Search Results - "Campo, Celeste"
-
1
Reducing DNS Traffic to Enhance Home IoT Device Privacy
Published in Sensors (Basel, Switzerland) (01-05-2024)“…The deployment of Internet of Things (IoT) devices is widespread in different environments, including homes. Although security is incorporated, homes can…”
Get full text
Journal Article -
2
Entropy-Based Anomaly Detection in Household Electricity Consumption
Published in Energies (Basel) (01-03-2022)“…Energy efficiency is one of the most important current challenges, and its impact at a global level is considerable. To solve current challenges, it is…”
Get full text
Journal Article -
3
Detecting and Reducing Biases in Cellular-Based Mobility Data Sets
Published in Entropy (Basel, Switzerland) (25-09-2018)“…Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve the performance of mobile networks, as well…”
Get full text
Journal Article -
4
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Published in Sensors (Basel, Switzerland) (20-07-2015)“…Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make…”
Get full text
Journal Article -
5
A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs
Published in Sensors (Basel, Switzerland) (27-06-2016)“…The recent release of standards for vehicular communications will hasten the development of smart cities in the following years. Many applications for…”
Get full text
Journal Article -
6
Entropy-Based Privacy against Profiling of User Mobility
Published in Entropy (Basel, Switzerland) (01-06-2015)“…Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be…”
Get full text
Journal Article -
7
A bandwidth-efficient service for local information dissemination in sparse to dense roadways
Published in Sensors (Basel, Switzerland) (05-07-2013)“…Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able to deploy applications on roadways that will contribute to energy efficiency…”
Get full text
Journal Article -
8
Study of LZ-based location prediction and its application to transportation recommender systems
Published in Sensors (Basel, Switzerland) (01-06-2012)“…Predicting users' next location allows to anticipate their future context, thus providing additional time to be ready for that context and react consequently…”
Get full text
Journal Article -
9
Performance evaluation of CoAP and MQTT with security support for IoT environments
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-10-2021)“…World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are…”
Get full text
Journal Article -
10
INRISCO: INcident monitoRing in Smart COmmunities
Published in IEEE access (2020)“…Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving…”
Get full text
Journal Article -
11
Real time detection of malicious DoH traffic using statistical analysis
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-10-2023)“…The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for…”
Get full text
Journal Article -
12
Inferring mobile applications usage from DNS traffic
Published in Ad hoc networks (01-10-2024)“…In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of…”
Get full text
Journal Article -
13
Evaluating integration methods of a quantum random number generator in OpenSSL for TLS
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-12-2024)“…The rapid advancement of quantum computing poses a significant threat to conventional cryptography. Whilst post-quantum cryptography (PQC) stands as the…”
Get full text
Journal Article -
14
Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols
Published in 2024 IEEE Symposium on Computers and Communications (ISCC) (26-06-2024)“…Post-Quantum Cryptography (PQC) is a practical and cost-effective solution to defend against emerging quantum computing threats. So, leading worldwide security…”
Get full text
Conference Proceeding -
15
Real-Time Analysis of Encrypted DNS Traffic for Threat Detection
Published in ICC 2024 - IEEE International Conference on Communications (09-06-2024)“…Domain Name System (DNS) tunneling is a well-known cyber-attack that allows data exfiltration - the attackers exploit this tunnel to extract sensitive…”
Get full text
Conference Proceeding -
16
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment
Published in Proceedings (01-11-2019)“…The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs)…”
Get full text
Journal Article -
17
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics
Published in Future generation computer systems (01-08-2020)“…Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns of the…”
Get full text
Journal Article -
18
Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks
Published in IEEE communications letters (01-08-2010)“…In mobile phones, it is useful to know the most probable next location to make decisions about future actions. In this letter we compare three LZ based…”
Get full text
Journal Article -
19
Augmenting Mobile Search Engines to Leverage Context Awareness : Context-aware computing
Published in IEEE internet computing (2012)Get full text
Journal Article -
20
Augmenting Mobile Search Engines to Leverage Context Awareness
Published in IEEE internet computing (01-03-2012)“…Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through…”
Get full text
Journal Article