Rafael A. Rodríguez-Gómez
Rafael A. Rodríguez-Gómez
Verified email at
Cited by
Cited by
Survey and taxonomy of botnet research through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013
Multivariate exploratory data analysis (MEDA) toolbox for Matlab
J Camacho, A Pérez-Villegas, RA Rodríguez-Gómez, E Jiménez-Mañas
Chemometrics and Intelligent Laboratory Systems 143, 49-57, 2015
Defense techniques for low-rate DoS attacks against application servers
G Maciá-Fernández, RA Rodríguez-Gómez, JE Díaz-Verdejo
Computer Networks 54 (15), 2711-2727, 2010
Optimal relay placement in multi-hop wireless networks
R Magán-Carrión, RA Rodríguez-Gómez, J Camacho, P García-Teodoro
Ad Hoc Networks 46, 23-36, 2016
Group-wise principal component analysis for exploratory data analysis
J Camacho, RA Rodríguez-Gómez, E Saccenti
Journal of Computational and Graphical Statistics 26 (3), 501-512, 2017
NETA: evaluating the effects of NETwork attacks. MANETs as a case study
L Sánchez-Casado, RA Rodríguez-Gómez, R Magán-Carrión, ...
Advances in Security of Information and Communication Networks: First …, 2013
Analysis of botnets through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández, P Garcia-Teodoro
Proceedings of the International Conference on Security and Cryptography …, 2011
Resource monitoring for the detection of parasite P2P botnets
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro, M Steiner, ...
Computer Networks 70, 302-311, 2014
Scalability analysis of the white-rabbit technology for cascade-chain networks
F Torres-González, J Díaz, E Marín-López, R Rodriguez-Gómez
2016 IEEE International Symposium on Precision Clock Synchronization for …, 2016
Hierarchical PCA-based multivariate statistical network monitoring for anomaly detection
G Maciá-Fernández, J Camacho, P García-Teodoro, ...
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
ISP-enabled behavioral ad targeting without deep packet inspection
G Maciá-Fernández, Y Wang, R Rodríguez-Gómez, A Kuzmanovic
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Extracting user web browsing patterns from non-content network traces: The online advertising case study
G Maciá-Fernández, Y Wang, RA Rodrı, A Kuzmanovic
Computer Networks 56 (2), 598-614, 2012
Crypto-ransomware: A revision of the state of the art, advances and challenges
JA Gómez Hernández, P García Teodoro, R Magán Carrión, ...
Electronics 12 (21), 4494, 2023
On understanding the existence of a deep torrent
RA Rodriguez-Gomez, G Macia-Fernandez, A Casares-Andres
IEEE Communications Magazine 55 (7), 64-69, 2017
Stochastic traffic identification for security management: edonkey protocol as a case study
RA Rodríguez-Gómez, G Maciá-Fernández, P García-Teodoro
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
Exploring Hidden Anomalies in UGR’16 Network Dataset with Kitsune
JG Medina-Arco, R Magán-Carrión, RA Rodríguez-Gómez
International Conference on Flexible Query Answering Systems, 194-205, 2023
Analysis and modelling of resources shared in the BitTorrent network
RA Rodríguez‐Gómez, G Maciá‐Fernández, L Sánchez‐Casado, ...
Transactions on Emerging Telecommunications Technologies 26 (10), 1189-1200, 2015
HoDiNT: Distributed architecture for collection and analysis of Internet Background Radiation
R García-Peñas, RA Rodríguez-Gómez, G Maciá-Fernández
Computer Networks, 110570, 2024
Coupled Design and Analysis of Experiments in Network Management
R Adán-López, D Fernández-Martínez, RA Rodríguez-Gómez, ...
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems
JG Medina-Arco, R Magán-Carrión, RA Rodríguez-Gómez, ...
Sensors 24 (2), 479, 2024
The system can't perform the operation now. Try again later.
Articles 1–20