skip to content

Department of Computer Science and Technology

  • Affiliate
  • This person is no longer active in the department.


Journal articles

  • Caines, A., Pastrana, S., Hutchings, A. and Buttery, PJ., 2018. Automatically identifying the function and intent of posts in underground forums Crime Science, v. 7
  • González-Manzano, L., Fuentes, JMD., Pastrana, S., Peris-Lopez, P. and Hernández-Encinas, L., 2016. PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things Journal of Network and Computer Applications, v. 71
    Doi: 10.1016/j.jnca.2016.06.001
  • Pastrana, S., Tapiador, JE., Orfila, A. and Peris-Lopez, P., 2015. DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks Computer Networks, v. 80
    Doi: 10.1016/j.comnet.2015.01.012
  • De Fuentes, JM., Peris-Lopez, P., Tapiador, JE. and Pastrana, S., 2015. Probabilistic yoking proofs for large scale IoT systems Ad Hoc Networks, v. 32
    Doi: 10.1016/j.adhoc.2015.01.003
  • Suarez-Tangil, G., Tapiador, JE., Peris-Lopez, P. and Pastrana, S., 2015. Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation Pervasive and Mobile Computing, v. 18
    Doi: 10.1016/j.pmcj.2014.10.007
  • Pastrana, S., Orfila, A., Tapiador, JE. and Peris-Lopez, P., 2014. Randomized Anagram revisited Journal of Network and Computer Applications, v. 41
  • Pastrana, S., Mitrokotsa, A., Orfila, A. and Peris-Lopez, P., 2012. Evaluation of classification algorithms for intrusion detection in MANETs Knowledge-Based Systems, v. 36
  • Pastrana, S. and Suarez-Tangil, G., A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth
  • Conference proceedings

  • Thomas, DR., Pastrana Portillo, S., Hutchings, A., Clayton, R. and Beresford, AR., 2017. Ethical issues in research using datasets of illicit origin Proceedings of IMC '17,
    Doi: 10.1145/3131365.3131389
  • Garrido-Pelaz, R., González-Manzano, L. and Pastrana, S., 2016. Shall we collaborate? A model to analyse the benefits of information sharing WISCS 2016 - Proceedings of the 2016 ACM Workshop on Information Sharing and Collaborative Security, co-located with CCS 2016,
  • Pastrana, S., Tapiador, J., Suarez-Tangil, G. and Peris-López, P., 2016. AVRAND: A software-based defense against code reuse attacks for AVR embedded devices Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9721
    Doi: 10.1007/978-3-319-40667-1_4
  • Alberca, C., Pastrana, S., Suarez-Tangil, G. and Palmieri, P., 2016. Security analysis and exploitation of arduino devices in the internet of things 2016 ACM International Conference on Computing Frontiers - Proceedings,
    Doi: 10.1145/2903150.2911708
  • Pastrana, S., Torrano-Gimenez, C., Nguyen, HT. and Orfila, A., 2015. Anomalous web payload detection: Evaluating the resilience of 1-grams basedclassifiers Studies in Computational Intelligence, v. 570
    Doi: 10.1007/978-3-319-10422-5_21
  • Pastrana, S., Orfila, A. and Ribagorda, A., 2011. A functional framework to evade network IDS Proceedings of the Annual Hawaii International Conference on System Sciences,
  • Suarez-Tangil, G., Palomar, E., Pastrana, S. and Ribagorda, A., 2011. Artificial immunity-based correlation system SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography,
  • Pastrana Portillo, S., Thomas, DR., Hutchings, A. and Clayton, R., CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
  • Pastrana Portillo, S., Hutchings, A., Caines, A. and Buttery, P., Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
  • Book chapters

  • Pastrana, S., Montero-Castillo, J. and Orfila, A., 2013. Eading idss and firewalls as fundamental sources of information in siems
  • Contact Details