default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Pablo Moriano, Andy Berres, Haowen Xu, Jibonananda Sanyal:
Spatiotemporal features of traffic help reduce automatic accident detection time. Expert Syst. Appl. 244: 122813 (2024) - Zhi-Feng Wei, Pablo Moriano, Ramakrishnan Kannan:
Robustness of graph embedding methods for community detection. CoRR abs/2405.00636 (2024) - Pablo Moriano, Steven C. Hespeler, Mingyan Li, Robert A. Bridges:
Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN. CoRR abs/2406.13778 (2024) - William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore:
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning. CoRR abs/2408.05427 (2024) - Pablo Moriano, Steven C. Hespeler, Mingyan Li, Maria Mahbub:
Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review. CoRR abs/2411.14278 (2024) - 2023
- Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level. IEEE Internet Things J. 10(24): 22111-22127 (2023) - Edmon Begoli, Edmon Meyer, Pablo Moriano, Sean Oesch:
Poster: Cognitive Cyber - Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing Environments. DEBS 2023: 177-179 - Moyi Tian, Pablo Moriano:
Robustness of community structure under edge addition. CoRR abs/2304.07238 (2023) - Samuel C. Hollifield, Pablo Moriano, William L. Lambert, Joel Asiamah, Isaac Sikkema, Michael D. Iannacone:
Developing and Deploying Security Applications for In-Vehicle Networks. CoRR abs/2306.15588 (2023) - 2022
- Pablo Moriano, Robert A. Bridges, Michael D. Iannacone:
Detecting CAN Masquerade Attacks with Signal Clustering Similarity. CoRR abs/2201.02665 (2022) - Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Signal-based Intrusion Detection for Controller Area Networks. CoRR abs/2205.01306 (2022) - 2021
- Pablo Moriano, Raquel Hill, L. Jean Camp:
Using bursty announcements for detecting BGP routing anomalies. Comput. Networks 188: 107835 (2021) - Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C. Hollifield:
Time-Based CAN Intrusion Detection Benchmark. CoRR abs/2101.05781 (2021) - Jonathan Bryan, Pablo Moriano:
Graph-Based Machine Learning Improves Just-in-Time Defect Prediction. CoRR abs/2110.05371 (2021) - 2020
- Jayati Dev, Pablo Moriano, L. Jean Camp:
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. SOUPS @ USENIX Security Symposium 2020: 81-97 - 2019
- Pablo Moriano, Raquel Hill, L. Jean Camp:
Using Bursty Announcements for Early Detection of BGP Routing Anomalies. CoRR abs/1905.05835 (2019) - 2018
- Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 4-29 (2018) - 2017
- Pablo Moriano, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Comput. Secur. 70: 319-334 (2017) - Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. Inf. Comput. Secur. 25(2): 190-205 (2017) - Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Insider Threat Event Detection in User-System Interactions. MIST@CCS 2017: 1-12 - 2016
- Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:
What Can Johnny Do?–Factors in an End-User Expertise Instrument. HAISA 2016: 199-208 - 2014
- Pablo Moriano, Jorge Finke:
Characterizing the relationship between degree distributions and community structures. ACC 2014: 2383-2388 - Pablo Moriano, Jorge Finke:
Model-based fraud detection in growing networks. CDC 2014: 6068-6073 - 2013
- Pablo Moriano, Jorge Finke:
Structure of growing networks with no preferential attachment. ACC 2013: 1088-1093 - Pablo Moriano, Jorge Finke:
On the formation of structure in growing networks. CoRR abs/1301.4192 (2013) - 2011
- Pablo Moriano, Jorge Finke:
Heavy-tailed weighted networks from local attachment strategies. CDC/ECC 2011: 5211-5216 - Pablo Moriano, Jorge Finke:
Power-law weighted networks from local attachments. CoRR abs/1110.0751 (2011) - 2007
- Jesús Herrera, Pablo Gervás, Pedro J. Moriano, Alfonso Muñoz, Luis Romero:
Building Corpora for the Development of a Dependency Parser for Spanish Using Maltparser. Proces. del Leng. Natural 39 (2007) - Jesús Herrera, Pablo Gervás, Pedro J. Moriano, Alfonso Muñoz, Luis Romero:
JBeaver: Un Analizador de Dependencias para el Español. Proces. del Leng. Natural 39 (2007)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-11 03:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint