The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jesús E. Díaz-Verdejo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:512-526 [Conf]
  2. F. J. Salcedo, Jesús E. Díaz-Verdejo, José C. Segura
    Musical Style Recognition by Detection of Compass. [Citation Graph (0, 0)][DBLP]
    IbPRIA, 2003, pp:876-883 [Conf]
  3. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:841-850 [Conf]
  4. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:282-291 [Conf]
  5. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Detection of Web-Based Attacks through Markovian Protocol Parsing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:457-462 [Conf]
  6. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Juan M. Estévez-Tapiador
    PIM-DM Cost Analysis in Loop Free Topologies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:719-723 [Conf]
  7. Jesús E. Díaz-Verdejo, A. Peinado Herreros, J. C. Segura Luna, M. C. Benítez Ortüzar, A. Rubio Ayuso
    Recurrent Neural Networks for Speech Recognition. [Citation Graph (0, 0)][DBLP]
    IWANN, 1991, pp:361-369 [Conf]
  8. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:3-12 [Conf]
  9. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    On the Design of a Low-Rate DoS Attack Against Iterative Servers. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:149-156 [Conf]
  10. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Low Rate DoS Attack to Monoprocess Servers. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:43-57 [Conf]
  11. M. Bermúdez-Edo, R. Salazar-Hernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:210-221 [Conf]
  12. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    NSDF: a computer network system description framework and its application to network security. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:5, pp:573-600 [Journal]
  13. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Measuring normality in HTTP traffic for anomaly-based intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:2, pp:175-193 [Journal]
  14. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Anomaly detection methods in wired networks: a survey and taxonomy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1569-1584 [Journal]
  15. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Evaluation of a low-rate DoS attack against iterative servers. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:4, pp:1013-1030 [Journal]

  16. LoRDAS: A Low-Rate DoS Attack against Application Servers. [Citation Graph (, )][DBLP]


  17. Features Extraction for Music Notes Recognition using Hidden Markov Models. [Citation Graph (, )][DBLP]


  18. Environmental Security in P2P Networks. [Citation Graph (, )][DBLP]


  19. Anomaly Detection in P2P Networks Using Markov Modelling. [Citation Graph (, )][DBLP]


  20. Evaluation of a low-rate DoS attack against application servers. [Citation Graph (, )][DBLP]


  21. Anomaly-based network intrusion detection: Techniques, systems and challenges. [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.027secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002