Search Results - "DE FUENTES, Jose M"
-
1
A technical characterization of APTs by leveraging public resources
Published in International journal of information security (01-12-2023)“…Advanced persistent threats (APTs) have rocketed over the last years. Unfortunately, their technical characterization is incomplete—it is still unclear if they…”
Get full text
Journal Article -
2
On the Feasibility of Predicting Volumes of Fake News-The Spanish Case
Published in IEEE transactions on computational social systems (01-08-2024)“…The growing amount of news shared on the Internet makes it hard to verify them in real-time. Malicious actors take advantage of this situation by spreading…”
Get full text
Journal Article -
3
Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields
Published in IEEE access (2021)“…Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a…”
Get full text
Journal Article -
4
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
Published in Computers & security (01-08-2017)“…Cooperative cyberdefense has been recognized as an essential strategy to fight against cyberattacks. Cybersecurity Information Sharing (CIS), especially about…”
Get full text
Journal Article -
5
Design recommendations for online cybersecurity courses
Published in Computers & security (01-01-2019)“…Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to…”
Get full text
Journal Article -
6
CooPeD: Co-owned Personal Data management
Published in Computers & security (01-11-2014)“…With the spread of Web-Based Social Networks (WBSNs) managing access to data is a challenging matter. Providing personalized, fine-grained access control is…”
Get full text
Journal Article -
7
PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things
Published in Journal of network and computer applications (01-08-2016)“…Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies…”
Get full text
Journal Article -
8
Editorial: Security and Privacy in Internet of Things
Published in Mobile networks and applications (01-06-2019)Get full text
Journal Article -
9
Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills
Published in Educational technology & society (01-07-2013)“…In Higher Education Engineering studies, there exists the need of engaging students in performing drill and practice activities with the goal of reinforcing…”
Get full text
Journal Article -
10
Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model
Published in Security and communication networks (29-06-2022)“…Nation-state cyberattacks, and particularly Advanced Persistent Threats (APTs), have rocketed in the last years. Their use may be aligned with nation-state…”
Get full text
Journal Article -
11
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks
Published in The Journal of systems and software (01-08-2014)“…•We propose a protocol for interoperability of data between Web Based Social Networks (WBSNs).•The protocol also enables reusability of access control policies…”
Get full text
Journal Article -
12
A taxonomy and survey of attacks on digital signatures
Published in Computers & security (01-05-2013)“…Non-repudiation is a desired property of current electronic transactions, by which a further repudiation of the commitments made by any involved party is…”
Get full text
Journal Article -
13
Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation
Published in Future generation computer systems (01-12-2017)“…Wearable devices are a part of Internet-of-Things (IoT) that may offer valuable data of their porting user. This paper explores the use of ElectroCardioGram…”
Get full text
Journal Article -
14
SmartLED: Smartphone-Based Covert Channels Leveraging the Notification LED
Published in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-12-2020)“…The widespread adoption of smartphones make them essential in daily routines. Thus, they can be used to create a covert channel without raising suspicions. To…”
Get full text
Conference Proceeding -
15
Probabilistic yoking proofs for large scale IoT systems
Published in Ad hoc networks (01-09-2015)“…Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications in which it is needed to build an evidence that several…”
Get full text
Journal Article -
16
Impact of injection attacks on sensor-based continuous authentication for smartphones
Published in Computer communications (01-11-2020)“…Given the relevance of smartphones for accessing personalized services in smart cities, Continuous Authentication (CA) mechanisms are attracting attention to…”
Get full text
Journal Article -
17
Hindering false event dissemination in VANETs with proof-of-work mechanisms
Published in Transportation research. Part C, Emerging technologies (01-08-2012)“…► Our scheme hinders the dissemination of false event warning messages in VANETs. ► The application of proof-of-work systems discourages vehicles from flooding…”
Get full text
Journal Article -
18
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks
Published in Computers & security (01-06-2014)“…In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the…”
Get full text
Journal Article -
19
SoNeUCON sub(ABC), expressive usage control model for Web-Based Social Networks
Published in Computers & security (01-06-2014)“…In the era of hyper-connectivity Web-Based Social Networks (WBSNs) are demanding applications. They facilitate the interaction of huge amounts of users and the…”
Get full text
Journal Article -
20
CooPeD: Co-owned Personal Data management: Special issue on trust in cyber, physical and social computing
Published in Computers & security (2014)Get full text
Journal Article