Follow
Carlos Garcia Cordero
Carlos Garcia Cordero
Senior Consultant at CGI
Verified email at binarycharly.com - Homepage
Title
Cited by
Cited by
Year
Multi-stage attack detection and signature generation with ICS honeypots
E Vasilomanolakis, S Srinivasa, CG Cordero, M Mühlhäuser
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1227-1232, 2016
722016
Analyzing flow-based anomaly intrusion detection using replicator neural networks
CG Cordero, S Hauke, M Mühlhäuser, M Fischer
2016 14th Annual Conference on Privacy, Security and Trust (PST), 317-324, 2016
712016
On generating network traffic datasets with synthetic attacks for intrusion detection
CG Cordero, E Vasilomanolakis, A Wainakh, M Mühlhäuser, ...
arXiv preprint arXiv:1905.00304, 2019
612019
ID2T: A DIY dataset creation toolkit for intrusion detection systems
CG Cordero, E Vasilomanolakis, N Milanov, C Koch, D Hausheer, ...
2015 IEEE Conference on Communications and Network Security (CNS), 739-740, 2015
412015
Towards the creation of synthetic, yet realistic, intrusion detection datasets
E Vasilomanolakis, CG Cordero, N Milanov, M Mühlhäuser
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1209-1214, 2016
392016
User-level label leakage from gradients in federated learning
A Wainakh, F Ventola, T Müßig, J Keim, CG Cordero, E Zimmer, T Grube, ...
arXiv preprint arXiv:2105.09369, 2021
322021
Skipmon: A locality-aware collaborative intrusion detection system
E Vasilomanolakis, M Krügl, CG Cordero, M Mühlhäuser, M Fischer
2015 IEEE 34th International Performance Computing and Communications …, 2015
322015
User label leakage from gradients in federated learning
A Wainakh, F Ventola, T Müßig, J Keim, CG Cordero, E Zimmer, T Grube, ...
arXiv preprint arXiv:2105.09369, 2021
262021
Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures
E Vasilomanolakis, M Stahn, CG Cordero, M Mühlhäuser
2015 IEEE Conference on Communications and Network Security (CNS), 699-700, 2015
122015
Community-based collaborative intrusion detection
CG Cordero, E Vasilomanolakis, M Mühlhäuser, M Fischer
Security and Privacy in Communication Networks: 11th EAI International …, 2015
122015
HOLEG: A simulator for evaluating resilient energy networks based on the Holon analogy
R Egert, CG Cordero, A Tundis, M Mühlhäuser
2017 IEEE/ACM 21st International Symposium on Distributed Simulation and …, 2017
102017
Security perspectives for collaborative data acquisition in the internet of things
V Gazis, CG Cordero, E Vasilomanolakis, P Kikiras, A Wiesmaier
Internet of Things. IoT Infrastructures: First International Summit, IoT360 …, 2015
102015
On probe-response attacks in collaborative intrusion detection systems
E Vasilomanolakis, M Stahn, CG Cordero, M Mühlhäuser
2016 IEEE Conference on Communications and Network Security (CNS), 279-286, 2016
92016
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper)
G Traverso, CG Cordero, M Nojoumian, R Azarderakhsh, D Demirel, ...
2017 15th Annual Conference on Privacy, Security and Trust (PST), 277-282, 2017
82017
Parameter adaptation and criticality in particle swarm optimization
CG Cordero
arXiv preprint arXiv:1705.06966, 2017
82017
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection
CG Cordero, G Traverso, M Nojoumian, SM Habib, M Mühlhäuser, ...
IEEE Access 6, 72427-72438, 2018
62018
Increasing the resilience of cyber physical systems in smart grid environments using dynamic cells
A Tundis, CG Cordero, R Egert, A Garro, M Mühlhäuser
Proceedings of the 19th International Conference on Cyber-Physical Systems …, 2017
62017
Improving the capabilities of distributed collaborative intrusion detection systems using machine learning
CG Cordero
Universitäts-und Landesbibliothek Darmstadt, 2019
12019
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments Using a Holon-based Analogy
A Tundis, CG Cordero, R Egert, A Garro, M Mühlhäuser
The system can't perform the operation now. Try again later.
Articles 1–19