Anomaly-based network intrusion detection: Techniques, systems and challenges P Garcia-Teodoro, J Diaz-Verdejo, G Maciá-Fernández, E Vázquez computers & security 28 (1-2), 18-28, 2009 | 2438 | 2009 |
Anomaly detection methods in wired networks: a survey and taxonomy JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo Computer Communications 27 (16), 1569-1584, 2004 | 291 | 2004 |
A model-based survey of alert correlation techniques S Salah, G Maciá-Fernández, JE Díaz-Verdejo Computer Networks 57 (5), 1289-1317, 2013 | 194 | 2013 |
Measuring normality in HTTP traffic for anomaly-based intrusion detection JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo Computer Networks 45 (2), 175-193, 2004 | 114 | 2004 |
Detection of web-based attacks through Markovian protocol parsing JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo 10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005 | 104 | 2005 |
Stochastic protocol modeling for anomaly based network intrusion detection JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003 | 97 | 2003 |
Mathematical model for low-rate DoS attacks against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro IEEE Transactions on Information Forensics and Security 4 (3), 519-529, 2009 | 85 | 2009 |
Tackling the big data 4 vs for anomaly detection J Camacho, G Macia-Fernandez, J Diaz-Verdejo, P Garcia-Teodoro 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2014 | 83 | 2014 |
A multilevel taxonomy and requirements for an optimal traffic‐classification model J Khalife, A Hajjar, J Diaz‐Verdejo International Journal of Network Management 24 (2), 101-120, 2014 | 71 | 2014 |
Evaluation of a low-rate DoS attack against iterative servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro Computer Networks 51 (4), 1013-1030, 2007 | 65 | 2007 |
Defense techniques for low-rate DoS attacks against application servers G Maciá-Fernández, RA Rodríguez-Gómez, JE Díaz-Verdejo Computer Networks 54 (15), 2711-2727, 2010 | 60 | 2010 |
On the detection capabilities of signature-based intrusion detection systems in the context of web attacks J Díaz-Verdejo, J Muñoz-Calle, A Estepa Alonso, R Estepa Alonso, ... Applied Sciences 12 (2), 852, 2022 | 58 | 2022 |
Evaluation of a low-rate DoS attack against application servers G Macia-Fernandez, JE Díaz-Verdejo, P García-Teodoro computers & security 27 (7-8), 335-354, 2008 | 50 | 2008 |
LoRDAS: A low-rate DoS attack against application servers G Maciá-Fernández, JE Díaz-Verdejo, P García-Teodoro, ... Critical Information Infrastructures Security: Second International Workshop …, 2008 | 50 | 2008 |
Albayzin: a task-oriented spanish speech corpus JED Verdejo, AM Peinado, AJ Rubio, E Segarra, N Prieto, FC Nolla First International Conference on language resources & evaluation: Granada …, 1998 | 43 | 1998 |
Network traffic application identification based on message size analysis A Hajjar, J Khalife, J Díaz-Verdejo Journal of Network and Computer Applications 58, 130-143, 2015 | 41 | 2015 |
Performance of opendpi in identifying sampled network traffic J Khalife, A Hajjar, J Díaz-Verdejo Journal of Networks 8 (1), 71, 2013 | 37 | 2013 |
Transmisión de datos y redes de computadores PG Teodoro, JED Verdejo, JML Soler Pearson Educación, 2014 | 33 | 2014 |
An application of minimum classification error to feature space transformations for speech recognition A de la Torre, AM Peinado, AJ Rubio, VE Sánchez, JE Diaz Speech Communication 20 (3-4), 273-290, 1996 | 31 | 1996 |
Development of task oriented spanish speech corpora J Diaz, A Rubio, A Peinado, E Segarra, N Prieto, F Casacuberta Proceedings of EUROSPEECH 93, 1993 | 31 | 1993 |