Sergio Pastrana
Sergio Pastrana
Visiting Professor
Verified email at - Homepage
TitleCited byYear
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, CD Kloos, I Estévez-Ayres, C Fernández-Panadero, ...
Proceedings of the European Stakeholder Summit on Experiences and Best …, 2016
Shall we collaborate? A model to analyse the benefits of information sharing
R Garrido-Pelaz, L González-Manzano, S Pastrana
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, S Pastrana
Pervasive and Mobile Computing 18, 137-151, 2015
A functional framework to evade network IDS
S Pastrana, A Orfila, A Ribagorda
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
The Web Conference (WWW), 2018
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, AJ Hutchings, R Clayton, AR Beresford
Internet Measurement Conference (IMC), 2017
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
Randomized anagram revisited
S Pastrana, A Orfila, JE Tapiador, P Peris-Lopez
Journal of Network and Computer Applications 41, 182-196, 2014
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks
S Pastrana, JE Tapiador, A Orfila, P Peris-Lopez
Computer Networks 80, 66-88, 2015
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
S Pastrana, J Tapiador, G Suarez-Tangil, P Peris-López
Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2016
Probabilistic yoking proofs for large scale IoT systems
JM de Fuentes, P Peris-Lopez, JE Tapiador, S Pastrana
Ad Hoc Networks 32, 43-52, 2015
Modeling NIDS evasion with genetic programming
S Pastrana, A Orfila, A Ribagorda
CSREA Press, 2010
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
S Pastrana, G Suarez-Tangil
Internet Measurement Conference (IMC), 73 - 86, 2019
Automatically identifying the function and intent of posts in underground forums
A Caines, S Pastrana, A Hutchings, PJ Buttery
Crime science 7 (1), 19, 2018
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
S Pastrana, A Hutchings, A Caines, P Buttery
Research in Attacks, Intrusions and Defences (RAID), 2018
Security analysis and exploitation of arduino devices in the internet of things
C Alberca, S Pastrana, G Suarez-Tangil, P Palmieri
Proceedings of the ACM International Conference on Computing Frontiers, 437-442, 2016
Attacks against intrusion detection networks: evasion, reverse engineering and optimal countermeasures
SP Portillo
Universidad Carlos III de Madrid, 2014
Artificial immunity-based correlation system
G Suarez-Tangil, E Palomar, S Pastrana, A Ribagorda
Proceedings of the International Conference on Security and Cryptography …, 2011
ArduWorm: A Functional Malware Targeting Arduino Devices
S Pastrana, J Rodriguez-Canseco, A Calleja
Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2016
The system can't perform the operation now. Try again later.
Articles 1–20