Borja Sanz Urquijo
Title
Cited by
Cited by
Year
Puma: Permission usage to detect malware in android
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, PG Bringas, G Álvarez
International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions …, 2013
2782013
Idea: Opcode-sequence-based malware detection
I Santos, F Brezo, J Nieves, YK Penya, B Sanz, C Laorden, PG Bringas
International Symposium on Engineering Secure Software and Systems, 35-43, 2010
2192010
On the automatic categorisation of android applications
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, PG Bringas
2012 IEEE Consumer communications and networking conference (CCNC), 149-153, 2012
1222012
MAMA: manifest analysis for malware detection in android
B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, J Nieves, PG Bringas, ...
Cybernetics and Systems 44 (6-7), 469-488, 2013
1022013
Enhanced topic-based vector space model for semantics-aware spam filtering
I Santos, C Laorden, B Sanz, PG Bringas
Expert Systems with applications 39 (1), 437-444, 2012
512012
Using opcode sequences in single-class learning to detect unknown malware
I Santos, F Brezo, B Sanz, C Laorden, PG Bringas
IET information security 5 (4), 220-227, 2011
512011
Opcode-sequence-based semi-supervised unknown malware detection
I Santos, B Sanz, C Laorden, F Brezo, PG Bringas
Computational Intelligence in Security for Information Systems, 50-57, 2011
462011
Study on the effectiveness of anomaly detection for spam filtering
C Laorden, X Ugarte-Pedrero, I Santos, B Sanz, J Nieves, PG Bringas
Information Sciences 277, 421-444, 2014
442014
Collective classification for packed executable identification
I Santos, X Ugarte-Pedrero, B Sanz, C Laorden, PG Bringas
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
422011
Countering entropy measure attacks on packed software detection
X Ugarte-Pedrero, I Santos, B Sanz, C Laorden, PG Bringas
2012 IEEE Consumer Communications and Networking Conference (CCNC), 164-168, 2012
332012
Using Dalvik opcodes for malware detection on Android
J Gaviria de la Puerta, B Sanz
Logic Journal of the IGPL 25 (6), 938-948, 2017
272017
Instance-based anomaly method for android malware detection
B Sanz, I Santos, X Ugarte-Pedrero, C Laorden, J Nieves, PG Bringas
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
252013
Mads: malicious android applications detection through string analysis
B Sanz, I Santos, J Nieves, C Laorden, I Alonso-Gonzalez, PG Bringas
International Conference on Network and System Security, 178-191, 2013
252013
Collective classification for spam filtering
C Laorden, B Sanz, I Santos, P Galán-García, PG Bringas
Computational Intelligence in Security for Information Systems, 1-8, 2011
252011
Word sense disambiguation for spam filtering
C Laorden, I Santos, B Sanz, G Alvarez, PG Bringas
Electronic Commerce Research and Applications 11 (3), 290-298, 2012
242012
Anomaly detection using string analysis for android malware detection
B Sanz, I Santos, X Ugarte-Pedrero, C Laorden, J Nieves, PG Bringas
International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 469-478, 2014
232014
Negobot: A conversational agent based on game theory for the detection of paedophile behaviour
C Laorden, P Galán-García, I Santos, B Sanz, JMG Hidalgo, PG Bringas
International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions …, 2013
202013
A threat model approach to threats and vulnerabilities in on-line social networks
C Laorden, B Sanz, G Alvarez, PG Bringas
Computational Intelligence in Security for Information Systems 2010, 135-142, 2010
192010
Tratamiento trombolítico del ictus isquémico agudo en un centro sin experiencia previa. Desarrollo de la organización interna y primeros resultados
JM Vallejo, MADL Cases, NG Barragán, BZ Sanz, MD Sánchez, ...
Revista clinica espanola 206 (10), 485-490, 2006
112006
An unsupervised approach to online noisy-neighbor detection in cloud data centers
T Lorido-Botran, S Huerta, L Tomás, J Tordsson, B Sanz
Expert Systems with Applications 89, 188-204, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20