default search action
Pedro Malagón
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Román Cárdenas, Pedro Malagón, Patricia Arroba, José L. Risco-Martín:
xDEVS no_std: A Rust Crate for Real-Time DEVS on Embedded Systems. ANNSIM 2024: 1-13 - 2023
- [i4]Román Cárdenas, Patricia Arroba, Roberto Blanco, Pedro Malagón, José L. Risco-Martín, José Manuel Moya:
Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications. CoRR abs/2312.02172 (2023) - 2021
- [j11]Mario Garrido, Pedro Malagón:
The Constant Multiplier FFT. IEEE Trans. Circuits Syst. I Regul. Pap. 68(1): 322-335 (2021) - [c29]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya:
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. EuroS&P 2021: 683-700 - 2020
- [j10]Ruben Ricart-Sanchez, Pedro Malagón, Antonio Matencio-Escolar, José M. Alcaraz Calero, Qi Wang:
Toward hardware-accelerated QoS-aware 5G network slicing based on data plane programmability. Trans. Emerg. Telecommun. Technol. 31(1) (2020) - [j9]Giuseppe Conti, Marcos Quintana, Pedro Malagón, David Jiménez:
An FPGA Based Tracking Implementation for Parkinson's Patients. Sensors 20(11): 3189 (2020) - [j8]Román Cárdenas, Patricia Arroba, Roberto Blanco, Pedro Malagón, José L. Risco-Martín, José Manuel Moya:
Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications. Simul. Model. Pract. Theory 101: 102037 (2020) - [c28]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
Microarchitectural Isolation Guarantees Through Execution Based Signatures. DCIS 2020: 1-6 - [c27]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. USENIX Security Symposium 2020: 1967-1984 - [i3]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya:
CACHE SNIPER : Accurate timing control of cache evictions. CoRR abs/2008.12188 (2020)
2010 – 2019
- 2019
- [c26]Ruben Ricart-Sanchez, Pedro Malagón, José M. Alcaraz-Calero, Qi Wang:
P4-NetFPGA-based network slicing solution for 5G MEC architectures. ANCS 2019: 1-2 - [c25]Ruben Ricart-Sanchez, Pedro Malagón, José M. Alcaraz-Calero, Qi Wang:
NetFPGA-Based Firewall Solution for 5G Multi-Tenant Architectures. EDGE 2019: 132-136 - [c24]Roberto Blanco, Pedro Malagón, Samira Briongos, José Manuel Moya:
Anomaly Detection Using Gaussian Mixture Probability Model to Implement Intrusion Detection System. HAIS 2019: 648-659 - [c23]Bernardo Vallejo Mancero, Mireya Zapata, Liliana Topón-Visarrea, Pedro Malagón:
Design and Evaluation of a Heuristic Optimization Tool Based on Evolutionary Grammars Using PSoCs. WIVACE 2019: 100-112 - [i2]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. CoRR abs/1904.06278 (2019) - 2018
- [j7]Ruben Ricart-Sanchez, Pedro Malagón, Pablo Salva-Garcia, Enrique Chirivella-Perez, Qi Wang, José M. Alcaraz Calero:
Towards an FPGA-Accelerated programmable data path for edge-to-core communications in 5G networks. J. Netw. Comput. Appl. 124: 80-93 (2018) - [c22]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth:
CacheShield: Detecting Cache Attacks through Self-Observation. CODASPY 2018: 224-235 - [c21]Roberto Blanco, Juan J. Cilla, Pedro Malagón, Ignacio Penas, José Manuel Moya:
Tuning CNN Input Layout for IDS with Genetic Algorithms. HAIS 2018: 197-209 - [c20]Ruben Ricart-Sanchez, Pedro Malagón, José M. Alcaraz Calero, Qi Wang:
Hardware-Accelerated Firewall for 5G Mobile Networks. ICNP 2018: 446-447 - [c19]Roberto Blanco, Juan J. Cilla, Samira Briongos, Pedro Malagón, José Manuel Moya:
Applying Cost-Sensitive Classifiers with Reinforcement Learning to IDS. IDEAL (1) 2018: 531-538 - [c18]Roberto Blanco, Pedro Malagón, Juan J. Cilla, José Manuel Moya:
Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms. PATMOS 2018: 177-182 - 2017
- [c17]Samira Briongos, Pedro Malagón, José L. Risco-Martín, José Manuel Moya:
Building accurate models to determine the current CPU utilization of a host within a virtual machine allocated on it. SummerSim 2017: 33:1-33:12 - [i1]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth:
CacheShield: Protecting Legacy Processes Against Cache Attacks. CoRR abs/1709.01795 (2017) - 2016
- [c16]Samira Briongos, Pedro Malagón, José L. Risco-Martín, José Manuel Moya:
Modeling side-channel cache attacks on AES. SummerSim 2016: 37 - [c15]José L. Risco-Martín, Saurabh Mittal, Juan Carlos Fabero Jiménez, Pedro Malagón, José L. Ayala:
Real-time hardware/software co-design using devs-based transparent M&S framework. SummerSim 2016: 45 - 2015
- [j6]Marina Zapater, David Fraga, Pedro Malagón, Zorana Bankovic, José Manuel Moya:
Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres. Log. J. IGPL 23(3): 495-505 (2015) - [c14]Pedro Malagón, Juan-Mariano de Goyeneche, David Fraga, José Manuel Moya:
Bitslice software implementation of KeeLoq as a side-channel countermeasure. WESS 2015: 4 - 2013
- [j5]Zorana Bankovic, David Fraga, José Manuel Moya, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Elena Romero, Javier Blesa, Daniel Villanueva, Octavio Nieto-Taladriz:
Bio-inspired enhancement of reputation systems for intelligent environments. Inf. Sci. 222: 99-112 (2013) - 2012
- [j4]Zorana Bankovic, José Manuel Moya, Elena Romero, Javier Blesa, David Fraga, Juan Carlos Vallejo, Álvaro Araujo, Pedro Malagón, Juan-Mariano de Goyeneche, Daniel Villanueva, Octavio Nieto-Taladriz:
Using clustering techniques for intelligent camera-based user interfaces. Log. J. IGPL 20(3): 589-597 (2012) - [j3]Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya, Zorana Bankovic:
Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices. Sensors 12(6): 7994-8012 (2012) - 2011
- [j2]Zorana Bankovic, David Fraga, José Manuel Moya, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Elena Romero, Javier Blesa, Daniel Villanueva, Octavio Nieto-Taladriz:
Improving security in WMNs with reputation systems and self-organizing maps. J. Netw. Comput. Appl. 34(2): 455-463 (2011) - [c13]Iván Álvarez, Pedro Malagón, Marina Zapater, Juan-Mariano de Goyeneche, José Manuel Moya:
RFID Performance in Localization Systems. IWAAL 2011: 73-78 - [c12]Iván Ovejero, Elena Romero, Zorana Bankovic, Pedro Malagón, Álvaro Araujo:
Image Processing Algorithms for AAL Services. IWAAL 2011: 201-208 - [c11]Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón:
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. TrustCom 2011: 61-72 - 2010
- [c10]Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya:
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. AISec 2010: 8-13 - [c9]Zorana Bankovic, Elena Romero, Javier Blesa, José Manuel Moya, David Fraga, Juan Carlos Vallejo, Álvaro Araujo, Pedro Malagón, Juan-Mariano de Goyeneche, Daniel Villanueva, Octavio Nieto-Taladriz:
Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces. HAIS (2) 2010: 486-492 - [c8]Zorana Bankovic, David Fraga, José Manuel Moya, Juan Carlos Vallejo, Álvaro Araujo, Pedro Malagón, Juan-Mariano de Goyeneche, Daniel Villanueva, Elena Romero, Javier Blesa:
Detecting and Confining Sybil Attack in Wireless Sensor Networks Based on Reputation Systems Coupled with Self-organizing Maps. AIAI 2010: 311-318 - [c7]Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya:
Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches. IWIA 2010: 68-74
2000 – 2009
- 2009
- [j1]José Manuel Moya, Álvaro Araujo, Zorana Bankovic, Juan-Mariano de Goyeneche, Juan Carlos Vallejo, Pedro Malagón, Daniel Villanueva, David Fraga, Elena Romero, Javier Blesa:
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 9(11): 9380-9397 (2009) - [c6]José Manuel Moya, Javier Rodríguez Escolar, Julio Martín, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Agustín Rubio, Elena Romero, Daniel Villanueva, Octavio Nieto-Taladriz, Carlos A. López-Barrio:
SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems. ARC 2009: 255-260 - [c5]Javier Blesa, Pedro Malagón, Álvaro Araujo, José Manuel Moya, Juan Carlos Vallejo, Juan-Mariano de Goyeneche, Elena Romero, Daniel Villanueva, Octavio Nieto-Taladriz:
Modular Framework for Smart Home Applications. IWANN (2) 2009: 695-701 - [c4]Elena Romero, Álvaro Araujo, José Manuel Moya, Juan-Mariano de Goyeneche, Juan Carlos Vallejo, Pedro Malagón, Daniel Villanueva, David Fraga:
Image Processing Based Services for Ambient Assistant Scenarios. IWANN (2) 2009: 800-807 - [c3]Ignacio Recio, José Manuel Moya, Álvaro Araujo, Juan Carlos Vallejo, Pedro Malagón:
Analysis and Design of an Object Tracking Service for Intelligent Environments. IWANN (2) 2009: 914-921 - [c2]José Manuel Moya, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Octavio Nieto-Taladriz:
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors. WWIC 2009: 73-84 - 2007
- [c1]Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya:
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. SECURWARE 2007: 128-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint