default search action
Alejandro Guerra-Manzanares
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Alejandro Guerra-Manzanares:
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives. Comput. Secur. 138: 103654 (2024) - [j10]Risto Vaarandi, Alejandro Guerra-Manzanares:
Stream clustering guided supervised learning for classifying NIDS alerts. Future Gener. Comput. Syst. 155: 231-244 (2024) - [j9]Risto Vaarandi, Alejandro Guerra-Manzanares:
Network IDS alert classification with active learning techniques. J. Inf. Secur. Appl. 81: 103687 (2024) - [j8]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
Experts still needed: boosting long-term android malware detection with active learning. J. Comput. Virol. Hacking Tech. 20(4): 901-918 (2024) - [i2]Saeed Shurrab, Alejandro Guerra-Manzanares, Farah E. Shamout:
Multi-modal Masked Siamese Network Improves Chest X-Ray Representation Learning. CoRR abs/2407.04449 (2024) - 2023
- [j7]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757. Comput. Secur. 124: 102998 (2023) - [j6]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the application of active learning for efficient and effective IoT botnet detection. Future Gener. Comput. Syst. 141: 40-53 (2023) - [j5]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Marcin Luckner:
Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection. J. Comput. Virol. Hacking Tech. 19(1): 65-96 (2023) - [c8]Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout:
Privacy-Preserving Machine Learning for Healthcare: Open Challenges and Future Perspectives. TML4H 2023: 25-40 - [i1]Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout:
Privacy-preserving machine learning for healthcare: open challenges and future perspectives. CoRR abs/2303.15563 (2023) - 2022
- [j4]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection. Comput. Secur. 120: 102757 (2022) - [j3]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection. Comput. Secur. 122: 102835 (2022) - [j2]Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Android malware concept drift using system calls: Detection, characterization and challenges. Expert Syst. Appl. 206: 117200 (2022) - [c7]Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the Application of Active Learning to Handle Data Evolution in Android Malware Detection. ICDF2C 2022: 256-273 - 2021
- [j1]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization. Comput. Secur. 110: 102399 (2021) - 2020
- [c6]Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm:
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. ICISSP 2020: 207-218 - [c5]Alejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm:
Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems. ICISSP (Revised Selected Papers) 2020: 222-243
2010 – 2019
- 2019
- [c4]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
Hybrid Feature Selection Models for Machine Learning Based Botnet Detection in IoT Networks. CW 2019: 324-327 - [c3]Alejandro Guerra-Manzanares, Sven Nõmm, Hayretdin Bahsi:
In-depth Feature Selection and Ranking for Automated Detection of Mobile Malware. ICISSP 2019: 274-283 - [c2]Sven Nomm, Alejandro Guerra-Manzanares, Hayretdin Bahsi:
Towards the Integration of a Post-Hoc Interpretation Step into the Machine Learning Workflow for IoT Botnet Detection. ICMLA 2019: 1162-1169 - [c1]Alejandro Guerra-Manzanares, Hayretdin Bahsi, Sven Nõmm:
Differences in Android Behavior Between Real Device and Emulator: A Malware Detection Perspective. IoTSMS 2019: 399-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint