Skip to content

Publications

List of articles in Journals and Conferences, and student’s Thesis

Publications

Show all

2025

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Machine Learning Predictors for Min-Entropy Estimation Journal Article

In: Entropy 2025, vol. 27, iss. 2, no. 156, pp. 1-31, 2025.

Abstract | Links | BibTeX | Tags: autoregressive processes, compromise, I-Shaper, machine learning predictors, min-entropy estimation, Qursa, random number generators

2024

Gutiérrez-Portela, Fernando; Almenares-Mendoza, Florina; Calderón-Benavides, Liliana

Evaluation of the performance of unsupervised learning algorithms for intrusion detection in unbalanced data environments Proceedings Article

In: IEEE, 2024, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: anomaly detection, compromise, intrusion detection system, machine learning, metrics, Qursa, unsupervised models

Pérez-Díaz, Jaime; Almenares-Mendoza, Florina

Authorisation models for IoT environments: A survey Journal Article

In: www.elsevier.com/locate/iot, 2024, ISSN: 2542-6605.

Abstract | Links | BibTeX | Tags: ABAC, compromise, DAC, I-Shaper, IoT, MAC, Models, Platforms, Qursa, RBAC, Security

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; and Celeste Campo,; García-Rubio, Carlos

Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference

2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9.

Abstract | Links | BibTeX | Tags: coap, compromise, cryptography, I-Shaper, IoT, MQTT-SN, Post-Quantum Cryptography, PQC, Protocols, Qursa

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Evaluating integration methods of a quantum random number generator in OpenSSL for TLS Journal Article

In: vol. 255, 2024, ISBN: 1389-1286.

Abstract | Links | BibTeX | Tags: compromise, I-Shaper, Linux, OpenSSL, QRNGs, Quantum random number generators, Qursa, TLS

Lorenzo, Vicente; Blanco-Romero, Javier; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Pérez-Díaz, J.; Almenares, Florina

Integración de un sistema de autenticación optimizado basado en PUF en OSCORE Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos

Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference

ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.

Abstract | Links | BibTeX | Tags: APT, compromise, dns tunnels, doh traffic, encrypted traffic, intrusion detection system, Qursa

Campo-Vázquez, Celeste; García-Rubio, Carlos; Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Inferring mobile applications usage from DNS traffic Proceedings Article

In: Ad Hoc Networks, Elsevier B.V., 2024.

Abstract | Links | BibTeX | Tags: compromise, dns traffic, I-Shaper, mobile applications identification, Qursa, user privacy

Moure-Garrido, Marta; Campo, Celeste; García-Rubio, Carlos

Análisis estadístico del tráfico DoH para la detección del uso malicioso de túneles Conference

Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) , 2024, ISBN: 978-84-88734-13-6.

Abstract | Links | BibTeX | Tags: analisis estadistico, compromise, cynamon, dns tunnels, DoH, malicious doh

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel; Serrano-Navarro, Adrián

PQSec-DDS: Integrating Post-Quantum Cryptography into DDS Security for Robotic Applications Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 396-403, Universidad de Sevilla , 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: compromise, DDS, I-Shaper, IIoT, PQ, qurs, Qursa, Robotic Systems, ROS2

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; García-Rubio, Carlos; Campo-Vázquez, Celeste

Caracterización de aplicaciones móviles mediante el análisis del tráfico DNS Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 506-507, Universidad de Sevilla, 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: aplicaciones moviles, compromise, privacidad, Qursa, trafico dns

Moure-Garrido, Marta; García-Rubio, Carlos; Campo, Celeste

Reducing DNS Traffic to Enhance Home IoT Device Privacy Journal Article

In: Sensors , vol. 24, iss. 9, 2024.

Abstract | Links | BibTeX | Tags: compromise, DNS, I-Shaper, IoT privacy, network traffic, Qursa

2023

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Campo-Vázquez, Carlos García-Rubio Celeste

Characterizing Mobile Applications Through Analysis of DNS Traffic Conference

PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor & Ubiquitous Networks., ACM, 2023, ISBN: N 979-8-4007-0370-6.

