default search action
Carlos Laorden
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j11]Patxi Galán-García, José Gaviria de la Puerta, Carlos Laorden Gómez, Igor Santos, Pablo García Bringas:
Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. Log. J. IGPL 24(1): 42-53 (2016) - [j10]Iván García-Ferreira, Carlos Laorden, Igor Santos, Pablo García Bringas:
Static analysis: a brief survey. Log. J. IGPL 24(6): 871-882 (2016) - 2015
- [j9]Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, Javier Nieves, Pablo García Bringas, José María Gómez Hidalgo:
Negobot: Detecting paedophile activity with a conversational agent based on game theory. Log. J. IGPL 23(1): 17-30 (2015) - 2014
- [j8]Carlos Laorden, Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Javier Nieves, Pablo García Bringas:
Study on the effectiveness of anomaly detection for spam filtering. Inf. Sci. 277: 421-444 (2014) - 2013
- [j7]Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Javier Nieves, Pablo García Bringas, Gonzalo Álvarez Marañón:
Mama: manifest Analysis for Malware Detection in Android. Cybern. Syst. 44(6-7): 469-488 (2013) - [j6]Xabier Ugarte-Pedrero, Igor Santos, Carlos Laorden, Borja Sanz, Pablo García Bringas:
Collective Classification for Packed Executable Identification. Comput. Syst. Sci. Eng. 28(1) (2013) - [j5]Carlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo García Bringas:
Collective classification for spam filtering. Log. J. IGPL 21(4): 540-548 (2013) - [j4]Igor Santos, Carlos Laorden, Borja Sanz, Pablo García Bringas:
Reversing the effects of tokenisation attacks against content-based spam filters. Int. J. Secur. Networks 8(2): 106-116 (2013) - 2012
- [j3]Carlos Laorden, Igor Santos, Borja Sanz, Gonzalo Álvarez Marañón, Pablo García Bringas:
Word sense disambiguation for spam filtering. Electron. Commer. Res. Appl. 11(3): 290-298 (2012) - [j2]Igor Santos, Carlos Laorden, Borja Sanz, Pablo García Bringas:
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering. Expert Syst. Appl. 39(1): 437-444 (2012) - 2011
- [j1]Igor Santos, Felix Brezo, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Using opcode sequences in single-class learning to detect unknown malware. IET Inf. Secur. 5(4): 220-227 (2011)
Conference and Workshop Papers
- 2016
- [c28]Mikel Salazar, Carlos Laorden:
Collaborative content creation with the OpenUIX Framework. ISMAR Adjunct 2016: 350 - [c27]Mikel Salazar, Carlos Laorden:
Developing Interoperable Experiences with OpenUIX. SUI 2016: 167 - 2015
- [c26]Mikel Salazar, Carlos Laorden, Pablo García Bringas:
A Comprehensive Interaction Model for ASystems. ISMAR 2015: 104-107 - [c25]Mikel Salazar Gonzalez, Carlos Laorden, Pablo García Bringas:
OpenUIX Demo: A Sneak Peek at a Novel HCI Model for AR Systems. SUI 2015: 140 - 2014
- [c24]Iván García-Ferreira, Carlos Laorden, Igor Santos, Pablo García Bringas:
A Survey on Static Analysis and Model Checking. SOCO-CISIS-ICEUTE 2014: 443-452 - [c23]Igor Santos, Patxi Galán-García, Carlos Laorden Gómez, Javier Nieves, Borja Sanz, Pablo García Bringas, José María Gómez Hidalgo:
An Empirical Study on Word Sense Disambiguation for Adult Content Filtering. SOCO-CISIS-ICEUTE 2014: 537-544 - 2013
- [c22]Igor Santos, Carlos Laorden, Borja Sanz, Pablo García Bringas:
JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters. CCNC 2013: 259-264 - [c21]Mikel Salazar, José Gaviria de la Puerta, Carlos Laorden, Pablo García Bringas:
Enhancing cybersecurity learning through an augmented reality-based serious game. EDUCON 2013: 602-607 - [c20]Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas:
MADS: Malicious Android Applications Detection through String Analysis. NSS 2013: 178-191 - [c19]Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas:
Instance-based Anomaly Method for Android Malware Detection. SECRYPT 2013: 387-394 - [c18]Patxi Galán-García, José Gaviria de la Puerta, Carlos Laorden Gómez, Igor Santos, Pablo García Bringas:
Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying. SOCO-CISIS-ICEUTE 2013: 419-428 - [c17]Igor Santos, Igor Miñambres-Marcos, Carlos Laorden, Patxi Galán-García, Aitor Santamaría-Ibirika, Pablo García Bringas:
Twitter Content-Based Spam Filtering. SOCO-CISIS-ICEUTE 2013: 449-458 - [c16]Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas:
Anomaly Detection Using String Analysis for Android Malware Detection. SOCO-CISIS-ICEUTE 2013: 469-478 - 2012
- [c15]Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo García Bringas:
On the automatic categorisation of android applications. CCNC 2012: 149-153 - [c14]Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Countering entropy measure attacks on packed software detection. CCNC 2012: 164-168 - [c13]Carlos Laorden, Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Javier Nieves, Pablo García Bringas:
On the study of anomaly-based spam filtering using spam as representation of normality. CCNC 2012: 693-695 - [c12]Patxi Galán-García, Carlos Laorden Gómez, Pablo García Bringas:
Towards a more efficient and personalised advertisement content in on-line social networks. PIKM 2012: 95-98 - [c11]Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, José María Gómez Hidalgo, Pablo García Bringas:
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. CISIS/ICEUTE/SOCO Special Sessions 2012: 261-270 - [c10]Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo García Bringas, Gonzalo Álvarez Marañón:
PUMA: Permission Usage to Detect Malware in Android. CISIS/ICEUTE/SOCO Special Sessions 2012: 289-298 - 2011
- [c9]Carlos Laorden, Xabier Ugarte-Pedrero, Igor Santos, Borja Sanz, Pablo García Bringas:
Enhancing scalability in anomaly-based email spam filtering. CEAS 2011: 13-22 - [c8]Igor Santos, Xabier Ugarte-Pedrero, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Collective classification for packed executable identification. CEAS 2011: 23-30 - [c7]Carlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo García Bringas:
Collective Classification for Spam Filtering. CISIS 2011: 1-8 - [c6]Igor Santos, Borja Sanz, Carlos Laorden, Felix Brezo, Pablo García Bringas:
Opcode-Sequence-Based Semi-supervised Unknown Malware Detection. CISIS 2011: 50-57 - [c5]Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas:
Spam Filtering through Anomaly Detection. ICETE (Selected Papers) 2011: 203-216 - [c4]Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas:
Anomaly-based Spam Filtering. SECRYPT 2011: 5-14 - [c3]Igor Santos, Carlos Laorden, Pablo García Bringas:
Collective Classification for Unknown Malware Detection. SECRYPT 2011: 251-256 - 2010
- [c2]Carlos Laorden, Borja Sanz, Gonzalo Álvarez Marañón, Pablo García Bringas:
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks. CISIS 2010: 135-142 - [c1]Igor Santos, Felix Brezo, Javier Nieves, Yoseba K. Penya, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Idea: Opcode-Sequence-Based Malware Detection. ESSoS 2010: 35-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint