Follow
pedro GARCIA TEODORO
pedro GARCIA TEODORO
Verified email at go.ugr.es - Homepage
Title
Cited by
Cited by
Year
Anomaly-based network intrusion detection: Techniques, systems and challenges
P Garcia-Teodoro, J Diaz-Verdejo, G Maciá-Fernández, E Vázquez
computers & security 28 (1-2), 18-28, 2009
23272009
Comunicaciones y redes de computadores
W Stallings
México: Pearson Educación,, 2004
11752004
Anomaly detection methods in wired networks: a survey and taxonomy
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
Computer Communications 27 (16), 1569-1584, 2004
2892004
UGR ‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs
G Maciá-Fernández, J Camacho, R Magán-Carrión, P García-Teodoro, ...
Computers & Security 73, 411-424, 2018
2322018
Survey and taxonomy of botnet research through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013
1742013
PCA-based multivariate statistical network monitoring for anomaly detection
J Camacho, A Pérez-Villegas, P García-Teodoro, G Maciá-Fernández
Computers & Security 59, 118-137, 2016
1612016
R-Locker: Thwarting ransomware action through a honeyfile-based approach
JA Gómez-Hernández, L Álvarez-González, P García-Teodoro
Computers & Security 73, 389-398, 2018
1552018
Measuring normality in HTTP traffic for anomaly-based intrusion detection
JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo
Computer Networks 45 (2), 175-193, 2004
1132004
Detection of web-based attacks through Markovian protocol parsing
JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo
10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005
1022005
Stochastic protocol modeling for anomaly based network intrusion detection
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003
962003
Mathematical model for low-rate DoS attacks against application servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro
IEEE Transactions on Information Forensics and Security 4 (3), 519-529, 2009
812009
Tackling the big data 4 vs for anomaly detection
J Camacho, G Macia-Fernandez, J Diaz-Verdejo, P Garcia-Teodoro
2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014
782014
Evaluation of a low-rate DoS attack against iterative servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro
Computer Networks 51 (4), 1013-1030, 2007
622007
Optimal relay placement in multi-hop wireless networks
R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro
Ad Hoc Networks 46, 23-36, 2016
542016
Evaluation of a low-rate DoS attack against application servers
G Macia-Fernandez, JE Díaz-Verdejo, P García-Teodoro
computers & security 27 (7-8), 335-354, 2008
492008
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
L Sánchez-Casado, G Maciá-Fernández, P Garcia-Teodoro, ...
Computer Networks 87, 44-58, 2015
472015
LoRDAS: A low-rate DoS attack against application servers
G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro, ...
Critical Information Infrastructures Security: Second International Workshop …, 2008
472008
A Dynamical Relay node placement solution for MANETs
R Magán-Carrión, J Camacho, P Garcia-Teodoro, EF Flushing, ...
Computer Communications 114, 36-50, 2017
352017
Identification of contamination zones for sinkhole detection in MANETs
L Sánchez-Casado, G Macia-Fernandez, P Garcia-Teodoro, ...
Journal of Network and Computer Applications 54, 62-77, 2015
342015
Transmisión de datos y redes de computadores
PG Teodoro, JED Verdejo, JML Soler
Pearson Educación, 2014
322014
The system can't perform the operation now. Try again later.
Articles 1–20