Sergio Pastrana
Sergio Pastrana
Visiting Professor
Dirección de correo verificada de - Página principal
Citado por
Citado por
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, AJ Hutchings, R Clayton, AR Beresford
Internet Measurement Conference (IMC), 2017
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, CD Kloos, I Estévez-Ayres, C Fernández-Panadero, ...
Proceedings of the European Stakeholder Summit on Experiences and Best …, 2016
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
The Web Conference (WWW), 2018
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, S Pastrana
Pervasive and Mobile Computing 18, 137-151, 2015
Shall we collaborate? A model to analyse the benefits of information sharing
R Garrido-Pelaz, L González-Manzano, S Pastrana
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
A functional framework to evade network IDS
S Pastrana, A Orfila, A Ribagorda
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
S Pastrana, G Suarez-Tangil
Internet Measurement Conference (IMC), 73 - 86, 2019
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
S Pastrana, A Hutchings, A Caines, P Buttery
Research in Attacks, Intrusions and Defences (RAID), 2018
Randomized anagram revisited
S Pastrana, A Orfila, JE Tapiador, P Peris-Lopez
Journal of Network and Computer Applications 41, 182-196, 2014
Probabilistic yoking proofs for large scale IoT systems
JM de Fuentes, P Peris-Lopez, JE Tapiador, S Pastrana
Ad Hoc Networks 32, 43-52, 2015
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks
S Pastrana, JE Tapiador, A Orfila, P Peris-Lopez
Computer Networks 80, 66-88, 2015
Automatically identifying the function and intent of posts in underground forums
A Caines, S Pastrana, A Hutchings, PJ Buttery
Crime Science 7 (1), 19, 2018
Security Analysis and Exploitation of Arduino devices in the Internet of Things
C Alberca, S Pastrana, G Suarez-Tangil, P Palmieri
Proceedings of the ACM International Conference on Computing Frontiers, 437-442, 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
S Pastrana, J Tapiador, G Suarez-Tangil, P Peris-López
Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2016
Modeling NIDS evasion with genetic programming
S Pastrana, A Orfila, A Ribagorda
CSREA Press, 2010
Attacks against intrusion detection networks: evasion, reverse engineering and optimal countermeasures
SP Portillo
Universidad Carlos III de Madrid, 2014
Artificial immunity-based correlation system
G Suarez-Tangil, E Palomar, S Pastrana, A Ribagorda
Proceedings of the International Conference on Security and Cryptography …, 2011
Evading IDSs and firewalls as fundamental sources of information in SIEMs
S Pastrana, J Montero-Castillo, A Orfila
Advances in Security Information Management: Perceptions and Outcomes. Nova …, 2013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20