Skip to content

Publications

List of articles in Journals and Conferences, and student's Thesis

Publications

170 entries « 1 of 4 »

2024

Gutiérrez-Portela, Fernando; Almenares-Mendoza, Florina; Calderón-Benavides, Liliana

Evaluation of the performance of unsupervised learning algorithms for intrusion detection in unbalanced data environments Proceedings Article

In: IEEE, 2024, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: anomaly detection, compromise, intrusion detection system, machine learning, metrics, Qursa, unsupervised models

Pérez-Díaz, Jaime; Almenares-Mendoza, Florina

Authorisation models for IoT environments: A survey Journal Article

In: www.elsevier.com/locate/iot, 2024, ISSN: 2542-6605.

Abstract | Links | BibTeX | Tags: ABAC, compromise, DAC, I-Shaper, IoT, MAC, Models, Platforms, Qursa, RBAC, Security

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; and Celeste Campo,; García-Rubio, Carlos

Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference

2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9.

Abstract | Links | BibTeX | Tags: coap, compromise, cryptography, I-Shaper, IoT, MQTT-SN, Post-Quantum Cryptography, PQC, Protocols, Qursa

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Evaluating integration methods of a quantum random number generator in OpenSSL for TLS Journal Article

In: vol. 255, 2024, ISBN: 1389-1286.

Abstract | Links | BibTeX | Tags: compromise, I-Shaper, Linux, OpenSSL, QRNGs, Quantum random number generators, Qursa, TLS

Lorenzo, Vicente; Blanco-Romero, Javier; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Pérez-Díaz, J.; Almenares, Florina

Integración de un sistema de autenticación optimizado basado en PUF en OSCORE Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Callejo, Patricia; Gómez-Fernandez, Ignacio; Bagnulo, Marcelo

“Animation” URL in NFT marketplaces considered harmful for privacy Journal Article

In: International Journal of Information Security, 2024, ISSN: 1615-5270.

Abstract | Links | BibTeX | Tags: Blockchain, I-Shaper, NFT, privacy

Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos

Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference

ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.

Abstract | Links | BibTeX | Tags: APT, compromise, dns tunnels, doh traffic, encrypted traffic, intrusion detection system, Qursa

Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos

Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference

ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.

Abstract | Links | BibTeX | Tags: APT, compromise, dns tunnels, doh traffic, encrypted traffic, intrusion detection system, Qursa

Campo-Vázquez, Celeste; García-Rubio, Carlos; Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Inferring mobile applications usage from DNS traffic Proceedings Article

In: Ad Hoc Networks, Elsevier B.V., 2024.

Abstract | Links | BibTeX | Tags: compromise, dns traffic, I-Shaper, mobile applications identification, Qursa, user privacy

Moure-Garrido, Marta; Campo, Celeste; García-Rubio, Carlos

Análisis estadístico del tráfico DoH para la detección del uso malicioso de túneles Conference

Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) , 2024, ISBN: 978-84-88734-13-6.

Abstract | Links | BibTeX | Tags: analisis estadistico, compromise, cynamon, dns tunnels, DoH, malicious doh

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel; Serrano-Navarro, Adrián

PQSec-DDS: Integrating Post-Quantum Cryptography into DDS Security for Robotic Applications Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 396-403, Universidad de Sevilla , 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: compromise, DDS, I-Shaper, IIoT, PQ, qurs, Qursa, Robotic Systems, ROS2

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; García-Rubio, Carlos; Campo-Vázquez, Celeste

Caracterización de aplicaciones móviles mediante el análisis del tráfico DNS Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 506-507, Universidad de Sevilla, 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: aplicaciones moviles, compromise, privacidad, Qursa, trafico dns

Moure-Garrido, Marta; García-Rubio, Carlos; Campo, Celeste

Reducing DNS Traffic to Enhance Home IoT Device Privacy Journal Article

In: Sensors , vol. 24, iss. 9, 2024.

Abstract | Links | BibTeX | Tags: compromise, DNS, I-Shaper, IoT privacy, network traffic, Qursa

2023

Lorenzo, Vicente; Blanco, Francisco Javier

Comparative Analysis of Quantum, Pseudo, and Hybrid Random Number Generation Conference

XVII Jornadas CCN-STIC CCN-CERT / V Jornadas de Ciberdefensa ESPDEF-CERT, 2023.

BibTeX | Tags: QRNGs, Qursa, rngs

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Campo-Vázquez, Carlos García-Rubio Celeste

Characterizing Mobile Applications Through Analysis of DNS Traffic Conference

PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor & Ubiquitous Networks., ACM, 2023, ISBN: N 979-8-4007-0370-6.

Abstract | Links | BibTeX | Tags: android apps, compromise, dns traffic, encrypted dns, mobile apps characterization, Qursa, user privacy

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Real time detection of malicious DoH traffic using statistical analysis Journal Article

In: COMPUTER NETWORKS, vol. 234, iss. 109910, pp. 1-10, 2023, ISSN: 1389-1286.

Abstract | Links | BibTeX | Tags: classification, compromise, computer science, cynamon, dns tunnels, doh traffic, intrusion detection system, malicious doh, Qursa, statistical analysis

Gutierrez-Portela, Fernando; Arteaga-Arteaga, Harold-Brayan; Almenares-Mendoza, Florina; Calderon-Benavides, Liliana; Acosta-Mesa, Héctor-Gabriel; Tabares-Soto, Reinel

Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI) Journal Article

In: IEEE Access, vol. 11, pp. 70542 - 70559, 2023, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: compromise, intrusion detection system, IoT

Chica, Sergio; Marín-López, Andrés; Arroyo, David; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Enhancing the anonymity and auditability of whistleblowers protection Proceedings Article

In: pp. 413 - 422, Springer International Publishing, 2023, ISBN: 978-3-031-21229-1.

Abstract | Links | BibTeX | Tags: compromise

2022

Díaz-Sanchez, Daniel; Almenarez-Mendoza, Florina; Marín-López, Andres; Rojo-Rivas, Isabel

A Hybrid Approach to Ephemeral PKI Credentials Validation and Auditing Proceedings Article

In: Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022), pp. 1043 - 1054, Springer International Publishing, 2022, ISBN: 978-3-031-21332-8.

Abstract | BibTeX | Tags: compromise, ricon

Chica, Sergio; Marín, Andrés; Arroyo-Guardeño, David; Díaz, Jesús; Almenares, Florina; Díaz, Daniel

Enhancing the anonymity and auditability of whistleblowers protection Conference

2022.

Abstract | Links | BibTeX | Tags: anonymous whistleblowing, compromise, cynamon, ECDHE, group signatures, permissioned blockchain

Perez-Diaz, Jaime; Almenares-Mendoza, Florina

Integrating an optimised PUF-based authentication scheme in OSCORE Proceedings Article

In: Ad Hoc Networks Journal, 2022, ISSN: 1570-8705.

Abstract | Links | BibTeX | Tags: coap, compromise, cynamon, IoT, mqtt, protocol security

García-Rubio, Carlos; Campo, Celeste; Moure-Garrido, Marta

Synthetic Generation of Electrical Consumption Traces in Smart Homes Conference

Lecture Notes in Networks and Systems, vol. 594, Springer International Publishing, 2022, ISBN: 978-3-031-21332-8.

Abstract | Links | BibTeX | Tags: anomaly detection, compromise, cynamon, Electricity consumption, magos, Smart home, Synthetic dataset generation

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Conference

PE-WASUN '22: Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, 2022, ISBN: 978-1-4503-9483-3.

Abstract | Links | BibTeX | Tags: classification, compromise, cynamon, dns tunnels, doh traffic, magos, malicious doh, statistical analysis

Díaz-Sánchez, Daniel; Guerrero, Rosa Sánchez; López, Andrés Marín; Almenares, Florina; Arias, Patricia

A H.264 SVC distributed content protection system with flexible key stream generation Proceedings Article

In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2022, ISSN: 2166-6814.

Abstract | Links | BibTeX | Tags: Cloud computing, cryptography, multimedia, servicioseguridad

Rojo-Rivas, MaríaIsabel; Díaz-Sánchez, Daniel; Almenarez, Florina; Marín-Lopez, Andrés

Kriper: A blockchain network with permissioned storage Journal Article

In: Future Generation Computer Systems, vol. 138, pp. 160-171, 2022, ISSN: 0167-739X.

Abstract | Links | BibTeX | Tags: Access control, Blockchain, compromise, Confidentiality, cynamon, Distributed storage, Permissioned storage, privacy, ricon

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Entropy-Based Anomaly Detection in HouseholdElectricity Consumption Journal Article

In: Energies, vol. 15, 2022, ISSN: 1996-1073.

Abstract | Links | BibTeX | Tags: anomaly detection, behavior pattern, compromise, cynamon, entropy, household electricity consumption, load forecasting, magos

2021

Pérez-Díaz, Jaime; Almenares, Florina

A PUF-based Authentication Mechanism for OSCORE Conference

PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, 2021.

Abstract | Links | BibTeX | Tags: compromise

Seoane-Merida, Victor; García-Rubio, Carlos; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste

Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article

In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286.

Abstract | Links | BibTeX | Tags: coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security

Gutierrez-Portela, Fernando; Almenares-Mendoza, Florina; Calderon-Benavides, Liliana; Romero-Riaño, Efren

Security perspective of wireless sensor networks = Prospectiva de seguridad de las redes de sensores inalámbricos Proceedings Article

In: pp. 189-201, UIS-Ingeniería , 2021, ISSN: 1657-4583.

Abstract | Links | BibTeX | Tags: inteligencia artificial, redes de sensores inalambricos, Security, tecnicas no supervisadas, tecnicas supervisadas, wsn

2020

Seoane-Merida, Victor; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos

Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments Conference

PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2020, ISBN: 978-1-4503-8118-5.

Abstract | Links | BibTeX | Tags: coap, cynamon, DTLS, IoT, magos, Performance evaluation

Marín-López, Andrés; Chica-Manjarrez, Sergio; Arroyo, David; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain Journal Article

In: Electronics, vol. 9, pp. 1865, 2020, ISSN: 2079-9292.

Abstract | Links | BibTeX | Tags: cynamon, inteligenciafuentesabiertas, permissioned blockchain, scalability, security auditing, smart grid security

Bernabé-Sánchez, Iván; Díaz-Sánchez, Daniel; Muñoz-Organero, Mario

Specification and Unattended Deployment of Home Networks at the Edge of the Network Journal Article

In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 66, iss. 4, pp. 279 - 288, 2020, ISSN: 0098-3063.

Abstract | Links | BibTeX | Tags: Cloud computing, connected consumer devices, edge computing, fog computing, joint digital transformation, orchestrator

Diaz-Redondo, Rebeca; García-Rubio, Carlos; Campo-Vázquez, Ana Fernandez-Vilas Celeste; Rodriguez-Carrion, Alicia

A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics Journal Article

In: Future generation computer systems, vol. 109, pp. 83-94, 2020, ISSN: 0167-739X.

Abstract | Links | BibTeX | Tags: crowd dynamics, density-based clustering, emadrid, entropy analysis, instagram, location-based social network

Chica-Manjarrez, Sergio; Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenares-Mendoza, Florina

On the Automation of Auditing in Power Grid Companies Proceedings Article

In: Actas de congreso internacional, Citas Google 2, CORE C, pp. 331 - 340, 2020, ISBN: ISSN/ISBN) 978-1-4503-5988-7.

Abstract | Links | BibTeX | Tags: auditing, containers, cynamon, inteligenciafuentesabiertas, privacy, scalability, Security

Rubio-Drosdov, Eugenio; Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenares-Mendoza, Florina

A Framework for Microservice Migration and Performance Assessment Proceedings Article

In: pp. 291 - 299, 2020, ISBN: 978-1-4503-5988-7.

Abstract | Links | BibTeX | Tags: cynamon, inteligenciafuentesabiertas, IoT, microservices, smart grids, testing

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Anomalies detection using entropy in household energy consumption data Conference

Intelligent Environments 2020 Workshop Proceedings of the 16th International Conference on Intelligent Environments, 2020, ISBN: 978-1-64368-090-3.

Abstract | Links | BibTeX | Tags: anomaly, cynamon, entropy, household energy consumption

AGUILAR-IGARTUA, MÓNICA; ALMENARES-MENDOZA, FLORINA; DÍAZ-REDONDO, REBECA; MARTÍN-VICENTE, MANUELA; FORNÉ, JORDI; CAMPO, CELESTE; FERNÁNDEZ-VILAS, ANA; CRUZ-LLOPIS, LUIS; GARCÍA-RUBIO, CARLOS; MARÍN-LÓPEZ, ANDRÉS; MOHAMAD-MEZHER, AHMAD; DÍAZ-SÁNCHEZ, DANIEL; CEREZO-COSTAS, HÉCTOR; REBOLLO-MONEDERO, DAVID; ARIAS-CABARCOS, PATRICIA; RICO-NOVELLA, FRANCISCO JOSÉ

INRISCO: INcident monitoRing in Smart COmmunities Journal Article

In: IEEE Access, vol. 8, pp. 72435 - 72460, 2020, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: big data analysis, citizen sensor, early detection of incidents, inrisco, Smart Cities, social networks, vehicular communications

2019

Martí, Mónica; García-Rubio, Carlos; Campo-Vázquez, Celeste

Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Conference

Proceedings of 13th International Conference on Ubiquitous Computing and Ambient ‪Intelligence UCAmI 2019, MDPI AG , 2019.

Abstract | Links | BibTeX | Tags: coap, Energy consumption, inrisco, IoT, magos, MQTT_SN, wsn

Díaz-Sánchez, Daniel; Marín-Lopez, Andrés; Mendoza, Florina Almenárez; Cabarcos, Patricia Arias

DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT † Journal Article

In: Sensors, vol. 19, iss. 15, pp. 1-23, 2019, ISSN: 1424-8220.

