Publications

(2019). Territorial innovation models: to be or not to be, that’s the question. Scientometrics.

PDF DOI

(2019). Surface Defect Modelling Using Co-occurrence Matrix and Fast Fourier Transformation. International Conference on Hybrid Artificial Intelligence Systems.

(2019). How IoT and computer vision could improve the casting quality. Proceedings of the 9th International Conference on the Internet of Things - IoT 2019.

PDF DOI

(2019). Hic sunt dracones: derechos humanos y big data: análisis de una colaboración inexplorada. Retos Emergentes de los Derechos Humanos: ¿Garantías en Peligro?Garro Carrera, Enara; Landa Gorostiza, Jon-Mirena.

PDF

(2017). Using Dalvik opcodes for malware detection on Android. Logic Journal of the IGPL.

(2017). An unsupervised approach to online noisy-neighbor detection in cloud data centers. Expert Systems with Applications.

(2015). Negobot: Detecting paedophile activity with a conversational agent based on game theory. Logic Journal of IGPL.

PDF DOI

(2015). The evolution of permission as feature for Android malware detection. Computational Intelligence in Security for Information Systems Conference.

(2014). Validation of a ce marked tool (seqpro lipo rs) based on next generation sequencing for diagnosis of familial hypercholesterolemia. Atherosclerosis.

(2014). Study on the effectiveness of anomaly detection for spam filtering. Information Sciences.

(2014). On the adoption of anomaly detection for packed executable filtering. Computers & Security.

(2014). Anomaly Detection Using String Analysis for Android Malware Detection. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13.

PDF DOI

(2014). An Empirical Study on Word Sense Disambiguation for Adult Content Filtering. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14.

PDF DOI

(2013). Anomaly Detection using String Analysis for Android Malware Detection. 6th International Conference on Computational Intelligence in Security for Information Systems (CISIS).

DOI

(2013). MAMA: Manifest Analysis for Malware Detection in Android. Cybernetics and Systems: An International Journal.

PDF

(2013). Instance-based Anomaly Method for Android Malware Detection. 10th International Conference on Security and Cryptography (SECRYPT).

PDF

(2013). MADS: Malicious Android Applications Detection through String Analysis. 7th International Conference, NSS 2013.

DOI

(2013). Collective Classification for Spam Filtering. 4th International Conference, CISIS 2011, Held at IWANN 2011.

PDF DOI

(2013). JURD: Joiner of Un-Readable Documents to Reverse Tokenization Attacks to Content-based Spam Filters. Consumer Communications and Networking Conference (CCNC), 2013 IEEE.

DOI

(2013). Collective Classification for Packed Executable Identification. International Journal of Computer Systems Science & Engineering.

PDF

(2012). PUMA: Permission Usage to detect Malware in Android. 5th International Conference on Computational Intelligence in Security for Information Systems (CISIS).

DOI

(2012). Word Sense Disambiguation for Spam Filtering. Electronic Commerce Research and Applications.

DOI

(2012). Collective Classification for the Prediction of Microshrinkages in Foundry Production. World Automation Congress (WAC), 2012.

(2012). On the Study of Anomaly-based Spam Filtering Using Spam as Representation of Normality. 3rd Consumer Communications and Network Conference (CCNC) Research Student Workshop.

DOI

(2012). On the Automatic Categorisation of Android Applications. 9th IEEE Consumer Communications and Networking Conference(CCNC2012).

DOI

(2012). Enhanced Topic-based Vector Space Model for Semantics-aware Spam Filtering. Expert Systems With Applications.

DOI

(2012). Countering Entropy Measure Attacks on Packed Software Detection. 9th IEEE Consumer Communications and Networking Conference(CCNC2012).

DOI

(2011). Using Opcode Sequences in Single-Class Learning to Detect Unknown Malware. IET Information Security.

DOI

(2011). Enhancing Scalability in Anomaly-based Email Spam Filtering. 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS).

DOI

(2011). Collective Classification for Packed Executable Identification. 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS).

DOI

(2011). Anomaly-based Spam Filtering. 6th International Conference on Security and Cryptography (SECRYPT).

(2011). Opcode-sequence-based Semi-supervised Unknown Malware Detection. 4th International Conference, CISIS 2011, Held at IWANN 2011.

DOI

(2010). A Threat Model Approach to Attacks and Countermeasures in On-line Social Networks. 11th Reunion Española de Criptografía y Seguridad de la Información (RECSI).

PDF

(2010). Opcode-sequence-based Malware Detection. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS).

DOI

(2010). A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks. 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10).

DOI