NESG

Icono Icono

Icono Icono
Filter by:

2011

  • Verdejo, J. E., García-Teodoro, P. & Campos, F. J (2011). Multiple vector classification for P2P traffic identification. In, pages 5-13. [More] [Bibtex]
  • Camacho, J., de la Torre, P. P. & Verdejo, J. E (2011). Exploratory data analysis: a latent subspace approach. In Proc. Fitfh Int. Chemometrics Research Meeting, pages 27. [More] [Bibtex]
  • Verdejo, J. E., García-Teodoro, P. & Campos, F. J (2011). Evaluación de la configuración de clasificadores KNN para la detección de flujos P2P. In Actas de las X Jornadas de Ingeniería Telemática, JITEL 2011, pages 268-275. [More] [Bibtex]
  • Rodríguez-Gómez, R. A., Maciá-Fernández, G. & García-Teodoro, P (2011). Analysis of Botnets through Life-cycle. In of SECRYPT 2011, P. (editor), pages 257-262. [More] [Bibtex]
  • Camacho, J., de la Torre, P. P., Campos, F. J., Verdejo, J. E. & García-Teodoro, P (2011). Estudio exploratorio de la capacidad de discriminación de tráfico P2P usando reglas de similitud entre flujos. In Actas de las X Jornadas de Ingeniería Telemática, pages 252-259. [More] [Bibtex]
  • Camacho, J. (2011). Observation-based missing data methods for exploratory data analysis to unveil the connection between observations and variables in latent subspace models. Journal of Chemometrics, 25(11), 592-600. [More] [Digital version] [Bibtex]
  • Camacho, J., de la Torre, P. P. & Verdejo, J. E. (2011). Least-squares approximation of a space distribution for a given covariance and latent sub-space. Chemometrics and Intelligent Laboratory Systems, 105(2), 171 - 180. [More] [Digital version] [Bibtex]
  • Casado, L. S., Maciá-Fernández, G. & García-Teodoro, P (2011). Caracterización de Servicios en Redes Ad-Hoc Inalámbricas mediante Métricas Cross-Layer. In X Jornadas de Ingeniería Telemática (JITEL 2011), pages 381-384. [More] [Bibtex]

2010

  • Castellano, L. G. & Verdejo, J. E. (2010). Inferencia de autómatas de estados finitos para el modelado del protocolo Edonkey. Master Thesis. [More] [Bibtex]
  • Puga, J. F., Maciá-Fernández, G., Grilo, A. & Tiglao, N. M (2010). Transmisión Eficiente de datos multimedia en redes inalámbricas de sensores. In de Ingeniería Telemática, I. J. & 2010, J. (editors), pages 1-10. [More] [Digital version] [Bibtex]
  • Camacho, J. & Verdejo, J. E (2010). Principal component analysis for very large datasets. In Proc. VII Colloquium Chemiometricum Mediterraneum, pages 5-13. [More] [Bibtex]
  • Maciá-Fernández, G., Wang, Y., Rodríguez-Gómez, R. A. & Kuzmanovic, A (2010). ISP-enabled behavioral ad targeting without deep packet inspection. In Proceedings of the 29th conference on Information communications, INFOCOM 2010. IEEE Press. [More] [Digital version] [Bibtex]
  • García-Teodoro, P., Feldstedt, P. M. & Zúñiga, D. R (2010). Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents. In Proc. of Sixth Advanced International Conference on Telecommunications (AICT), pages 370-375. [More] [Bibtex]
  • Hernández, R. S. & Verdejo, J. E (2010). Anonimización de payloads para el desarrollo de AIDS basados en protocolos. In Actas de las X Jornadas de Ingeniería Telemática, pages 252-259. [More] [Bibtex]
  • Wang, Y., Burgener, D., Kuzmanovic, A. & Maciá-Fernández, G (2010). Analyzing Content-Level Properties of the Web Adversphere. In Proceedings of the WWW'2010, pages 1201-1202. [More] [Digital version] [Bibtex]
  • Camacho, J. (2010). Missing-data theory in the context of exploratory data analysis. Chemometrics and Intelligent Laboratory Systems, 103(1), 8 - 18. [More] [Digital version] [Bibtex]
  • Salazar-Hernández, R. & Verdejo, J. E. (2010). Hybrid detection of application layer attacks using Markov models for normality and attacks. Lect. Notes in Computer Science, 6476(416-429). [More] [Bibtex]
  • Puga, J. F., Maciá-Fernández, G., Grilo, A. & Tiglao, N. M (2010). Efficient Multimedia Transmission in Wireless Sensor Networks. In of the NGI'2010, P. (editor). [More] [Digital version] [Bibtex]
  • Maciá-Fernández, G., Rodríguez-Gómez, R. A. & Verdejo, J. E. (2010). Defense techniques for low-rate DoS attacks against application servers. Computer Networks, 54, 2711-2727. [More] [Digital version] [Bibtex]

2009

Results 201 - 225 of 264