Abstract | Links | BibTeX | Tags: authentication, chameleon signatures, cynamon, DANE, DNSSEC, Internet of Things, magos, microservices

Simon-Sherratt, Robert; Janko, Balazs; Hui, Terence; S.-Harwin, William; Dey, Nilanjan; Díaz-Sánchez, Daniel; Wang, Jin; Shi, Fuqian

Task Scheduling to Constrain Peak Current Consumption in Wearable Healthcare Sensors Journal Article

In: Electronics, vol. 8, pp. 789, 2019, ISSN: 2079-9292.

Abstract | Links | BibTeX | Tags: embedded, health care, joint digital transformation, low-power, task scheduler, wearable

Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Simon-Sherratt, R.

TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article

In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X.

Abstract | Links | BibTeX | Tags: authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials

Seiler-Hwang, Sunyoung; Arias-Cabarcos, Patricia; Marín, Andrés; Almenares, Florina; Díaz-Sánchez, Daniel; Becker, Christian

I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers Proceedings Article

In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1937–1953, The 26th ACM Conference on Computer and Communications Security ACM, London, United Kingdom, 2019, ISBN: 978-1-4503-6747-9.

Abstract | Links | BibTeX | Tags: authentication, password managers, usable security, user study

2018

García-Rubio, Carlos; Diaz-Redondo, Rebeca; Campo-Vázquez, Celeste; Fernandez-Vilas, Ana

Using entropy of social media location data for the detection of crowd dynamics anomalies Journal Article

In: Electronics, vol. 7, iss. 12, pp. 380, 2018, ISSN: 2079-9292.

Abstract | Links | BibTeX | Tags: anomaly detection, city behavior, data mining algorithms, location-based social network

Almenarez, Florina; Alonso, Lucía; Marín, Andrés; Díaz-Sánchez, Daniel; Arias, Patricia

Assessment of fitness tracker security: a case of study Proceedings Article

In: 2018, ISSN: 2504-3900.

Abstract | Links | BibTeX | Tags: fitness tracker, inteligenciafuentesabiertas, security vulnerabilities, wereable devices

Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenares-Mendoza, Florina; Arias-Cabarcos, Patricia

DNS-Based Dynamic Authentication for Microservices in IoT Proceedings Article

In: pp. 1-11, 2018, ISSN: 2504-3900.

Abstract | Links | BibTeX | Tags: chameleon signatures, DANE, DNSSEC, inteligenciafuentesabiertas, IoT, microservices

Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos

Detecting and reducing biases in cellular-based mobility data sets Journal Article

In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300.

Abstract | Links | BibTeX | Tags: cell-based location, human mobility, inrisco, mobility data sets entropy, mobility data sets predictability, ping-pong effect

Alario-Hoyos, Carlos; Estevez-Ayres, Iria; Gallego-Romero, Jesus; Delgado-Kloss, Carlos; Fernandez-Panadero, Carmen; Crespo-Garcia, Raquel; Almenares-Mendoza, Florina; Ibañez-Espiga, Blanca; Villena-Roman, Julio; Ruiz-Magaña, Jorge; Blasco-Alis, Jorge

A study of learning-by-doing in MOOCs through the integration of third-party external tools: comparison of synchronous and asynchronous running modes Journal Article

In: JOURNAL OF UNIVERSAL COMPUTER SCIENCE , vol. 24, iss. 8, pp. 1015-1033, 2018, ISSN: 0948-695X.

Abstract | Links | BibTeX | Tags: codeboard, emadrid, instructor-paced, Moocs, programming tools, self-paced

Hinajeros, Francisca; Almenares-Mendoza, Florina; Gomila, Patricia Arias-Cabarcos Josep-Lluis Ferrer; Marín-López, Andrés

RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. Journal Article

In: IEEE Transactions on Information Forensics and Security , vol. 13, iss. 8, pp. 1975-1988, 2018, ISSN: 1556-6013.

Abstract | Links | BibTeX | Tags: certificate validation, mobile applications, risk assessment, trust validation

2017

Rubio-Drosdov, E; Díaz-Sánchez, D; Almenárez, F; Arias-Cabarcos, P; Marín, A

Seamless human-device interaction in the internet of things Journal Article

In: IEEE Transactions on Consumer Electronics, vol. 63, iss. 4, pp. 490-498, 2017, ISSN: 1558-4127.

Abstract | Links | BibTeX | Tags: Human-Device Interaction, inrisco, Internet of Things, Natural Language Processing

170 entries « 1 of 4 »