Search Results - "DE FUENTES, Jose M"

Refine Results
  1. 1

    A technical characterization of APTs by leveraging public resources by González-Manzano, Lorena, de Fuentes, José M., Lombardi, Flavio, Ramos, Cristina

    “…Advanced persistent threats (APTs) have rocketed over the last years. Unfortunately, their technical characterization is incomplete—it is still unclear if they…”
    Get full text
    Journal Article
  2. 2

    On the Feasibility of Predicting Volumes of Fake News-The Spanish Case by Ibanez-Lissen, Luis, Gonzalez-Manzano, Lorena, de Fuentes, Jose M., Goyanes, Manuel

    “…The growing amount of news shared on the Internet makes it hard to verify them in real-time. Malicious actors take advantage of this situation by spreading…”
    Get full text
    Journal Article
  3. 3

    Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields by Gimenez-Aguilar, Mar, De Fuentes, Jose M., Gonzalez-Manzano, Lorena, Camara, Carmen

    Published in IEEE access (2021)
    “…Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a…”
    Get full text
    Journal Article
  4. 4

    PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing by de Fuentes, José M., González-Manzano, Lorena, Tapiador, Juan, Peris-Lopez, Pedro

    Published in Computers & security (01-08-2017)
    “…Cooperative cyberdefense has been recognized as an essential strategy to fight against cyberattacks. Cybersecurity Information Sharing (CIS), especially about…”
    Get full text
    Journal Article
  5. 5

    Design recommendations for online cybersecurity courses by González-Manzano, Lorena, de Fuentes, Jose M.

    Published in Computers & security (01-01-2019)
    “…Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to…”
    Get full text
    Journal Article
  6. 6

    CooPeD: Co-owned Personal Data management by González-Manzano, Lorena, González-Tablas, Ana I., de Fuentes, José M., Ribagorda, Arturo

    Published in Computers & security (01-11-2014)
    “…With the spread of Web-Based Social Networks (WBSNs) managing access to data is a challenging matter. Providing personalized, fine-grained access control is…”
    Get full text
    Journal Article
  7. 7

    PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things by González-Manzano, L., Fuentes, José M. de, Pastrana, Sergio, Peris-Lopez, Pedro, Hernández-Encinas, Luis

    “…Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills by Gonzalez-Tablas, Ana I, de Fuentes, Jose M, Hernandez-Ardieta, Jorge L, Ramos, Benjamin

    Published in Educational technology & society (01-07-2013)
    “…In Higher Education Engineering studies, there exists the need of engaging students in performing drill and practice activities with the goal of reinforcing…”
    Get full text
    Journal Article
  10. 10

    Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model by González-Manzano, Lorena, de Fuentes, José M., Ramos, Cristina, Sánchez, Ángel, Quispe, Florabel

    Published in Security and communication networks (29-06-2022)
    “…Nation-state cyberattacks, and particularly Advanced Persistent Threats (APTs), have rocketed in the last years. Their use may be aligned with nation-state…”
    Get full text
    Journal Article
  11. 11

    Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks by González-Manzano, Lorena, González-Tablas, Ana I., de Fuentes, José M., Ribagorda, Arturo

    Published in The Journal of systems and software (01-08-2014)
    “…•We propose a protocol for interoperability of data between Web Based Social Networks (WBSNs).•The protocol also enables reusability of access control policies…”
    Get full text
    Journal Article
  12. 12

    A taxonomy and survey of attacks on digital signatures by Hernandez-Ardieta, Jorge L., Gonzalez-Tablas, Ana I., de Fuentes, Jose M., Ramos, Benjamin

    Published in Computers & security (01-05-2013)
    “…Non-repudiation is a desired property of current electronic transactions, by which a further repudiation of the commitments made by any involved party is…”
    Get full text
    Journal Article
  13. 13

    Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation by González-Manzano, L., de Fuentes, José M., Peris-Lopez, P., Camara, C.

    Published in Future generation computer systems (01-12-2017)
    “…Wearable devices are a part of Internet-of-Things (IoT) that may offer valuable data of their porting user. This paper explores the use of ElectroCardioGram…”
    Get full text
    Journal Article
  14. 14

    SmartLED: Smartphone-Based Covert Channels Leveraging the Notification LED by Gonzalez-Manzano, Lorena, Bernardez, Sergio, de Fuentes, Jose M.

    “…The widespread adoption of smartphones make them essential in daily routines. Thus, they can be used to create a covert channel without raising suspicions. To…”
    Get full text
    Conference Proceeding
  15. 15

    Probabilistic yoking proofs for large scale IoT systems by de Fuentes, José M., Peris-Lopez, Pedro, Tapiador, Juan E., Pastrana, Sergio

    Published in Ad hoc networks (01-09-2015)
    “…Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications in which it is needed to build an evidence that several…”
    Get full text
    Journal Article
  16. 16

    Impact of injection attacks on sensor-based continuous authentication for smartphones by Gonzalez-Manzano, Lorena, Mahbub, Upal, de Fuentes, Jose M., Chellappa, Rama

    Published in Computer communications (01-11-2020)
    “…Given the relevance of smartphones for accessing personalized services in smart cities, Continuous Authentication (CA) mechanisms are attracting attention to…”
    Get full text
    Journal Article
  17. 17

    Hindering false event dissemination in VANETs with proof-of-work mechanisms by Palomar, Esther, de Fuentes, José M., González-Tablas, Ana I., Alcaide, Almudena

    “…► Our scheme hinders the dissemination of false event warning messages in VANETs. ► The application of proof-of-work systems discourages vehicles from flooding…”
    Get full text
    Journal Article
  18. 18

    SoNeUCONABC, an expressive usage control model for Web-Based Social Networks by González-Manzano, Lorena, González-Tablas, Ana I., de Fuentes, José M., Ribagorda, Arturo

    Published in Computers & security (01-06-2014)
    “…In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the…”
    Get full text
    Journal Article
  19. 19

    SoNeUCON sub(ABC), expressive usage control model for Web-Based Social Networks by Gonzalez-Manzano, Lorena, Gonzalez-Tablas, Ana I, de Fuentes, Jose M, Ribagorda, Arturo

    Published in Computers & security (01-06-2014)
    “…In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the…”
    Get full text
    Journal Article
  20. 20