Publicaciones en las que colabora con Laura Guillén Aguinaga (203)

2015

  1. A model for scale-free networks: Application to twitter

    Entropy, Vol. 17, Núm. 8, pp. 5848-5867

  2. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks, Vol. 8, Núm. 16, pp. 2750-2767

2014

  1. Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps

    Communications in Nonlinear Science and Numerical Simulation, Vol. 19, Núm. 7, pp. 2345-2353

2013

  1. MAMA: Manifest analysis for malware detection in android

    Cybernetics and Systems, Vol. 44, Núm. 6-7, pp. 469-488

  2. PUMA: Permission usage to detect malware in android

    Advances in Intelligent Systems and Computing

2012

  1. BlackHat SEO: técnicas de hacking para inflar resultados en Google

    PC world profesional, Núm. 294, pp. 50-56

  2. Extensiones de seguridad para los navegadores: aumenta la seguridad de serie de tu navegador

    PC world profesional, Núm. 296, pp. 40-49

  3. Word sense disambiguation for spam filtering

    Electronic Commerce Research and Applications, Vol. 11, Núm. 3, pp. 290-298

2011

  1. Amenazas 2.0 para la biblioteca 2.0

    V Congreso Nacional de Bibliotecas Públicas: Biblioteca pública y contenidos digitales. Retos y oportunidades

  2. An efficient Security Solution for Dealing with Shortened URL Analysis

    WOSIS 2011: SECURITY IN INFORMATION SYSTEMS

  3. An efficient security solution for dealing with shortened URL analysis

    Proceedings of the 8th International Workshop on Security in Information Systems, WOSIS 2011, in Conjunction with ICEIS 2011

  4. Análisis de la influencia en Twitter: las métricas que revelan la influencia de los tuiteros

    PC world profesional, Núm. 289, pp. 46-52

  5. Application of the generic feature selection measure in detection of web attacks

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  6. Applying Feature Selection to Payload-Based Web Application Firewalls

    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL WORKSHOP ON SECURITY AND COMMUNICATION NETWORKS (IWSCN 2011)

  7. Applying feature selection to payload-based Web Application Firewalls

    Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011

  8. CAPTCHAs. An Artificial Intelligence Application to Web Security

    , pp. 109-181

  9. Cryptanalysis of a family of self-synchronizing chaotic stream ciphers

    Communications in Nonlinear Science and Numerical Simulation, Vol. 16, Núm. 2, pp. 805-813

  10. Filtrado de contenidos web: ¿cómo evitar el exceso de tráfico no deseado en nuestra red?. Seguridad y protección del ancho de banda, principales ventajas

    PC world profesional, Núm. 284, pp. 108-114

  11. Las redes sociales toman la sala de conferencias: Backchannel: de presentaciones a conversaciones

    PC world profesional, Núm. 283, pp. 44-49