Survey and taxonomy of botnet research through life-cycle RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013 | 175 | 2013 |
Multivariate exploratory data analysis (MEDA) toolbox for Matlab J Camacho, A Pérez-Villegas, RA Rodríguez-Gómez, E Jiménez-Mañas Chemometrics and Intelligent Laboratory Systems 143, 49-57, 2015 | 62 | 2015 |
Defense techniques for low-rate DoS attacks against application servers G Maciá-Fernández, RA Rodríguez-Gómez, JE Díaz-Verdejo Computer Networks 54 (15), 2711-2727, 2010 | 58 | 2010 |
Optimal relay placement in multi-hop wireless networks R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro Ad Hoc Networks 46, 23-36, 2016 | 54 | 2016 |
Group-wise principal component analysis for exploratory data analysis J Camacho, RA Rodríguez-Gómez, E Saccenti Journal of Computational and Graphical Statistics 26 (3), 501-512, 2017 | 38 | 2017 |
NETA: evaluating the effects of NETwork attacks. MANETs as a case study L Sánchez-Casado, RA Rodríguez-Gómez, R Magán-Carrión, ... Advances in Security of Information and Communication Networks: First …, 2013 | 25 | 2013 |
Analysis of botnets through life-cycle RA Rodríguez-Gómez, G Maciá-Fernández, P Garcia-Teodoro Proceedings of the International Conference on Security and Cryptography …, 2011 | 23 | 2011 |
Resource monitoring for the detection of parasite P2P botnets RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro, M Steiner, ... Computer Networks 70, 302-311, 2014 | 21 | 2014 |
Scalability analysis of the white-rabbit technology for cascade-chain networks F Torres-González, J Díaz, E Marín-López, R Rodriguez-Gómez 2016 IEEE International Symposium on Precision Clock Synchronization for …, 2016 | 14 | 2016 |
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection G Maciá-Fernández, J Camacho, P García-Teodoro, ... 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 13 | 2016 |
ISP-enabled behavioral ad targeting without deep packet inspection G Maciá-Fernández, Y Wang, R Rodríguez-Gómez, A Kuzmanovic 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 12 | 2010 |
Extracting user web browsing patterns from non-content network traces: The online advertising case study G Maciá-Fernández, Y Wang, RA Rodrı, A Kuzmanovic Computer Networks 56 (2), 598-614, 2012 | 10 | 2012 |
Crypto-ransomware: A revision of the state of the art, advances and challenges JA Gómez Hernández, P García Teodoro, R Magán Carrión, ... Electronics 12 (21), 4494, 2023 | 8 | 2023 |
On understanding the existence of a deep torrent RA Rodriguez-Gomez, G Macia-Fernandez, A Casares-Andres IEEE Communications Magazine 55 (7), 64-69, 2017 | 5 | 2017 |
Stochastic traffic identification for security management: edonkey protocol as a case study RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 2 | 2013 |
Exploring Hidden Anomalies in UGR’16 Network Dataset with Kitsune JG Medina-Arco, R Magán-Carrión, RA Rodríguez-Gómez International Conference on Flexible Query Answering Systems, 194-205, 2023 | 1 | 2023 |
Analysis and modelling of resources shared in the BitTorrent network RA Rodríguez‐Gómez, G Maciá‐Fernández, L Sánchez‐Casado, ... Transactions on Emerging Telecommunications Technologies 26 (10), 1189-1200, 2015 | 1 | 2015 |
HoDiNT: Distributed architecture for collection and analysis of Internet Background Radiation R García-Peñas, RA Rodríguez-Gómez, G Maciá-Fernández Computer Networks, 110570, 2024 | | 2024 |
Coupled Design and Analysis of Experiments in Network Management R Adán-López, D Fernández-Martínez, RA Rodríguez-Gómez, ... NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024 | | 2024 |
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems JG Medina-Arco, R Magán-Carrión, RA Rodríguez-Gómez, ... Sensors 24 (2), 479, 2024 | | 2024 |