Guillermo Suárez-Tangil
Guillermo Suárez-Tangil
Assistant Professor, IMDEA Networks Institute & King's College London
Verified email at imdea.org - Homepage
Title
Cited by
Cited by
Year
Evolution, Detection and Analysis of Malware in Smart Devices
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, A Ribagorda
IEEE Communications Surveys & Tutorials 16 (2), 961-987, 2014
2872014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104–1117, 2014
2512014
DroidSieve: Fast and accurate classification of obfuscated android malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
7th ACM Conference on Data and Applications Security and Privacy, 2017
1652017
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
1572017
DroidScribe: Classifying Android Malware based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Mobile Security Technologies (MOST), 2016
1532016
On the Origins of Memes by Means of Fringe Web Communities
S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ...
ACM Internet Measurement Conference, 2018
1392018
Euphony: Harmonious unification of cacophonous anti-virus vendor labels for android malware
M Hurier, G Suarez-Tangil, SK Dash, TF Bissyandé, Y Le Traon, J Klein, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
572017
Secure publish-subscribe protocols for heterogeneous medical wireless body area networks
P Picazo-Sanchez, JE Tapiador, P Peris-Lopez, G Suarez-Tangil
Sensors 14 (12), 22619-22642, 2014
492014
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models
G Suarez-Tangil, M Conti, JE Tapiador, P Peris-Lopez
European Symposium On Research In Computer Security (ESORICS) 8712, 183-201, 2014
432014
Information sharing models for cooperative cyber defence
JL Hernandez-Ardieta, JE Tapiador, G Suarez-Tangil
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-28, 2013
392013
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
E Mariconti, G Suarez-Tangil, J Blackburn, E De Cristofaro, N Kourtellis, ...
ACM Conference on Computer-Supported Cooperative Work and Social Computing …, 2019
382019
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
S Pastrana, G Suarez-Tangil
ACM Internet Measurement Conference (IMC), 2019
382019
Smart home personal assistants: a security and privacy review
JS Edu, JM Such, G Suarez-Tangil
ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020
372020
Providing SIEM systems with self-adaptation
G Suarez-Tangil, E Palomar, A Ribagorda, I Sanz
Information Fusion 21, 145–158, 2015
372015
Eight years of rider measurement in the android malware ecosystem
G Suarez-Tangil, G Stringhini
IEEE Transactions on Dependable and Secure Computing, 2020
36*2020
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, Carlos: Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
312016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
IEEE Transactions on Mobile Computing, 2016
302016
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection
A Deo, SK Dash, G Suarez-Tangil, V Vovk, L Cavallaro
9th ACM Workshop on Artificial Intelligence and Security, 2016
282016
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
G Suarez-Tangil, JE Tapiador, P Peris-Lopez
International Conference on Information Security and Cryptology, 2014
272014
Power-aware Anomaly Detection in Smartphones: An Analysis of On-Platform versus Externalized Operation
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, S Pastraba
Pervasive and Mobile Computing 18, 137-151, 2015
252015
The system can't perform the operation now. Try again later.
Articles 1–20