Borja Sanz Urquijo
Borja Sanz Urquijo
Dirección de correo verificada de deusto.es - Página principal
Título
Citado por
Citado por
Año
Puma: Permission usage to detect malware in android
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, PG Bringas, G Álvarez
International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions …, 2013
2932013
Idea: Opcode-sequence-based malware detection
I Santos, F Brezo, J Nieves, YK Penya, B Sanz, C Laorden, PG Bringas
International Symposium on Engineering Secure Software and Systems, 35-43, 2010
2362010
On the automatic categorisation of android applications
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, PG Bringas
2012 IEEE Consumer communications and networking conference (CCNC), 149-153, 2012
1272012
MAMA: manifest analysis for malware detection in android
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, J Nieves, PG Bringas, ...
Cybernetics and Systems 44 (6-7), 469-488, 2013
1062013
Using opcode sequences in single-class learning to detect unknown malware
I Santos, F Brezo, B Sanz, C Laorden, PG Bringas
IET information security 5 (4), 220-227, 2011
542011
Enhanced topic-based vector space model for semantics-aware spam filtering
I Santos, C Laorden, B Sanz, PG Bringas
Expert Systems with applications 39 (1), 437-444, 2012
502012
Opcode-sequence-based semi-supervised unknown malware detection
I Santos, B Sanz, C Laorden, F Brezo, PG Bringas
Computational Intelligence in Security for Information Systems, 50-57, 2011
482011
Study on the effectiveness of anomaly detection for spam filtering
C Laorden, X Ugarte-Pedrero, I Santos, B Sanz, J Nieves, PG Bringas
Information Sciences 277, 421-444, 2014
462014
Collective classification for packed executable identification
I Santos, X Ugarte-Pedrero, B Sanz, C Laorden, PG Bringas
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
432011
Countering entropy measure attacks on packed software detection
X Ugarte-Pedrero, I Santos, B Sanz, C Laorden, PG Bringas
2012 IEEE Consumer Communications and Networking Conference (CCNC), 164-168, 2012
402012
Using Dalvik opcodes for malware detection on Android
J Gaviria de la Puerta, B Sanz
Logic Journal of the IGPL 25 (6), 938-948, 2017
322017
Mads: malicious android applications detection through string analysis
B Sanz, I Santos, J Nieves, C Laorden, I Alonso-Gonzalez, PG Bringas
International Conference on Network and System Security, 178-191, 2013
272013
Anomaly detection using string analysis for android malware detection
B Sanz, I Santos, X Ugarte-Pedrero, C Laorden, J Nieves, PG Bringas
International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 469-478, 2014
262014
Instance-based anomaly method for Android malware detection
B Sanz, I Santos, X Ugarte-Pedrero, C Laorden, J Nieves, PG Bringas
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
252013
Word sense disambiguation for spam filtering
C Laorden, I Santos, B Sanz, G Alvarez, PG Bringas
Electronic Commerce Research and Applications 11 (3), 290-298, 2012
252012
Collective classification for spam filtering
C Laorden, B Sanz, I Santos, P Galán-García, PG Bringas
Computational Intelligence in Security for Information Systems, 1-8, 2011
252011
Negobot: A conversational agent based on game theory for the detection of paedophile behaviour
C Laorden, P Galán-García, I Santos, B Sanz, JMG Hidalgo, PG Bringas
International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions …, 2013
242013
A threat model approach to threats and vulnerabilities in on-line social networks
C Laorden, B Sanz, G Alvarez, PG Bringas
Computational Intelligence in Security for Information Systems 2010, 135-142, 2010
192010
Territorial innovation models: to be or not to be, that’s the question
D Doloreux, JG de la Puerta, I Pastor-López, IP Gómez, B Sanz, ...
Scientometrics 120 (3), 1163-1191, 2019
112019
An unsupervised approach to online noisy-neighbor detection in cloud data centers
T Lorido-Botran, S Huerta, L Tomás, J Tordsson, B Sanz
Expert Systems with Applications 89, 188-204, 2017
112017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20