Publicaciones en las que colabora con Borja Sanz Urquijo (38)

2015

  1. Using dalvik opcodes for malware detection on android

    Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)

2013

  1. Buscadores on-line: de la recuperación de la información a la generación del conocimiento

    Revista DYNA, Vol. 88, Núm. 4, pp. 392-394

  2. Collective classification for packed executable identification

    Computer Systems Science and Engineering, Vol. 28, Núm. 1, pp. 25-36

  3. Collective classification for spam filtering

    Logic Journal of the IGPL, Vol. 21, Núm. 4, pp. 540-541

  4. Instance-based Anomaly Method for Android Malware Detection

    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013)

  5. Instance-based anomaly method for android malware detection

    ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings

  6. JURD: Joiner of Un-Readable Documents to Reverse Tokenization Attacks to Content-based Spam Filters

    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC)

  7. JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters

    2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013

  8. MADS: Malicious Android applications detection through string analysis

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  9. MAMA: Manifest analysis for malware detection in android

    Cybernetics and Systems, Vol. 44, Núm. 6-7, pp. 469-488

  10. Negobot: A conversational agent based on game theory for the detection of paedophile behaviour

    Advances in Intelligent Systems and Computing

  11. PUMA: Permission usage to detect malware in android

    Advances in Intelligent Systems and Computing

  12. Reversing the effects of tokenisation attacks against content-based spam filters

    International Journal of Security and Networks