default search action
Pedro García-Teodoro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Joaquín Gaspar Medina-Arco, Roberto Magán-Carrión, Rafael Alejandro Rodríguez-Gómez, Pedro García-Teodoro:
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems. Sensors 24(2): 479 (2024) - [j41]José Antonio Gómez-Hernández, Pedro García-Teodoro:
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring. Sensors 24(9): 2679 (2024) - 2022
- [j40]Pedro García-Teodoro, José Camacho, Gabriel Maciá-Fernández, José Antonio Gómez-Hernández, Victor José López-Marín:
A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Networks 212: 109068 (2022) - [j39]Pedro García-Teodoro, José Antonio Gómez-Hernández, Alberto Abellán-Galera:
Multi-labeling of complex, multi-behavioral malware samples. Comput. Secur. 121: 102845 (2022) - [j38]José Antonio Gómez-Hernández, Raúl Sánchez-Fernández, Pedro García-Teodoro:
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Inf. Secur. 16(1): 64-74 (2022) - 2021
- [j37]José Antonio Gómez-Hernández, José Camacho, Juan A. Holgado-Terriza, Pedro García-Teodoro, Gabriel Maciá-Fernández:
ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices. IEEE Access 9: 101321-101334 (2021) - [j36]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: A connectivity analysis. Comput. Networks 194: 108158 (2021) - [c37]José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, J. M. Noguera-Comino:
Monitoring Android Communications for Security. INFOCOM Workshops 2021: 1-2 - [c36]José Antonio Gómez-Hernández, Pedro García-Teodoro, Juan Antonio Holgado Terriza, Gabriel Maciá-Fernández, José Camacho-Páez, M. Robles-Carrillo:
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments. SP (Workshops) 2021: 31-36 - [i1]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: a connectivity analysis. CoRR abs/2101.03212 (2021)
2010 – 2019
- 2019
- [j35]José Camacho, Roberto Therón, José Manuel García-Giménez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Group-Wise Principal Component Analysis for Exploratory Intrusion Detection. IEEE Access 7: 113081-113093 (2019) - [j34]Gabriel Maciá-Fernández, José Antonio Gómez-Hernández, Margarita Robles, Pedro García-Teodoro:
Blockchain-based forensic system for collection and preservation of network service evidences. Digit. Investig. 28 Supplement: S141 (2019) - 2018
- [j33]José Antonio Gómez-Hernández, L. Álvarez-González, Pedro García-Teodoro:
R-Locker: Thwarting ransomware action through a honeyfile-based approach. Comput. Secur. 73: 389-398 (2018) - [j32]Gabriel Maciá-Fernández, José Camacho, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73: 411-424 (2018) - [j31]Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García-Teodoro, José Camacho, Lorenzo Cavallaro:
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. IET Inf. Secur. 12(5): 404-413 (2018) - 2017
- [j30]Roberto Magán-Carrión, José Camacho, Pedro García-Teodoro, Eduardo Feo Flushing, Gianni A. Di Caro:
A Dynamical Relay node placement solution for MANETs. Comput. Commun. 114: 36-50 (2017) - [j29]A. Ruiz-Heras, Pedro García-Teodoro, Leovigildo Sánchez-Casado:
ADroid: anomaly-based detection of malicious events in Android platforms. Int. J. Inf. Sec. 16(4): 371-384 (2017) - [c35]José Camacho, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández:
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. IEEE Symposium on Security and Privacy Workshops 2017: 241-246 - 2016
- [j28]Roberto Magán-Carrión, Rafael A. Rodríguez-Gómez, José Camacho, Pedro García-Teodoro:
Optimal relay placement in multi-hop wireless networks. Ad Hoc Networks 46: 23-36 (2016) - [j27]José Camacho, Alejandro Pérez-Villegas, Pedro García-Teodoro, Gabriel Maciá-Fernández:
PCA-based multivariate statistical network monitoring for anomaly detection. Comput. Secur. 59: 118-137 (2016) - [c34]Roberto Magán-Carrión, José Camacho, Pedro García-Teodoro, Eduardo Feo Flushing, Gianni A. Di Caro:
DRNS: Dynamical Relay Node Placement Solution. PAAMS 2016: 273-276 - [c33]Gabriel Maciá-Fernández, José Camacho, Pedro Garcia-Teodoro, Rafael A. Rodríguez-Gómez:
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection. WIFS 2016: 1-6 - 2015
- [j26]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Roberto Magán-Carrión:
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Comput. Networks 87: 44-58 (2015) - [j25]Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Juan E. Tapiador, Rolando Salazar-Hernández:
Automatic generation of HTTP intrusion signatures by selective identification of anomalies. Comput. Secur. 55: 159-174 (2015) - [j24]Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Leovigildo Sánchez-Casado, Pedro García-Teodoro:
Analysis and modelling of resources shared in the BitTorrent network. Trans. Emerg. Telecommun. Technol. 26(10): 1189-1200 (2015) - [j23]Roberto Magán-Carrión, José Camacho-Páez, Pedro García-Teodoro:
Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 672124:1-672124:20 (2015) - [j22]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck:
Identification of contamination zones for sinkhole detection in MANETs. J. Netw. Comput. Appl. 54: 62-77 (2015) - 2014
- [j21]Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro, Moritz Steiner, Davide Balzarotti:
Resource monitoring for the detection of parasite P2P botnets. Comput. Networks 70: 302-311 (2014) - [c32]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck:
A Novel Collaborative Approach for Sinkhole Detection in MANETs. ADHOC-NOW Workshops 2014: 123-136 - [c31]José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Tackling the Big Data 4 vs for anomaly detection. INFOCOM Workshops 2014: 500-505 - [c30]Roberto Magán-Carrión, José Camacho-Páez, Pedro García-Teodoro:
A Multiagent Self-healing System against Security Incidents in MANETs. PAAMS (Workshops) 2014: 321-332 - [e1]Juan M. Corchado, Javier Bajo, Jaroslaw Kozlak, Pawel Pawlewski, José M. Molina, Benoit Gaudou, Vicente Julián, Rainer Unland, Fernando Lopes, Kasper Hallenborg, Pedro García-Teodoro:
Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection - PAAMS 2014 International Workshops, Salamanca, Spain, June 4-6, 2014. Proceedings. Communications in Computer and Information Science 430, Springer 2014, ISBN 978-3-319-07766-6 [contents] - 2013
- [j20]José Camacho, Pablo Padilla, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
A generalizable dynamic flow pairing method for traffic classification. Comput. Networks 57(14): 2718-2732 (2013) - [j19]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45(4): 45:1-45:33 (2013) - [j18]Roberto Magán-Carrión, Fernando Pulido-Pulido, José Camacho, Pedro García-Teodoro:
Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies. J. Commun. 8(11): 738-750 (2013) - [j17]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 15-38 (2013) - [j16]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 39 (2013) - [c29]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. NSS 2013: 1-13 - [c28]Roberto Magán-Carrión, José Camacho-Páez, Pedro Garcia-Teodoro:
A Security Response Approach Based on the Deployment of Mobile Agents. PAAMS 2013: 182-191 - [c27]Roberto Magán-Carrión, José Camacho-Páez, Pedro Garcia-Teodoro:
A Security Response Approach Based on the Deployment of Mobile Agents: A Practical Vision. PAAMS 2013: 308-311 - 2012
- [j15]Francisco J. Salcedo-Campos, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Segmental parameterisation and statistical modelling of e-mail headers for spam detection. Inf. Sci. 195: 45-61 (2012) - [c26]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. TrustCom 2012: 231-238 - 2011
- [c25]Francisco J. Salcedo-Campos, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Multiple Vector Classification for P2P Traffic Identification. DCNET/OPTICS 2011: 5-13 - [c24]Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
Analysis of Botnets through Life-cycle. SECRYPT 2011: 257-262 - 2010
- [c23]Pedro Garcia-Teodoro, Pablo Muñoz-Feldstedt, David Ruete-Zúñiga:
Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents. AICT 2010: 370-375
2000 – 2009
- 2009
- [j14]Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Enrique Vázquez:
Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1-2): 18-28 (2009) - [j13]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical model for low-rate DoS attacks against application servers. IEEE Trans. Inf. Forensics Secur. 4(3): 519-529 (2009) - [j12]Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Fraud in roaming scenarios: an overview. IEEE Wirel. Commun. 16(6): 88-94 (2009) - [c22]Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, M. Soriano-Ibanez:
Environmental Security in P2P Networks. AP2PS 2009: 138-143 - [c21]Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, J. Nuno-Garcia:
Anomaly Detection in P2P Networks Using Markov Modelling. AP2PS 2009: 156-159 - 2008
- [j11]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers. Comput. Secur. 27(7-8): 335-354 (2008) - 2007
- [j10]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. Comput. Networks 51(4): 1013-1030 (2007) - [c20]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Francisco de Toro-Negro:
LoRDAS: A Low-Rate DoS Attack against Application Servers. CRITIS 2007: 197-209 - [c19]Francisco de Toro-Negro, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández:
A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System. DMBiz@PAKDD 2007: 111-120 - 2006
- [c18]María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. CRITIS 2006: 210-221 - [c17]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. ESORICS 2006: 512-526 - [c16]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). ICICS 2006: 282-291 - [c15]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - [c14]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Low Rate DoS Attack to Monoprocess Servers. SPC 2006: 43-57 - 2005
- [c13]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Detection of Web-Based Attacks through Markovian Protocol Parsing. ISCC 2005: 457-462 - 2004
- [j9]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Measuring normality in HTTP traffic for anomaly-based intrusion detection. Comput. Networks 45(2): 175-193 (2004) - [j8]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Commun. 27(16): 1569-1584 (2004) - [c12]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. ICCSA (1) 2004: 841-850 - 2003
- [j7]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
NSDF: a computer network system description framework and its application to network security. Comput. Networks 43(5): 573-600 (2003) - [c11]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. IWIA 2003: 3-12 - 2000
- [j6]M. Carmen Benítez, Antonio J. Rubio, Pedro García-Teodoro, Ángel de la Torre:
Different confidence measures for word verification in speech recognition. Speech Commun. 32(1-2): 79-94 (2000)
1990 – 1999
- 1999
- [j5]Pedro García-Teodoro, Antonio J. Rubio, Jesús Esteban Díaz Verdejo, M. Carmen Benítez, Juan M. López-Soler:
A transcription-based approach to determine the difficulty of a speech recognition task. IEEE Trans. Speech Audio Process. 7(3): 339-342 (1999) - [c10]Ramón López-Cózar, Antonio J. Rubio, Pedro García-Teodoro, José C. Segura:
A new word-confidence threshold technique to enhance the performance of spoken dialogue systems. EUROSPEECH 1999: 1395-1398 - 1998
- [c9]M. Carmen Benítez, Antonio J. Rubio, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
Word verification using confidence measures in speech recognition. ICSLP 1998 - [c8]Pedro García-Teodoro, Antonio J. Rubio-Ayuso, M. Carmen Benítez Ortúzar, Jesús E. Díaz Verdejo, Juan Manuel López-Soler:
On the comparison of speech recognition tasks. LREC 1998: 795-800 - [c7]Pedro García-Teodoro, José C. Segura, Jesús Esteban Díaz Verdejo, Antonio José Rubio Ayuso, Maria C. Benitez, Antonio M. Peinado, Juan Manuel López-Soler, José Luis Pérez Iglesias, Victoria E. Sánchez Calle, Ángel de la Torre, Ramón López-Cózar Delgado:
Speech recognitíon and the new technologies in conununication: a continuous speech recognition-based switchboard with an answering module for e-mailing voice messages. LREC 1998: 1263-1266 - 1997
- [c6]Antonio J. Rubio, Jesús Esteban Díaz Verdejo, Pedro García-Teodoro, José C. Segura:
On the influence of frame-asynchronous grammar scoring in a CSR system. ICASSP 1997: 895-898 - [c5]Ángel de la Torre, Antonio M. Peinado, Antonio J. Rubio, Pedro García-Teodoro:
Discriminative feature extraction for speech recognition in noise. EUROSPEECH 1997: 291-294 - [c4]Antonio J. Rubio, Pedro García-Teodoro, Ángel de la Torre, José C. Segura, Jesús Esteban Díaz Verdejo, Maria C. Benitez, Victoria E. Sánchez, Antonio M. Peinado, Juan M. López-Soler, José L. Pérez-Córdoba:
STACC: an automatic service for information access using continuous speech recognition through telephone line. EUROSPEECH 1997: 1779-1782 - [c3]Ramón López-Cózar, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Antonio J. Rubio:
A voice activated dialogue system for fast-food restaurant applications. EUROSPEECH 1997: 1783-1786 - 1996
- [j4]Antonio M. Peinado, José C. Segura, Antonio J. Rubio, Pedro García-Teodoro, José L. Pérez-Córdoba:
Discriminative codebook design using multiple vector quantization in HMM-based speech recognizers. IEEE Trans. Speech Audio Process. 4(2): 89-95 (1996) - [j3]Victoria E. Sánchez, Antonio M. Peinado, José C. Segura, Pedro García-Teodoro, Antonio J. Rubio:
Generating matrices for the discrete sine transforms. IEEE Trans. Signal Process. 44(10): 2644-2646 (1996) - 1995
- [j2]Victoria E. Sánchez, Pedro García-Teodoro, Antonio M. Peinado, José C. Segura, Antonio J. Rubio:
Diagonalizing properties of the discrete cosine transforms. IEEE Trans. Signal Process. 43(11): 2631-2641 (1995) - 1994
- [j1]José C. Segura, Antonio J. Rubio, Antonio M. Peinado, Pedro García-Teodoro, Ramon Román:
Multiple VQ hidden Markov modelling for speech recognition. Speech Commun. 14(2): 163-170 (1994) - [c2]Jesús Esteban Díaz Verdejo, José C. Segura, Pedro García-Teodoro, Antonio J. Rubio:
SLHMM: a continuous speech recognition system based on Alphanet-HMM. ICASSP (1) 1994: 213-216 - 1991
- [c1]Antonio M. Peinado, Ramon Román, José C. Segura, Antonio J. Rubio, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
Entropic training for HMM speech recognition. EUROSPEECH 1991: 651-654
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint