Name
Affiliation
Papers
PEDRO MALAGÓN
Dpto. Ingeniería Electrónica, Universidad Politécnica de Madrid, ETSI Telecomunicación, Av. Complutense, 30, 28040 Madrid, Spain
35
Collaborators
Citations 
PageRank 
50
58
13.59
Referers 
Referees 
References 
157
634
277
Search Limit
100634
Title
Citations
PageRank
Year
The Constant Multiplier FFT00.342021
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks00.342021
Toward hardware‐accelerated QoS‐aware 5G network slicing based on data plane programmability00.342020
Mercury: a Modeling, Simulation, and Optimization Framework for Data Stream-Oriented IoT Applications10.412020
Microarchitectural Isolation Guarantees Through Execution Based Signatures00.342020
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.00.342019
NetFPGA-Based Firewall Solution for 5G Multi-Tenant Architectures00.342019
P4-NetFPGA-based network slicing solution for 5G MEC architectures10.412019
Towards an FPGA-Accelerated programmable data path for edge-to-core communications in 5G networks.50.472018
CacheShield: Detecting Cache Attacks through Self-Observation.40.432018
Tuning Cnn Input Layout For Ids With Genetic Algorithms10.392018
Hardware-Accelerated Firewall for 5G Mobile Networks10.362018
Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms00.342018
Building accurate models to determine the current CPU utilization of a host within a virtual machine allocated on it.00.342017
Modeling side-channel cache attacks on AES.20.482016
Real-time hardware/software co-design using devs-based transparent M&S framework.00.342016
Bitslice software implementation of KeeLoq as a side-channel countermeasure00.342015
Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres.10.362015
Bio-inspired enhancement of reputation systems for intelligent environments40.402013
Using clustering techniques for intelligent camera-based user interfaces.10.392012
Improving security in WMNs with reputation systems and self-organizing maps80.482011
Image Processing Algorithms for AAL Services.00.342011
RFID Performance in Localization Systems00.342011
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques00.342011
Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches.00.342010
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques30.412010
Detecting And Confining Sybil Attack In Wireless Sensor Networks Based On Reputation Systems Coupled With Self-Organizing Maps10.362010
Using self-organizing maps for intelligent camera-based user interfaces10.362010
Image Processing Based Services for Ambient Assistant Scenarios30.422009
SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems20.402009
Modular Framework for Smart Home Applications00.342009
Analysis and Design of an Object Tracking Service for Intelligent Environments10.432009
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.170.892009
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors00.342009
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor10.362007