CAFE
CIBERSEGURIDAD. APLICACIONES, FUNDAMENTOS Y EDUCACIÓN
Publications (24) Publications in which a researcher has participated
2025
-
Application of Transfer Learning to Online Models in Malware Detection
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2024
-
A mathematical analysis about the geo-temporal characterization of the multi-class maliciousness of an IP address
Wireless Networks, Vol. 30, Núm. 6, pp. 5033-5048
-
Transfer and online learning for IP maliciousness prediction in a concept drift scenario
Wireless Networks, Vol. 30, Núm. 9, pp. 7423-7444
2023
-
An effectiveness analysis of transfer learning for the concept drift problem in malware detection
Expert Systems with Applications, Vol. 212
-
Application of Anomaly Detection Models to Malware Detection in the Presence of Concept Drift
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Characterization of threats in IoT from an MQTT protocol-oriented dataset
Complex and Intelligent Systems, Vol. 9, Núm. 5, pp. 5281-5296
-
Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift
Computational and Mathematical Methods, Vol. 2023
2022
-
Measuring the Quality Information of Sources of Cybersecurity by Multi-Criteria Decision Making Techniques
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
On directional accuracy of some methods to forecast time series of cybersecurity aggregates
Logic Journal of the IGPL, Vol. 30, Núm. 6, pp. 954-964
2021
-
A data quality assessment model and its application to cybersecurity data sources
Advances in Intelligent Systems and Computing
-
On Aggregation and Prediction of Cybersecurity Incident Reports
IEEE Access, Vol. 9, pp. 102636-102648
-
Optimal feature configuration for dynamic malware detection
Computers and Security, Vol. 105
-
Prototipo de IDS para detección de intrusiones con modelos de machine learning en sistemas IoT de la Industria 4.0
Revista DYNA, Vol. 96, Núm. 3, pp. 270-275
2020
-
Machine learning for automatic assignment of the severity of cybersecurity events
Computational and Mathematical Methods
-
On fingerprinting of public malware analysis services
Logic Journal of the IGPL, Vol. 28, Núm. 4, pp. 473-486
2019
-
Algebraic properties of the block cipher DESL
Symmetry, Vol. 11, Núm. 11
-
From key encapsulation to authenticated group key establishment-A compiler for post-quantum primitives
Entropy, Vol. 21, Núm. 12
-
Integrating classical preprocessing into an optical encryption scheme
Entropy, Vol. 21, Núm. 9
2018
-
Assessment of the recent postgraduates in cybersecurity on barriers and required skills for their early career
Advances in Intelligent Systems and Computing
-
Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
Robotics and Autonomous Systems, Vol. 99, pp. 75-83