scispace - formally typeset
P

Pedro García-Teodoro

Researcher at University of Granada

Publications -  80
Citations -  3283

Pedro García-Teodoro is an academic researcher from University of Granada. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 18, co-authored 77 publications receiving 2813 citations.

Papers
More filters
Journal ArticleDOI

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

TL;DR: This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors and proposes an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features.
Journal ArticleDOI

A Dynamical Relay node placement solution for MANETs

TL;DR: Dynamical Relay Node placement Solution (DRNS) is introduced, based on the use of Particle Swarm Optimization (PSO) algorithms and is inspired by Model Predictive Control (MPC) techniques following a bi-objective optimization procedure, where both network connectivity and throughput are jointly maximized.
Journal ArticleDOI

Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks

TL;DR: The present paper introduces a novel data loss/modification detection and recovery scheme that relies on a multivariate statistical analysis approach that exploits spatial density, a common feature in network environments such as WSNs, and introduces a Novel data arrangement method to exploit the spatial correlation among the sensors in a more efficient manner.
Journal ArticleDOI

Identification of contamination zones for sinkhole detection in MANETs

TL;DR: This paper presents a novel approach intended to detect the well-known sinkhole attack in MANETs, one of the most representative route poisoning attacks aimed at exploiting multi-hop source-destination routes to seize communications.
Journal ArticleDOI

Fraud in roaming scenarios: an overview

TL;DR: The major concerns regarding such security threats are presented, and a classification for this type of attack is proposed, highlighting the necessity for the different players involved to take joint action.