Folgen
Félix Brezo, PhD
Félix Brezo, PhD
Threat Intelligence Lead @ Telefónica Tech
Bestätigte E-Mail-Adresse bei felixbrezo.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Opcode sequences as representation of executables for data-mining-based unknown malware detection
I Santos, F Brezo, X Ugarte-Pedrero, PG Bringas
information Sciences 231, 64-82, 2013
5632013
Idea: Opcode-sequence-based malware detection
I Santos, F Brezo, J Nieves, YK Penya, B Sanz, C Laorden, PG Bringas
Engineering Secure Software and Systems: Second International Symposium …, 2010
2912010
Opem: A static-dynamic approach for machine-learning-based malware detection
I Santos, J Devesa, F Brezo, J Nieves, PG Bringas
International joint conference CISIS’12-ICEUTE´ 12-SOCO´ 12 special sessions …, 2013
2512013
Issues and risks associated with cryptocurrencies such as Bitcoin
F Brezo, PG Bringas
The second international conference on social eco-informatics 20, 26, 2012
1012012
Using opcode sequences in single-class learning to detect unknown malware
I Santos, F Brezo, B Sanz, C Laorden, PG Bringas
IET information security 5 (4), 220-227, 2011
722011
Opcode-sequence-based semi-supervised unknown malware detection
I Santos, B Sanz, C Laorden, F Brezo, PG Bringas
Computational Intelligence in Security for Information Systems: 4th …, 2011
602011
Data leak prevention through named entity recognition
JM Gomez-Hidalgo, JM Martín-Abreu, J Nieves, I Santos, F Brezo, ...
2010 IEEE Second International Conference on Social Computing, 1129-1134, 2010
602010
Challenges and limitations in current botnet detection
F Brezo, I Santos, PG Bringas, JL del Val
2011 22nd International Workshop on Database and Expert Systems Applications …, 2011
152011
A supervised classification approach for detecting packets originated in a HTTP-based botnet
F Brezo, JG de la Puerta, X Ugarte-Pedrero, I Santos, PG Bringas
CLEI Electronic Journal 16 (3), 2-2, 2013
132013
Enhanced foundry production control
J Nieves, I Santos, YK Penya, F Brezo, PG Bringas
Database and Expert Systems Applications: 21st International Conference …, 2010
122010
Implementation state of HSTS and HPKP in both browsers and servers
S de los Santos, C Torrano, Y Rubio, F Brezo
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
112016
Noa: An information retrieval based malware detection system
I Santos, X Ugarte-Pedrero, F Brezo, PG Bringas, JM Gómez-Hidalgo
Computing and Informatics 32 (1), 145-174, 2013
102013
Aplicaciones ciberdelictivas de criptodivisas como Bitcoin
F Brezo, DT Computing
Centro de Análisis y Prospectiva, Guardia Civil, España, 2012
62012
C&C Techniques in Botnet Development
F Brezo, JG De La Puerta, I Santos, D Barroso, PG Bringas
International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions …, 2013
42013
The T-Factor-New Technologies and Intelligence Analysis Learning
JM Blanco, J Cohen, Y Rubio, F Brezo
Special Issue 4 Eur. L. Enf't Rsch. Bull., 75, 2019
32019
Supervised classification of packets coming from a http botnet
F Brezo, JG de la Puerta, X Ugarte-Pedrero, I Santos, PG Bringas, ...
2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 1-8, 2012
32012
La utilización de herramientas de monitorización de usuarios como base para el perfilado de identidades en fuentes abiertas: OSRFramework
YR Viñuela, FB Fernández
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad …, 2015
12015
Herramientas de apoyo a la infraestructura tecnológica de los grupos organizados que operan en la red
FB Fernández, YR Viñuela
Cuadernos de la Guardia Civil: Revista de seguridad pública, 27-47, 2015
12015
Blanqueo de capitales y TIC: marco jurídico nacional y europeo, modus operandi y criptomonedas: ciberlaundry, informe de situación
D Fernández Bermejo, C Mallada Fernández, X Pérez López, F Brezo, ...
Blanqueo de capitales y TIC: marco jurídico nacional y europeo, modus …, 2019
2019
Empresas que buscan Bitcoin sin saberlo
FB Fernández
Consejeros: la revista del buen gobierno y la responsabilidad corporativa, 46-47, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20