
Measuring normality in HTTP traffic for anomaly-based intrusion detection JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo Computer Networks 45 (2), 175-193, 2004 | 114 | 2004 |
Detection of web-based attacks through Markovian protocol parsing JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo 10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005 | 106 | 2005 |
Stochastic protocol modeling for anomaly based network intrusion detection JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003 | 98 | 2003 |
Mathematical model for low-rate DoS attacks against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro IEEE Transactions on Information Forensics and Security 4 (3), 519-529, 2009 | 85 | 2009 |
Tackling the big data 4 vs for anomaly detection J Camacho, G Macia-Fernandez, J Diaz-Verdejo, P Garcia-Teodoro 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014 | 84 | 2014 |
Evaluation of a low-rate DoS attack against iterative servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro Computer Networks 51 (4), 1013-1030, 2007 | 65 | 2007 |
Optimal relay placement in multi-hop wireless networks R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro Ad Hoc Networks 46, 23-36, 2016 | 56 | 2016 |
Evaluation of a low-rate DoS attack against application servers G Macia-Fernandez, JE Díaz-Verdejo, P García-Teodoro computers & security 27 (7-8), 335-354, 2008 | 50 | 2008 |
LoRDAS: A low-rate DoS attack against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro, ... Critical Information Infrastructures Security: Second International Workshop …, 2008 | 50 | 2008 |
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping L Sánchez-Casado, G Maciá-Fernández, P Garcia-Teodoro, ... Computer Networks 87, 44-58, 2015 | 48 | 2015 |
A Dynamical Relay node placement solution for MANETs R Magán-Carrión, J Camacho, P García-Teodoro, EF Flushing, ... Computer Communications 114, 36-50, 2017 | 37 | 2017 |
Identification of contamination zones for sinkhole detection in MANETs L Sánchez-Casado, G Macia-Fernandez, P Garcia-Teodoro, ... Journal of Network and Computer Applications 54, 62-77, 2015 | 34 | 2015 |
Transmisión de datos y redes de computadores PG Teodoro, JED Verdejo, JML Soler Pearson Educación, 2014 | 33 | 2014 |