Skip to content

Publications

List of articles in Journals and Conferences, and student’s Thesis

Publications

Show all

2025

Blanco-Romero, Javier; Otero-Garcia, Pedro; Sobral-Blanco, Daniel; Almenares-Mendoza, Florina; Fernandez-Vilas, Ana; Diaz-Redondo, Rebeca

QKD-KEM: Hybrid QKD Integration into TLS with OpenSSL Providers Conference

2025.

Abstract | Links | BibTeX | Tags: I-Shaper, OpenSSL, Post-Quantum Cryptography, PQC, QKD, Qursa, TLS

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Machine Learning Predictors for Min-Entropy Estimation Journal Article

In: Entropy 2025, vol. 27, iss. 2, no. 156, pp. 1-31, 2025.

Abstract | Links | BibTeX | Tags: autoregressive processes, compromise, I-Shaper, machine learning predictors, min-entropy estimation, Qursa, random number generators

2024

Gutiérrez-Portela, Fernando; Almenares-Mendoza, Florina; Calderón-Benavides, Liliana

Evaluation of the performance of unsupervised learning algorithms for intrusion detection in unbalanced data environments Proceedings Article

In: IEEE, 2024, ISSN: 2169-3536.

Abstract | Links | BibTeX | Tags: anomaly detection, compromise, intrusion detection system, machine learning, metrics, Qursa, unsupervised models

Pérez-Díaz, Jaime; Almenares-Mendoza, Florina

Authorisation models for IoT environments: A survey Journal Article

In: www.elsevier.com/locate/iot, 2024, ISSN: 2542-6605.

Abstract | Links | BibTeX | Tags: ABAC, compromise, DAC, I-Shaper, IoT, MAC, Models, Platforms, Qursa, RBAC, Security

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; and Celeste Campo,; García-Rubio, Carlos

Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference

2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9.

Abstract | Links | BibTeX | Tags: coap, compromise, cryptography, I-Shaper, IoT, MQTT-SN, Post-Quantum Cryptography, PQC, Protocols, Qursa

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Evaluating integration methods of a quantum random number generator in OpenSSL for TLS Journal Article

In: vol. 255, 2024, ISBN: 1389-1286.

Abstract | Links | BibTeX | Tags: compromise, I-Shaper, Linux, OpenSSL, QRNGs, Quantum random number generators, Qursa, TLS

Lorenzo, Vicente; Blanco-Romero, Javier; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés

Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Pérez-Díaz, J.; Almenares, Florina

Integración de un sistema de autenticación optimizado basado en PUF en OSCORE Conference

XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.

BibTeX | Tags: compromise, Qursa

Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos

Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference

ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.

Abstract | Links | BibTeX | Tags: APT, compromise, dns tunnels, doh traffic, encrypted traffic, intrusion detection system, Qursa

Campo-Vázquez, Celeste; García-Rubio, Carlos; Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Inferring mobile applications usage from DNS traffic Proceedings Article

In: Ad Hoc Networks, Elsevier B.V., 2024.

Abstract | Links | BibTeX | Tags: compromise, dns traffic, I-Shaper, mobile applications identification, Qursa, user privacy

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; García-Rubio, Carlos; Campo-Vázquez, Celeste

Caracterización de aplicaciones móviles mediante el análisis del tráfico DNS Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 506-507, Universidad de Sevilla, 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: aplicaciones moviles, compromise, privacidad, Qursa, trafico dns

Blanco-Romero, Javier; Lorenzo, Vicente; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel; Serrano-Navarro, Adrián

PQSec-DDS: Integrating Post-Quantum Cryptography into DDS Security for Robotic Applications Proceedings Article

In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 396-403, Universidad de Sevilla , 2024, ISBN: 978-84-09-62140-8.

Abstract | Links | BibTeX | Tags: compromise, DDS, I-Shaper, IIoT, PQ, qurs, Qursa, Robotic Systems, ROS2

Moure-Garrido, Marta; García-Rubio, Carlos; Campo, Celeste

Reducing DNS Traffic to Enhance Home IoT Device Privacy Journal Article

In: Sensors , vol. 24, iss. 9, 2024.

Abstract | Links | BibTeX | Tags: compromise, DNS, I-Shaper, IoT privacy, network traffic, Qursa

2023

Lorenzo, Vicente; Blanco, Francisco Javier

Comparative Analysis of Quantum, Pseudo, and Hybrid Random Number Generation Conference

XVII Jornadas CCN-STIC CCN-CERT / V Jornadas de Ciberdefensa ESPDEF-CERT, 2023.

BibTeX | Tags: QRNGs, Qursa, rngs

Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Campo-Vázquez, Carlos García-Rubio Celeste

Characterizing Mobile Applications Through Analysis of DNS Traffic Conference

PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor & Ubiquitous Networks., ACM, 2023, ISBN: N 979-8-4007-0370-6.

Abstract | Links | BibTeX | Tags: android apps, compromise, dns traffic, encrypted dns, mobile apps characterization, Qursa, user privacy

Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos

Real time detection of malicious DoH traffic using statistical analysis Journal Article

In: COMPUTER NETWORKS, vol. 234, iss. 109910, pp. 1-10, 2023, ISSN: 1389-1286.

Abstract | Links | BibTeX | Tags: classification, compromise, computer science, cynamon, dns tunnels, doh traffic, intrusion detection system, malicious doh, Qursa, statistical analysis