P
Pedro García-Teodoro
Researcher at University of Granada
Publications - 80
Citations - 3283
Pedro García-Teodoro is an academic researcher from University of Granada. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 18, co-authored 77 publications receiving 2813 citations.
Papers
More filters
Journal ArticleDOI
A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
Leovigildo Sánchez-Casado,Gabriel Maciá-Fernández,Pedro García-Teodoro,Roberto Magán-Carrión +3 more
TL;DR: This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors and proposes an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features.
Journal ArticleDOI
A Dynamical Relay node placement solution for MANETs
Roberto Magán-Carrión,José Camacho,Pedro García-Teodoro,Eduardo Feo Flushing,Gianni A. Di Caro +4 more
TL;DR: Dynamical Relay Node placement Solution (DRNS) is introduced, based on the use of Particle Swarm Optimization (PSO) algorithms and is inspired by Model Predictive Control (MPC) techniques following a bi-objective optimization procedure, where both network connectivity and throughput are jointly maximized.
Journal ArticleDOI
Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks
TL;DR: The present paper introduces a novel data loss/modification detection and recovery scheme that relies on a multivariate statistical analysis approach that exploits spatial density, a common feature in network environments such as WSNs, and introduces a Novel data arrangement method to exploit the spatial correlation among the sensors in a more efficient manner.
Journal ArticleDOI
Identification of contamination zones for sinkhole detection in MANETs
TL;DR: This paper presents a novel approach intended to detect the well-known sinkhole attack in MANETs, one of the most representative route poisoning attacks aimed at exploiting multi-hop source-destination routes to seize communications.
Journal ArticleDOI
Fraud in roaming scenarios: an overview
TL;DR: The major concerns regarding such security threats are presented, and a classification for this type of attack is proposed, highlighting the necessity for the different players involved to take joint action.