default search action
Roberto Magán-Carrión
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro:
Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features. Log. J. IGPL 32(2): 263-280 (2024) - [j12]Joaquín Gaspar Medina-Arco, Roberto Magán-Carrión, Rafael Alejandro Rodríguez-Gómez, Pedro García-Teodoro:
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems. Sensors 24(2): 479 (2024) - 2023
- [c12]Joaquín Gaspar Medina-Arco, Roberto Magán-Carrión, Rafael A. Rodríguez-Gómez:
Exploring Hidden Anomalies in UGR'16 Network Dataset with Kitsune. FQAS 2023: 194-205 - [c11]Roberto Magán-Carrión, Marta Fuentes-García, Celia Fernández, Patricia Maldonado-Mancilla:
SIMAGRO: A Prototype for Network Anomaly Detection in Agrifood IoT Environments. WF-IoT 2023: 1-6 - 2022
- [j11]Emilio Figueras-Martín, Roberto Magán-Carrión, Juan Boubeta-Puig:
Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study. J. Inf. Secur. Appl. 68: 103229 (2022) - [j10]Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro:
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration. IEEE Trans. Emerg. Top. Comput. 10(4): 1717-1732 (2022) - [c10]Francisco Álvarez-Terribas, Roberto Magán-Carrión, Gabriel Maciá-Fernández, Antonio Miguel Mora García:
A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study. CISIS-ICEUTE 2022: 192-201 - 2021
- [j9]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: A connectivity analysis. Comput. Networks 194: 108158 (2021) - [j8]Soufiane Sail, Roberto Magán-Carrión, Inmaculada Medina-Bulo, Halima Bouden:
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring. J. Inf. Secur. Appl. 58: 102785 (2021) - [c9]Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro:
Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs. CISIS-ICEUTE 2021: 116-125 - [i3]Roberto Magán-Carrión, Alberto Abellán-Galera, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Unveiling the I2P web structure: a connectivity analysis. CoRR abs/2101.03212 (2021) - [i2]Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro:
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration. CoRR abs/2112.02080 (2021) - 2020
- [j7]Roberto Magán-Carrión, José Camacho, Gabriel Maciá-Fernández, Ángel Ruíz-Zafra:
Multivariate Statistical Network Monitoring-Sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems. Int. J. Distributed Sens. Networks 16(5) (2020) - [c8]Ángel Ruiz-Zafra, Roberto Magán-Carrión:
A Distributed Digital Object Architecture to Support Secure IoT Ecosystems. OLA 2020: 195-205
2010 – 2019
- 2019
- [i1]Roberto Magán-Carrión, José Camacho, Ángel Ruíz-Zafra:
MSNM-S: An Applied Network Monitoring Tool for Anomaly Detection in Complex Networks and Systems. CoRR abs/1907.13612 (2019) - 2018
- [j6]Gabriel Maciá-Fernández, José Camacho, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73: 411-424 (2018) - [c7]Roberto Magán-Carrión, Bernabé Dorronsoro:
On the Way of Protecting MANETs Against Security Threats: A Proactive Approach. PAAMS 2018: 331-334 - 2017
- [j5]Roberto Magán-Carrión, José Camacho, Pedro García-Teodoro, Eduardo Feo Flushing, Gianni A. Di Caro:
A Dynamical Relay node placement solution for MANETs. Comput. Commun. 114: 36-50 (2017) - [c6]Roberto Therón, Roberto Magán-Carrión, José Camacho, Gabriel Maciá-Fernández:
Network-wide intrusion detection supported by multivariate analysis and interactive visualization. VizSEC 2017: 1-8 - 2016
- [j4]Roberto Magán-Carrión, Rafael A. Rodríguez-Gómez, José Camacho, Pedro García-Teodoro:
Optimal relay placement in multi-hop wireless networks. Ad Hoc Networks 46: 23-36 (2016) - [c5]Roberto Magán-Carrión, José Camacho, Pedro García-Teodoro, Eduardo Feo Flushing, Gianni A. Di Caro:
DRNS: Dynamical Relay Node Placement Solution. PAAMS 2016: 273-276 - 2015
- [j3]Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Roberto Magán-Carrión:
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Comput. Networks 87: 44-58 (2015) - [j2]Roberto Magán-Carrión, José Camacho-Páez, Pedro García-Teodoro:
Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 672124:1-672124:20 (2015) - 2014
- [c4]Roberto Magán-Carrión, José Camacho-Páez, Pedro García-Teodoro:
A Multiagent Self-healing System against Security Incidents in MANETs. PAAMS (Workshops) 2014: 321-332 - 2013
- [j1]Roberto Magán-Carrión, Fernando Pulido-Pulido, José Camacho, Pedro García-Teodoro:
Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies. J. Commun. 8(11): 738-750 (2013) - [c3]Roberto Magán-Carrión, José Camacho-Páez, Pedro Garcia-Teodoro:
A Security Response Approach Based on the Deployment of Mobile Agents. PAAMS 2013: 182-191 - [c2]Roberto Magán-Carrión, José Camacho-Páez, Pedro Garcia-Teodoro:
A Security Response Approach Based on the Deployment of Mobile Agents: A Practical Vision. PAAMS 2013: 308-311 - [c1]Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión, Gabriel Maciá-Fernández:
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study. SecNet 2013: 1-10
Coauthor Index
aka: Pedro Garcia-Teodoro
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint