default search action
Jesús Esteban Díaz Verdejo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Jesús Esteban Díaz Verdejo, Rafael Estepa, Antonio Estepa Alonso, Javier Muñoz-Calle:
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests. EICC 2024: 82-89 - [c37]Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia:
Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development. EICC 2024: 217-218 - [c36]Jesús E. Díaz Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso:
InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files. SECRYPT 2024: 692-697 - 2023
- [j27]Jesús Esteban Díaz Verdejo, Rafael Estepa, Antonio Jose Estepa Alonso, Germán Madinabeitia:
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges. Comput. Secur. 124: 102997 (2023) - [j26]Agustín Walabonso Lara Romero, Vicente Mayor, Rafael Estepa, Antonio Jose Estepa, Jesús Esteban Díaz Verdejo:
Smart home anomaly-based IDS: Architecture proposal and case study. Internet Things 22: 100773 (2023) - [c35]Elvira Castillo-Fernández, Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia:
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation. EICC 2023: 1-6 - [c34]Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo:
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. EICC 2023: 65-70 - 2020
- [j25]Rafael Estepa, Jesús Esteban Díaz Verdejo, Antonio Jose Estepa, Germán Madinabeitia:
How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection. IEEE Access 8: 44410-44425 (2020) - [j24]Jesús Esteban Díaz Verdejo, Antonio Jose Estepa, Rafael Estepa, Germán Madinabeitia, Francisco Javier Muñoz-Calle:
A methodology for conducting efficient sanitization of HTTP training datasets. Future Gener. Comput. Syst. 109: 67-82 (2020)
2010 – 2019
- 2019
- [j23]Saeed Salah, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo:
Fusing information from tickets and alerts to improve the incident resolution process. Inf. Fusion 45: 38-52 (2019) - [c33]Mohammad Hijazi, Jawad Khalife, Hussein Al-ghor, Jesús Esteban Díaz Verdejo:
Network Traffic Classification based on Class Weight based K-NN Classifier (CWK-NN). BDCSIntell 2019: 105-112 - 2016
- [j22]Saeed Salah, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Leovigildo Sánchez-Casado:
A Model for Incident Tickets Correlation in Network Management. J. Netw. Syst. Manag. 24(1): 57-91 (2016) - 2015
- [j21]Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Juan E. Tapiador, Rolando Salazar-Hernández:
Automatic generation of HTTP intrusion signatures by selective identification of anomalies. Comput. Secur. 55: 159-174 (2015) - [j20]Amjad Hajjar, Jawad Khalife, Jesús Esteban Díaz Verdejo:
Network traffic application identification based on message size analysis. J. Netw. Comput. Appl. 58: 130-143 (2015) - 2014
- [j19]Jawad Khalife, Amjad Hajjar, Jesús Esteban Díaz Verdejo:
A multilevel taxonomy and requirements for an optimal traffic-classification model. Int. J. Netw. Manag. 24(2): 101-120 (2014) - [c32]José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Tackling the Big Data 4 vs for anomaly detection. INFOCOM Workshops 2014: 500-505 - 2013
- [j18]Saeed Salah, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. Comput. Networks 57(5): 1289-1317 (2013) - [j17]José Camacho, Pablo Padilla, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
A generalizable dynamic flow pairing method for traffic classification. Comput. Networks 57(14): 2718-2732 (2013) - [j16]Jawad Khalife, Amjad Hajjar, Jesús Esteban Díaz Verdejo:
Performance of OpenDPI in Identifying Sampled Network Traffic. J. Networks 8(1): 71-81 (2013) - [j15]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 15-38 (2013) - [j14]Pablo Padilla, José Camacho, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Carlos Gómez-Calero:
Erratum to: On the Influence of the Propagation Channel in the Performance of Energy-Efficient Geographic Routing Algorithms for Wireless Sensor Networks (WSN). Wirel. Pers. Commun. 70(1): 39 (2013) - 2012
- [j13]Francisco J. Salcedo-Campos, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Segmental parameterisation and statistical modelling of e-mail headers for spam detection. Inf. Sci. 195: 45-61 (2012) - 2011
- [c31]Francisco J. Salcedo-Campos, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Multiple Vector Classification for P2P Traffic Identification. DCNET/OPTICS 2011: 5-13 - [c30]Jawad Khalife, Amjad Hajjar, Jesús Esteban Díaz Verdejo:
Performance of OpenDPI to Identify Truncated Network Traffic. DCNET/OPTICS 2011: 51-56 - 2010
- [j12]Gabriel Maciá-Fernández, Rafael Rodríguez-Gómez, Jesús Esteban Díaz Verdejo:
Defense techniques for low-rate DoS attacks against application servers. Comput. Networks 54(15): 2711-2727 (2010) - [c29]Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo:
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks. ICICS 2010: 416-429
2000 – 2009
- 2009
- [j11]Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Enrique Vázquez:
Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1-2): 18-28 (2009) - [j10]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical model for low-rate DoS attacks against application servers. IEEE Trans. Inf. Forensics Secur. 4(3): 519-529 (2009) - [j9]Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Fraud in roaming scenarios: an overview. IEEE Wirel. Commun. 16(6): 88-94 (2009) - [c28]Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, M. Soriano-Ibanez:
Environmental Security in P2P Networks. AP2PS 2009: 138-143 - [c27]Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro, J. Nuno-Garcia:
Anomaly Detection in P2P Networks Using Markov Modelling. AP2PS 2009: 156-159 - 2008
- [j8]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers. Comput. Secur. 27(7-8): 335-354 (2008) - 2007
- [j7]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. Comput. Networks 51(4): 1013-1030 (2007) - [c26]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Francisco de Toro-Negro:
LoRDAS: A Low-Rate DoS Attack against Application Servers. CRITIS 2007: 197-209 - [c25]Francisco de Toro-Negro, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández:
A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System. DMBiz@PAKDD 2007: 111-120 - [c24]Fco. Javier Salcedo, Jesús Esteban Díaz Verdejo, José C. Segura:
Features Extraction for Music Notes Recognition using Hidden Markov Models. SIGMAP 2007: 184-191 - 2006
- [c23]María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. CRITIS 2006: 210-221 - [c22]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. ESORICS 2006: 512-526 - [c21]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). ICICS 2006: 282-291 - [c20]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
On the Design of a Low-Rate DoS Attack Against Iterative Servers. SECRYPT 2006: 149-156 - [c19]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Low Rate DoS Attack to Monoprocess Servers. SPC 2006: 43-57 - 2005
- [c18]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Detection of Web-Based Attacks through Markovian Protocol Parsing. ISCC 2005: 457-462 - [c17]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Juan M. Estévez-Tapiador:
PIM-DM Cost Analysis in Loop Free Topologies. ISCC 2005: 719-723 - 2004
- [j6]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Measuring normality in HTTP traffic for anomaly-based intrusion detection. Comput. Networks 45(2): 175-193 (2004) - [j5]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Commun. 27(16): 1569-1584 (2004) - [c16]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. ICCSA (1) 2004: 841-850 - 2003
- [j4]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
NSDF: a computer network system description framework and its application to network security. Comput. Networks 43(5): 573-600 (2003) - [c15]Fco. Javier Salcedo, Jesús Esteban Díaz Verdejo, José C. Segura:
Musical Style Recognition by Detection of Compass. IbPRIA 2003: 876-883 - [c14]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. IWIA 2003: 3-12 - 2002
- [j3]Ramón López-Cózar Delgado, Antonio J. Rubio-Ayuso, Jesús Esteban Díaz Verdejo, Juan M. López-Soler:
Validación de un Sistema de Diálogo Mediante el uso de diferentes umbrales de poda en el proceso de reconocimiento automático de voz. Proces. del Leng. Natural 29 (2002) - 2000
- [c13]Ramón López-Cózar, Antonio J. Rubio, Jesús Esteban Díaz Verdejo, Ángel de la Torre:
Evaluation of a Dialogue System Based on a Generic Model that Combines Robust Speech Understanding and Mixed-initiative Control. LREC 2000
1990 – 1999
- 1999
- [j2]Pedro García-Teodoro, Antonio J. Rubio, Jesús Esteban Díaz Verdejo, M. Carmen Benítez, Juan M. López-Soler:
A transcription-based approach to determine the difficulty of a speech recognition task. IEEE Trans. Speech Audio Process. 7(3): 339-342 (1999) - 1998
- [c12]M. Carmen Benítez, Antonio J. Rubio, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
Word verification using confidence measures in speech recognition. ICSLP 1998 - [c11]Jesús Esteban Díaz Verdejo, Antonio M. Peinado, Antonio J. Rubio, Encarna Segarra, N. Prieto, Francisco Casacuberta:
ALBAYZIN: a task-oriented spanish speech corpus. LREC 1998: 497-502 - [c10]Pedro García-Teodoro, Antonio J. Rubio-Ayuso, M. Carmen Benítez Ortúzar, Jesús E. Díaz Verdejo, Juan Manuel López-Soler:
On the comparison of speech recognition tasks. LREC 1998: 795-800 - [c9]Pedro García-Teodoro, José C. Segura, Jesús Esteban Díaz Verdejo, Antonio José Rubio Ayuso, Maria C. Benitez, Antonio M. Peinado, Juan Manuel López-Soler, José Luis Pérez Iglesias, Victoria E. Sánchez Calle, Ángel de la Torre, Ramón López-Cózar Delgado:
Speech recognitíon and the new technologies in conununication: a continuous speech recognition-based switchboard with an answering module for e-mailing voice messages. LREC 1998: 1263-1266 - 1997
- [c8]Antonio J. Rubio, Jesús Esteban Díaz Verdejo, Pedro García-Teodoro, José C. Segura:
On the influence of frame-asynchronous grammar scoring in a CSR system. ICASSP 1997: 895-898 - [c7]Antonio J. Rubio, Pedro García-Teodoro, Ángel de la Torre, José C. Segura, Jesús Esteban Díaz Verdejo, Maria C. Benitez, Victoria E. Sánchez, Antonio M. Peinado, Juan M. López-Soler, José L. Pérez-Córdoba:
STACC: an automatic service for information access using continuous speech recognition through telephone line. EUROSPEECH 1997: 1779-1782 - [c6]Ramón López-Cózar, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Antonio J. Rubio:
A voice activated dialogue system for fast-food restaurant applications. EUROSPEECH 1997: 1783-1786 - 1996
- [j1]Ángel de la Torre, Antonio M. Peinado, Antonio J. Rubio, Victoria E. Sánchez, Jesús Esteban Díaz Verdejo:
An application of minimum classification error to feature space transformations for speech recognition. Speech Commun. 20(3-4): 273-290 (1996) - 1995
- [c5]Antonio M. Peinado, Antonio J. Rubio, José C. Segura, Victoria E. Sánchez, Jesús Esteban Díaz Verdejo:
MCE estimation of VQ parameters for MVQHMM speech recognition. EUROSPEECH 1995: 533-536 - 1994
- [c4]Jesús Esteban Díaz Verdejo, José C. Segura, Pedro García-Teodoro, Antonio J. Rubio:
SLHMM: a continuous speech recognition system based on Alphanet-HMM. ICASSP (1) 1994: 213-216 - 1993
- [c3]Jesús Esteban Díaz Verdejo, José Carlos Segura Luna, Antonio J. Rubio-Ayuso, Antonio Miguel Peinado Herreros, José L. Pérez-Córdoba:
A new neuron model for an Alphanet-semicontinuous HMM. ICASSP (1) 1993: 529-532 - 1991
- [c2]Antonio M. Peinado, Ramon Román, José C. Segura, Antonio J. Rubio, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
Entropic training for HMM speech recognition. EUROSPEECH 1991: 651-654 - [c1]Jesús Esteban Díaz Verdejo, Antonio Miguel Peinado Herreros, José Carlos Segura Luna, M. Carmen Benítez Ortúzar, Antonio J. Rubio-Ayuso:
Recurrent Neural Networks for Speech Recognition. IWANN 1991: 361-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint