Sergio Pastrana
Sergio Pastrana
Associate Professor
Dirección de correo verificada de - Página principal
Citado por
Citado por
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
The Web Conference (WWW), 2018
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
S Pastrana, G Suarez-Tangil
Internet Measurement Conference (IMC), 73 - 86, 2019
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, AJ Hutchings, R Clayton, AR Beresford
Internet Measurement Conference (IMC), 2017
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
S Pastrana, A Hutchings, A Caines, P Buttery
Research in Attacks, Intrusions and Defences (RAID), 2018
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
Shall we collaborate? A model to analyse the benefits of information sharing
R Garrido-Pelaz, L González-Manzano, S Pastrana
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, CD Kloos, I Estévez-Ayres, C Fernández-Panadero, ...
Proceedings of the European Stakeholder Summit on Experiences and Best …, 2016
Automatically identifying the function and intent of posts in underground forums
A Caines, S Pastrana, A Hutchings, PJ Buttery
Crime Science 7 (1), 19, 2018
SoK: Privacy-preserving computation techniques for deep learning
J Cabrero-Holgueras, S Pastrana
Proceedings on Privacy Enhancing Technologies 2021 (4), 139-162, 2021
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, S Pastrana
Pervasive and Mobile Computing 18, 137-151, 2015
A functional framework to evade network IDS
S Pastrana, A Orfila, A Ribagorda
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
Measuring eWhoring
S Pastrana, A Hutchings, D Thomas, J Tapiador
Internet Measurement Conference (IMC), 463 - 477, 2019
Understanding eWhoring
A Hutchings, S Pastrana
4th IEEE European Symposium on Security and Privacy (EuroS&P), 2019
A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments
K Turk, S Pastrana, B Collier
2nd Workshop on Attackers and Cyber-Crime Operations, 2020
Security analysis and exploitation of arduino devices in the internet of things
C Alberca, S Pastrana, G Suarez-Tangil, P Palmieri
Proceedings of the ACM International Conference on Computing Frontiers, 437-442, 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
S Pastrana, J Tapiador, G Suarez-Tangil, P Peris-López
Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2016
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks
S Pastrana, JE Tapiador, A Orfila, P Peris-Lopez
Computer Networks 80, 66-88, 2015
Probabilistic yoking proofs for large scale IoT systems
JM de Fuentes, P Peris-Lopez, JE Tapiador, S Pastrana
Ad Hoc Networks 32, 43-52, 2015
Randomized anagram revisited
S Pastrana, A Orfila, JE Tapiador, P Peris-Lopez
Journal of Network and Computer Applications 41, 182-196, 2014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20