Rafael A. Rodríguez-Gómez
Rafael A. Rodríguez-Gómez
Verified email at
Cited by
Cited by
Survey and taxonomy of botnet research through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013
Multivariate exploratory data analysis (MEDA) toolbox for Matlab
J Camacho, A Pérez-Villegas, RA Rodríguez-Gómez, E Jiménez-Mañas
Chemometrics and Intelligent Laboratory Systems 143, 49-57, 2015
Defense techniques for low-rate DoS attacks against application servers
G Maciá-Fernández, RA Rodríguez-Gómez, JE Díaz-Verdejo
Computer Networks 54 (15), 2711-2727, 2010
Optimal relay placement in multi-hop wireless networks
R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro
Ad Hoc Networks 46, 23-36, 2016
Group-wise principal component analysis for exploratory data analysis
J Camacho, RA Rodríguez-Gómez, E Saccenti
Journal of Computational and Graphical Statistics 26 (3), 501-512, 2017
Analysis of botnets through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P Garcia-Teodoro
Proceedings of the International Conference on Security and Cryptography …, 2011
Resource monitoring for the detection of parasite P2P botnets
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro, M Steiner, ...
Computer Networks 70, 302-311, 2014
NETA: evaluating the effects of NETwork attacks. MANETs as a case study
L Sánchez-Casado, RA Rodríguez-Gómez, R Magán-Carrión, ...
Advances in Security of Information and Communication Networks: First …, 2013
Scalability analysis of the white-rabbit technology for cascade-chain networks
F Torres-González, J Díaz, E Marín-López, R Rodriguez-Gómez
2016 IEEE International Symposium on Precision Clock Synchronization for …, 2016
ISP-enabled behavioral ad targeting without deep packet inspection
G Maciá-Fernández, Y Wang, R Rodríguez-Gómez, A Kuzmanovic
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection
G Maciá-Fernández, J Camacho, P García-Teodoro, ...
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
Extracting user web browsing patterns from non-content network traces: The online advertising case study
G Maciá-Fernández, Y Wang, RA Rodrı, A Kuzmanovic
Computer Networks 56 (2), 598-614, 2012
On understanding the existence of a deep torrent
RA Rodriguez-Gomez, G Macia-Fernandez, A Casares-Andres
IEEE Communications Magazine 55 (7), 64-69, 2017
Stochastic traffic identification for security management: edonkey protocol as a case study
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
Analysis and modelling of resources shared in the BitTorrent network
RA Rodríguez‐Gómez, G Maciá‐Fernández, L Sánchez‐Casado, ...
Transactions on Emerging Telecommunications Technologies 26 (10), 1189-1200, 2015
Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges
JA Gómez Hernández, P García Teodoro, R Magán Carrión, ...
Electronics 12 (21), 4494, 2023
Exploring Hidden Anomalies in UGR’16 Network Dataset with Kitsune
JG Medina-Arco, R Magán-Carrión, RA Rodríguez-Gómez
International Conference on Flexible Query Answering Systems, 194-205, 2023
Quality In/Quality Out: Assessing Data quality in an Anomaly Detection Benchmark
J Camacho, K Wasielewska, M Fuentes-García, R Rodríguez-Gómez
arXiv preprint arXiv:2305.19770, 2023
Proyecto FIDO: La Educación STEAM en las aulas del Grado de Educación Primaria.(ESTeam)
MA García Yeguas, JM Vílchez González, FJ Perales Palacios, ...
María Araceli García Yeguas, 2021
Protección de redes P2P mediante análisis de tráfico
R Rodríguez-Gómez
Universidad de Granada, 2014
The system can't perform the operation now. Try again later.
Articles 1–20