Abstract | Links | BibTeX | Tags: android apps, compromise, dns traffic, encrypted dns, mobile apps characterization, Qursa, user privacy

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Real time detection of malicious DoH traffic using statistical analysis Journal Article

In: COMPUTER NETWORKS, vol. 234, iss. 109910, pp. 1-10, 2023, ISSN: 1389-1286.

Abstract | Links | BibTeX | Tags: classification, compromise, computer science, cynamon, dns tunnels, doh traffic, intrusion detection system, malicious doh, Qursa, statistical analysis

Gutierrez-Portela, Fernando; Arteaga-Arteaga, Harold-Brayan; Almenares-Mendoza, Florina; Calderon-Benavides, Liliana; Acosta-Mesa, Héctor-Gabriel; Tabares-Soto, Reinel

Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI) Journal Article

In: IEEE Access, vol. 11, pp. 70542 - 70559, 2023, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: compromise, intrusion detection system, IoT

Chica, Sergio; Marín-López, Andrés; Arroyo, David; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Enhancing the anonymity and auditability of whistleblowers protection Proceedings Article

In: pp. 413 - 422, Springer International Publishing, 2023, ISBN: 978-3-031-21229-1.

Abstract | Links | BibTeX | Tags: compromise

2022

Díaz-Sanchez, Daniel; Almenarez-Mendoza, Florina; Marín-López, Andres; Rojo-Rivas, Isabel

A Hybrid Approach to Ephemeral PKI Credentials Validation and Auditing Proceedings Article

In: Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022), pp. 1043 - 1054, Springer International Publishing, 2022, ISBN: 978-3-031-21332-8.

Abstract | BibTeX | Tags: compromise, ricon

Chica, Sergio; Marín, Andrés; Arroyo-Guardeño, David; Díaz, Jesús; Almenares, Florina; Díaz, Daniel

Enhancing the anonymity and auditability of whistleblowers protection Conference

2022.

Abstract | Links | BibTeX | Tags: anonymous whistleblowing, compromise, cynamon, ECDHE, group signatures, permissioned blockchain

Perez-Diaz, Jaime; Almenares-Mendoza, Florina

Integrating an optimised PUF-based authentication scheme in OSCORE Proceedings Article

In: Ad Hoc Networks Journal, 2022, ISSN: 1570-8705.

Abstract | Links | BibTeX | Tags: coap, compromise, cynamon, IoT, mqtt, protocol security

García-Rubio, Carlos; Campo, Celeste; Moure-Garrido, Marta

Synthetic Generation of Electrical Consumption Traces in Smart Homes Conference

Lecture Notes in Networks and Systems, vol. 594, Springer International Publishing, 2022, ISBN: 978-3-031-21332-8.

Abstract | Links | BibTeX | Tags: anomaly detection, compromise, cynamon, Electricity consumption, magos, Smart home, Synthetic dataset generation

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Conference

PE-WASUN '22: Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, 2022, ISBN: 978-1-4503-9483-3.

Abstract | Links | BibTeX | Tags: classification, compromise, cynamon, dns tunnels, doh traffic, magos, malicious doh, statistical analysis

Rojo-Rivas, MaríaIsabel; Díaz-Sánchez, Daniel; Almenarez, Florina; Marín-Lopez, Andrés

Kriper: A blockchain network with permissioned storage Journal Article

In: Future Generation Computer Systems, vol. 138, pp. 160-171, 2022, ISSN: 0167-739X.

Abstract | Links | BibTeX | Tags: Access control, Blockchain, compromise, Confidentiality, cynamon, Distributed storage, Permissioned storage, privacy, ricon

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Entropy-Based Anomaly Detection in HouseholdElectricity Consumption Journal Article

In: Energies, vol. 15, 2022, ISSN: 1996-1073.

Abstract | Links | BibTeX | Tags: anomaly detection, behavior pattern, compromise, cynamon, entropy, household electricity consumption, load forecasting, magos

2021

Pérez-Díaz, Jaime; Almenares, Florina

A PUF-based Authentication Mechanism for OSCORE Conference

PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, 2021.

Abstract | Links | BibTeX | Tags: compromise