default search action
José Gaviria de la Puerta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Alberto Miranda-García, Agustin Zubillaga Rego, Iker Pastor-López, Borja Sanz, Alberto Tellaeche, José Gaviria, Pablo García Bringas:
Deep learning applications on cybersecurity: A practical approach. Neurocomputing 563: 126904 (2024) - [c15]Alberto Tellaeche Iglesias, Ignacio Fidalgo Astorquia, Juan Ignacio Vázquez, José Gaviria de la Puerta:
Using Federated Learning Techniques to Generalize Reinforcement Learning Approaches. HAIS (2) 2024: 292-303 - 2023
- [j7]Danel Arias, Ignacio García Rodríguez de Guzmán, Moisés Rodríguez, Erik B. Terres, Borja Sanz, José Gaviria de la Puerta, Iker Pastor, Agustín Zubillaga, Pablo García Bringas:
Let's do it right the first time: Survey on security concerns in the way to quantum software engineering. Neurocomputing 538: 126199 (2023) - [c14]Alberto Miranda-García, Iker Pastor-López, Borja Sanz-Urquijo, José Gaviria de la Puerta, Pablo García Bringas:
Bytecode-Based Android Malware Detection Applying Convolutional Neural Networks. CISIS-ICEUTE 2023: 111-121 - 2022
- [e2]Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado:
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), Bilbao, Spain, 22-24 September, 2021. Advances in Intelligent Systems and Computing 1400, Springer 2022, ISBN 978-3-030-87871-9 [contents] - 2021
- [j6]Iker Pastor-López, Borja Sanz, Alberto Tellaeche, Giuseppe Psaila, José Gaviria de la Puerta, Pablo García Bringas:
Quality assessment methodology based on machine learning with small datasets: Industrial castings defects. Neurocomputing 456: 622-628 (2021) - [j5]José Gaviria de la Puerta, Iker Pastor-López, Igone Porto Gómez, Borja Sanz, Pablo García Bringas:
Detecting malicious Android applications based on the network packets generated. Neurocomputing 456: 629-636 (2021) - [c13]Danel Arias, Borja Sanz, José Gaviria de la Puerta, Iker Pastor-López, Pablo García Bringas:
A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch. CISIS-ICEUTE 2021: 156-166 - [c12]José Gaviria de la Puerta, Iker Pastor-López, Javier Salcedo-Hernández, Alberto Tellaeche, Borja Sanz, Hugo Sanjurjo-González, Alfredo Cuzzocrea, Pablo García Bringas:
Content-Based Authorship Identification for Short Texts in Social Media Networks. HAIS 2021: 27-37 - [c11]Eneko Atxa Landa, José Gaviria de la Puerta, Iñigo Lopez-Gazpio, Iker Pastor-López, Alberto Tellaeche, Pablo García Bringas:
Fight Detection in Images Using Postural Analysis. HAIS 2021: 231-242 - [c10]Iñigo Lopez-Gazpio, José Gaviria de la Puerta, P. García, Hugo Sanjurjo-González, Borja Sanz, Montserrat Maritxalar, Eneko Agirre:
PhrasIS: Phrase Inference and Similarity Benchmark. SOCO 2021: 261-272
2010 – 2019
- 2019
- [j4]David Doloreux, José Gaviria de la Puerta, Iker Pastor-López, Igone Porto Gómez, Borja Sanz, Jon Mikel Zabala-Iturriagagoitia:
Territorial innovation models: to be or not to be, that's the question. Scientometrics 120(3): 1163-1191 (2019) - [c9]José Gaviria de la Puerta, Iker Pastor-López, Borja Sanz, Pablo García Bringas:
Network Traffic Analysis for Android Malware Detection. HAIS 2019: 468-479 - [c8]Iker Pastor-López, Borja Sanz, José Gaviria de la Puerta, Pablo García Bringas:
Surface Defect Modelling Using Co-occurrence Matrix and Fast Fourier Transformation. HAIS 2019: 745-757 - [c7]Iker Pastor-López, José Gaviria de la Puerta, Borja Sanz, Aitor Goti, Pablo García Bringas:
How IoT and computer vision could improve the casting quality. IOT 2019: 7:1-7:8 - 2017
- [j3]José Gaviria de la Puerta, Borja Sanz:
Using Dalvik opcodes for malware detection on android. Log. J. IGPL 25(6): 938-948 (2017) - 2016
- [j2]Patxi Galán-García, José Gaviria de la Puerta, Carlos Laorden Gómez, Igor Santos, Pablo García Bringas:
Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. Log. J. IGPL 24(1): 42-53 (2016) - [j1]Pablo García Bringas, Jorge de-la-Peña-Sordo, José Gaviria de la Puerta, Álvaro Herrero, Héctor Quintián, Emilio Corchado:
Editorial: Special Issue CISIS14-IGPL. Log. J. IGPL 24(6): 869-870 (2016) - 2015
- [c6]José Gaviria de la Puerta, Borja Sanz, Igor Santos-Grueiro, Pablo García Bringas:
The Evolution of Permission as Feature for Android Malware Detection. CISIS-ICEUTE 2015: 389-400 - [c5]José Gaviria de la Puerta, Borja Sanz, Igor Santos, Pablo García Bringas:
Using Dalvik Opcodes for Malware Detection on Android. HAIS 2015: 416-426 - 2014
- [e1]José Gaviria de la Puerta, Iván García-Ferreira, Pablo García Bringas, Fanny Klett, Ajith Abraham, André C. P. L. F. de Carvalho, Álvaro Herrero, Bruno Baruque, Héctor Quintián, Emilio Corchado:
International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings. Advances in Intelligent Systems and Computing 299, Springer 2014, ISBN 978-3-319-07994-3 [contents] - 2013
- [c4]Mikel Salazar, José Gaviria de la Puerta, Carlos Laorden, Pablo García Bringas:
Enhancing cybersecurity learning through an augmented reality-based serious game. EDUCON 2013: 602-607 - [c3]Patxi Galán-García, José Gaviria de la Puerta, Carlos Laorden Gómez, Igor Santos, Pablo García Bringas:
Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying. SOCO-CISIS-ICEUTE 2013: 419-428 - 2012
- [c2]Felix Brezo, José Gaviria de la Puerta, Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, David Barroso:
Supervised classification of packets coming from a HTTP botnet. CLEI 2012: 1-8 - [c1]Felix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso, Pablo García Bringas:
C&C Techniques in Botnet Development. CISIS/ICEUTE/SOCO Special Sessions 2012: 97-108
Coauthor Index
aka: Borja Sanz-Urquijo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint