Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Álvaro Herrero
2010 – today
- 2013
[j11]Raúl Marticorena Sánchez, Álvaro Herrero, Emilio Corchado: Visualization and Clustering for SNMP Intrusion Detection. Cybernetics and Systems 44(6-7): 505-532 (2013)
[j10]Álvaro Herrero, Martí Navarro, Emilio Corchado, Vicente Julián: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1): 250-261 (2013)
[j9]
[j8]Javier Sedano, Silvia González, Álvaro Herrero, Bruno Baruque, Emilio Corchado: Mutating network scans for the assessment of supervised classifier ensembles. Logic Journal of the IGPL 21(4): 630-647 (2013)
[j7]Cristian Pinzón, Juan Francisco de Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo, Juan M. Corchado: idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining. Inf. Sci. 231: 15-31 (2013)
[c32]Lourdes Cecilia Sáiz Bárcena, Miguel A. Manzanedo, Arturo Pérez, Álvaro Herrero, Emilio Corchado: Hybrid Visualization for Deep Insight into Knowledge Retention in Firms. HAIS 2013: 280-293
[e6]Álvaro Herrero, Václav Snásel, Ajith Abraham, Ivan Zelinka, Bruno Baruque, Héctor Quintián-Pardo, José Luís Calvo-Rolle, Javier Sedano, Emilio Corchado (Eds.): International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, Ostrava, Czech Republic, September 5th-7th, 2012. Advances in Intelligent Systems and Computing 189, Springer 2013, ISBN 978-3-642-33017-9- 2012
[j6]Álvaro Herrero, Urko Zurutuza, Emilio Corchado: A Neural-Visualization IDS for Honeynet Data. Int. J. Neural Syst. 22(2) (2012)
[c31]Álvaro San-Salvador, Álvaro Herrero: Contacting the Devices: A Review of Communication Protocols. ISAmI 2012: 3-10
[c30]Raúl Marticorena Sánchez, Álvaro Herrero, Emilio Corchado: Clustering for Intrusion Detection: Network Scans as a Case of Study. CISIS/ICEUTE/SOCO Special Sessions 2012: 33-45
[c29]Javier Sedano, Silvia González, Bruno Baruque, Álvaro Herrero, Emilio Corchado: Soft Computing for the Analysis of People Movement Classification. SOCO 2012: 241-248- 2011
[b1]Álvaro Herrero, Emilio Corchado: Mobile Hybrid Intrusion Detection - The MOVICAB-IDS System. Studies in Computational Intelligence 334, Springer 2011, ISBN 978-3-642-18298-3, pp. 1-128
[j5]Emilio Corchado, Álvaro Herrero: Neural visualization of network traffic data for intrusion detection. Appl. Soft Comput. 11(2): 2042-2056 (2011)
[j4]Álvaro Herrero, Emilio Corchado, Alfredo Jiménez: Unsupervised neural models for country and political risk analysis. Expert Syst. Appl. 38(11): 13641-13661 (2011)
[c28]Silvia González, Javier Sedano, Álvaro Herrero, Bruno Baruque, Emilio Corchado: Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans. CISIS 2011: 109-117
[c27]Lourdes Cecilia Sáiz Bárcena, Arturo Pérez, Álvaro Herrero, Emilio Corchado: Analyzing Key Factors of Human Resources Management. IDEAL 2011: 463-473
[c26]Maria Belén Vaquerizo García, Álvaro Herrero, Emilio Corchado: Visual analysis of nurse rostering solutions through a bio-inspired intelligent model. ISDA 2011: 231-236
[c25]Javier Sedano, Álvaro Herrero, Silvia González, Emilio Corchado, Bruno Baruque: Nature-inspired ensembles to detect SNMP anomalous situations. NaBIC 2011: 641-645
[c24]Urko Zurutuza, Enaitz Ezpeleta, Álvaro Herrero, Emilio Corchado: Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data. SOCO 2011: 561-570
[e5]Álvaro Herrero, Emilio Corchado (Eds.): Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings. Lecture Notes in Computer Science 6694, Springer 2011, ISBN 978-3-642-21322-9- 2010
[j3]Álvaro Herrero, Emilio Corchado, Lourdes Sáiz Bárcena, Ajith Abraham: DIPKIP: A Connectionist Knowledge Management System to Identify Knowledge Deficits in Practical Cases. Computational Intelligence 26(1): 26-56 (2010)
[c23]Cristian Pinzón, Juan Francisco de Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo: A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries. CISIS 2010: 51-59
[c22]Martí Navarro, Emilio Corchado, Vicente Julián, Álvaro Herrero: Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS. CISIS 2010: 61-69
[c21]Álvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado: Understanding Honeypot Data by an Unsupervised Neural Visualization. CISIS 2010: 151-160
[c20]Álvaro Herrero, Martí Navarro, Vicente Julián, Emilio Corchado: Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS. HAIS (2) 2010: 101-110
[c19]Cristian Pinzón, Álvaro Herrero, Juan Francisco de Paz, Emilio Corchado, Javier Bajo: CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks. HAIS (2) 2010: 510-519
[c18]Emilio S. Corchado, Aitor Mata, Álvaro Herrero, Lourdes Sáiz Bárcena: On the improvement of Knowledge Management status through case-based reasoning in a hybrid approach. HIS 2010: 67-72
[c17]Cristian Pinzón, Juan Francisco de Paz, Javier Bajo, Álvaro Herrero, Emilio Corchado: AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks. HIS 2010: 73-78
[c16]Álvaro Herrero, Cristian Pinzón, Emilio Corchado, Javier Bajo: Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture. PAAMS (Special Sessions and Workshops) 2010: 713-720
[c15]Álvaro Herrero, Lourdes Cecilia Sáiz Bárcena, Emilio Corchado: Assessing Knowledge Management in the Power Sector through a Connectionist Model. PAAMS (Special Sessions and Workshops) 2010: 721-729
[c14]Martí Navarro, Álvaro Herrero, Emilio Corchado, Vicente Julián: Approaching Real-Time Intrusion Detection through MOVICAB-IDS. SOCO 2010: 9-18
[e4]Álvaro Herrero, Emilio Corchado, Carlos Redondo, Ángel Alonso (Eds.): Computational Intelligence in Security for Information Systems 2010 - Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), León, Spain, November 11-12, 2010. Advances in Intelligent and Soft Computing 85, Springer 2010, ISBN 978-3-642-16625-9
2000 – 2009
- 2009
[j2]Álvaro Herrero, Emilio Corchado, María A. Pellicer, Ajith Abraham: MOVIH-IDS: A mobile-visualization hybrid intrusion detection system. Neurocomputing 72(13-15): 2775-2784 (2009)
[j1]Álvaro Herrero, Emilio Corchado, Paolo Gastaldo, Rodolfo Zunino: Neural projection techniques for the visual inspection of network traffic. Neurocomputing 72(16-18): 3649-3658 (2009)
[c13]Álvaro Herrero, Emilio Corchado: Multiagent Systems for Network Intrusion Detection: A Review. CISIS 2009: 143-154
[c12]Álvaro Herrero, Aitor Mata, Emilio Corchado, Lourdes Sáiz Bárcena: A Hybrid Solution for Advice in the Knowledge Management Field. HAIS 2009: 157-168
[p2]Álvaro Herrero, Emilio Corchado: Mining Network Traffic Data for Attacks through MOVICAB-IDS. Foundations of Computational Intelligence (4) 2009: 377-394
[e3]Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero (Eds.): Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008. Advances in Soft Computing 53, Springer 2009, ISBN 978-3-540-88180-3
[e2]Álvaro Herrero, Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado (Eds.): Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings. Advances in Intelligent and Soft Computing 63, Springer 2009, ISBN 978-3-642-04090-0
[e1]Emilio Corchado, Xindong Wu, Erkki Oja, Álvaro Herrero, Bruno Baruque (Eds.): Hybrid Artificial Intelligence Systems, 4th International Conference, HAIS 2009, Salamanca, Spain, June 10-12, 2009. Proceedings. Lecture Notes in Computer Science 5572, Springer 2009, ISBN 978-3-642-02318-7- 2008
[c11]Álvaro Herrero, Emilio Corchado: Agents and Neural Networks for Intrusion Detection. CISIS 2008: 155-162
[c10]Álvaro Herrero, Emilio Corchado: Traffic Data Preparation for a Hybrid Network IDS. HAIS 2008: 247-256
[c9]Alfredo Jiménez, Álvaro Herrero, Emilio Corchado: Country and Political Risk Analysis of Spanish Multinational Enterprises Using Exploratory Projection Pursuit. IDEAL 2008: 508-515
[p1]Álvaro Herrero, Emilio Corchado, María A. Pellicer, Ajith Abraham: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. Innovations in Hybrid Intelligent Systems 2008: 320-328- 2007
[c8]Álvaro Herrero, Emilio Corchado, Paolo Gastaldo, Davide Leoncini, Francesco Picasso, Rodolfo Zunino: Intrusion Detection at Packet Level by Unsupervised Architectures. IDEAL 2007: 718-727
[c7]Álvaro Herrero, Emilio Corchado, Paolo Gastaldo, Rodolfo Zunino: A Comparison of Neural Projection Techniques Applied to Intrusion Detection Systems. IWANN 2007: 1138-1146
[c6]Paolo Gastaldo, Francesco Picasso, Rodolfo Zunino, Álvaro Herrero, Emilio Corchado, José Manuel Sáiz: IDS Based on Bio-inspired Models. KES (2) 2007: 133-140- 2006
[c5]Álvaro Herrero, Emilio Corchado, José Manuel Sáiz: MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. IDEAL 2006: 1424-1433
[c4]Emilio Corchado, Álvaro Herrero, José Manuel Sáiz: Testing CAB-IDS Through Mutations: On the Identification of Network Scans. KES (2) 2006: 433-441- 2005
[c3]Emilio Corchado, Álvaro Herrero, José Manuel Sáiz: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. ICANN (2) 2005: 905-910
[c2]Álvaro Herrero, Emilio Corchado, José Manuel Sáiz: An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending. ICNC (1) 2005: 778-782
[c1]Álvaro Herrero, Emilio Corchado, José Manuel Sáiz: Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model. IDEAL 2005: 187-194
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:04 CEST by the dblp team



