default search action
Pablo Moriano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Pablo Moriano, Andy Berres, Haowen Xu, Jibonananda Sanyal:
Spatiotemporal features of traffic help reduce automatic accident detection time. Expert Syst. Appl. 244: 122813 (2024) - [i12]Zhi-Feng Wei, Pablo Moriano, Ramakrishnan Kannan:
Robustness of graph embedding methods for community detection. CoRR abs/2405.00636 (2024) - [i11]Pablo Moriano, Steven C. Hespeler, Mingyan Li, Robert A. Bridges:
Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN. CoRR abs/2406.13778 (2024) - [i10]William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore:
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning. CoRR abs/2408.05427 (2024) - 2023
- [j5]Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level. IEEE Internet Things J. 10(24): 22111-22127 (2023) - [c8]Edmon Begoli, Edmon Meyer, Pablo Moriano, Sean Oesch:
Poster: Cognitive Cyber - Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing Environments. DEBS 2023: 177-179 - [i9]Moyi Tian, Pablo Moriano:
Robustness of community structure under edge addition. CoRR abs/2304.07238 (2023) - [i8]Samuel C. Hollifield, Pablo Moriano, William L. Lambert, Joel Asiamah, Isaac Sikkema, Michael D. Iannacone:
Developing and Deploying Security Applications for In-Vehicle Networks. CoRR abs/2306.15588 (2023) - 2022
- [i7]Pablo Moriano, Robert A. Bridges, Michael D. Iannacone:
Detecting CAN Masquerade Attacks with Signal Clustering Similarity. CoRR abs/2201.02665 (2022) - [i6]Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou:
CANShield: Signal-based Intrusion Detection for Controller Area Networks. CoRR abs/2205.01306 (2022) - 2021
- [j4]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using bursty announcements for detecting BGP routing anomalies. Comput. Networks 188: 107835 (2021) - [i5]Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C. Hollifield:
Time-Based CAN Intrusion Detection Benchmark. CoRR abs/2101.05781 (2021) - [i4]Jonathan Bryan, Pablo Moriano:
Graph-Based Machine Learning Improves Just-in-Time Defect Prediction. CoRR abs/2110.05371 (2021) - 2020
- [c7]Jayati Dev, Pablo Moriano, L. Jean Camp:
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. SOUPS @ USENIX Security Symposium 2020: 81-97
2010 – 2019
- 2019
- [i3]Pablo Moriano, Raquel Hill, L. Jean Camp:
Using Bursty Announcements for Early Detection of BGP Routing Anomalies. CoRR abs/1905.05835 (2019) - 2018
- [j3]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 4-29 (2018) - 2017
- [j2]Pablo Moriano, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Comput. Secur. 70: 319-334 (2017) - [j1]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp:
Factors in an end user security expertise instrument. Inf. Comput. Secur. 25(2): 190-205 (2017) - [c6]Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp:
Insider Threat Event Detection in User-System Interactions. MIST@CCS 2017: 1-12 - 2016
- [c5]Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:
What Can Johnny Do?–Factors in an End-User Expertise Instrument. HAISA 2016: 199-208 - 2014
- [c4]Pablo Moriano, Jorge Finke:
Characterizing the relationship between degree distributions and community structures. ACC 2014: 2383-2388 - [c3]Pablo Moriano, Jorge Finke:
Model-based fraud detection in growing networks. CDC 2014: 6068-6073 - 2013
- [c2]Pablo Moriano, Jorge Finke:
Structure of growing networks with no preferential attachment. ACC 2013: 1088-1093 - [i2]Pablo Moriano, Jorge Finke:
On the formation of structure in growing networks. CoRR abs/1301.4192 (2013) - 2011
- [c1]Pablo Moriano, Jorge Finke:
Heavy-tailed weighted networks from local attachment strategies. CDC/ECC 2011: 5211-5216 - [i1]Pablo Moriano, Jorge Finke:
Power-law weighted networks from local attachments. CoRR abs/1110.0751 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint