José María de Fuenteshttps://scholar.google.com/citations?user=eBt__HMAAAAJhttps://orcid.org/0000-0002-4023-3197https://www.wikidata.org/entity/Q61091315Luis Ibanez-LissenLorena González-ManzanoJosé María de FuentesManuel GoyanesOn the Feasibility of Predicting Volumes of Fake News - The Spanish Case.5230-52402024August11IEEE Trans. Comput. Soc. Syst.4https://doi.org/10.1109/TCSS.2023.3297093db/journals/tcss/tcss11.html#IbanezLissenGFG24streams/journals/tcssLuis Ibanez-LissenJosé María de FuentesLorena González-ManzanoNicolas AnciauxContinuous Authentication Leveraging Matrix Profile.7:1-7:132024AREShttps://doi.org/10.1145/3664476.3664481conf/IEEEares/2024db/conf/IEEEares/ares2024.html#Ibanez-LissenFG24Cédric EichlerNathan ChampeilNicolas AnciauxAlexandra BensamounHéber Hwang ArcoleziJosé María de FuentesNob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction.2024abs/2408.05968CoRRhttps://doi.org/10.48550/arXiv.2408.05968db/journals/corr/corr2408.html#abs-2408-05968streams/journals/corrLorena González-ManzanoMarta BeltránJosé María de FuentesGianluca DiniCristina AlcarazCybersecurity in the digital world.242-2432023July144Future Gener. Comput. Syst.https://doi.org/10.1016/j.future.2023.03.001db/journals/fgcs/fgcs144.html#GonzalezManzanoBFDA23Mar Gimenez-AguilarJosé María de FuentesLorena González-ManzanoMalicious uses of blockchains by malware: from the analysis to Smart-Zephyrus.1445-14802023October22Int. J. Inf. Sec.5https://doi.org/10.1007/s10207-023-00700-3https://www.wikidata.org/entity/Q122966939db/journals/ijisec/ijisec22.html#GimenezAguilarFG23Lorena González-ManzanoJosé María de FuentesFlavio LombardiCristina RamosA technical characterization of APTs by leveraging public resources.1567-15842023December22Int. J. Inf. Sec.6https://doi.org/10.1007/s10207-023-00706-xdb/journals/ijisec/ijisec22.html#GonzalezManzanoFLR23Luis Hernández-ÁlvarezElena BarbieratoStefano CaputoJosé María de FuentesLorena González-ManzanoLuis Hernández EncinasLorenzo MucchiKeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism.1-92023September173Pattern Recognit. Lett.https://doi.org/10.1016/j.patrec.2023.07.008db/journals/prl/prl173.html#HernandezAlvarezBCFGEM23Miguel Peidro-ParedesJosé María de FuentesLorena González-ManzanoMiguel Velasco-GomezCharacterizing the MasterPrint threat on Android devices with capacitive sensors.16:1-16:112023AREShttps://doi.org/10.1145/3600160.3600177conf/IEEEares/2023db/conf/IEEEares/ares2023.html#Peidro-ParedesF23José Reverte CazorlaJosé María de FuentesLorena González-ManzanoEye-based keystroke prediction for natural texts - a feasibility analysis.375-3822022TrustComhttps://doi.org/10.1109/TrustCom56396.2022.00059conf/trustcom/2022db/conf/trustcom/trustcom2022.html#CazorlaFG22Mar Gimenez-AguilarJosé María de FuentesLorena González-ManzanoCarmen CamaraZephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields.118553-11857020219IEEE Accesshttps://doi.org/10.1109/ACCESS.2021.3106713db/journals/access/access9.html#Gimenez-Aguilar21Mar Gimenez-AguilarJosé María de FuentesLorena González-ManzanoDavid ArroyoAchieving cybersecurity in blockchain-based systems: A survey.91-1182021124Future Gener. Comput. Syst.https://doi.org/10.1016/j.future.2021.05.007db/journals/fgcs/fgcs124.html#Gimenez-Aguilar21Luis Hernández-ÁlvarezJosé María de FuentesLorena González-ManzanoLuis Hernández EncinasSmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation.189-1962021147Pattern Recognit. Lett.https://doi.org/10.1016/j.patrec.2021.04.013db/journals/prl/prl147.html#Hernandez-Alvarez21Luis Hernández-ÁlvarezJosé María de FuentesLorena González-ManzanoLuis Hernández EncinasPrivacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review.92202121Sensors1https://doi.org/10.3390/s21010092https://www.wikidata.org/entity/Q104614898db/journals/sensors/sensors21.html#Hernandez-Alvarez21Carmen CamaraPedro Peris-LopezJosé María de FuentesSamuel MarchalAccess Control for Implantable Medical Devices.1126-113820219IEEE Trans. Emerg. Top. Comput.3https://doi.org/10.1109/TETC.2020.2982461db/journals/tetc/tetc9.html#CamaraPFM21Lorena González-ManzanoUpal MahbubJosé María de FuentesRama ChellappaImpact of injection attacks on sensor-based continuous authentication for smartphones.150-1612020163Comput. Commun.https://doi.org/10.1016/j.comcom.2020.08.022db/journals/comcom/comcom163.html#Gonzalez-Manzano20Lorena González-ManzanoSergio BernardezJosé María de FuentesSmartLED: Smartphone-based covert channels leveraging the notification LED.1748-17552020TrustComhttps://doi.org/10.1109/TrustCom50675.2020.00240conf/trustcom/2020db/conf/trustcom/trustcom2020.html#Gonzalez-Manzano20Lorena González-ManzanoJosé María de FuentesDesign recommendations for online cybersecurity courses.238-256201980Comput. Secur.https://doi.org/10.1016/j.cose.2018.09.009https://www.wikidata.org/entity/Q115059496db/journals/compsec/compsec80.html#Gonzalez-Manzano19Lorena González-ManzanoJosé María de FuentesArturo RibagordaLeveraging User-related Internet of Things for Continuous Authentication: A Survey.53:1-53:38201952ACM Comput. Surv.3https://doi.org/10.1145/3314023db/journals/csur/csur52.html#Gonzalez-Manzano19Omid MirzaeiJosé María de FuentesJuan E. TapiadorLorena González-ManzanoAndrODet: An adaptive Android obfuscation detector.240-261201990Future Gener. Comput. Syst.https://doi.org/10.1016/j.future.2018.07.066db/journals/fgcs/fgcs90.html#MirzaeiFTG19Constantinos PatsakisKleanthis DelliosJosé María de FuentesFran CasinoAgusti SolanasExternal Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security.289-30320193J. Hardw. Syst. Secur.3https://doi.org/10.1007/s41635-019-00076-8https://www.wikidata.org/entity/Q115143333db/journals/jhss/jhss3.html#PatsakisDFCS19José María de FuentesLorena González-ManzanoJavier López 0001Pedro Peris-LopezKim-Kwang Raymond ChooEditorial: Security and Privacy in Internet of Things.878-880201924Mob. Networks Appl.3https://doi.org/10.1007/s11036-018-1150-8db/journals/monet/monet24.html#FuentesGLPC19Omid MirzaeiGuillermo Suarez-TangilJosé María de FuentesJuan TapiadorGianluca StringhiniAndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.307-3142019AsiaCCShttps://doi.org/10.1145/3321705.3329854conf/ccs/2019asiadb/conf/ccs/asiaccs2019.html#MirzaeiSFTS19José María de FuentesLorena González-ManzanoAgusti SolanasFatbardh VeseliAttribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities.44-53201851Computer7https://doi.org/10.1109/MC.2018.3011042http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011042db/journals/computer/computer51.html#FuentesGSV18Pedro Peris-LopezLorena González-ManzanoCarmen CamaraJosé María de FuentesEffect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.67-77201881Future Gener. Comput. Syst.https://doi.org/10.1016/j.future.2017.11.037db/journals/fgcs/fgcs81.html#Peris-LopezGCF18José María de FuentesLorena González-ManzanoArturo RibagordaSecure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.1219201818Sensors4https://doi.org/10.3390/s18041219https://www.wikidata.org/entity/Q54945884db/journals/sensors/sensors18.html#FuentesGR18José María de FuentesLuis Hernández EncinasArturo RibagordaSecurity Protocols for Networks and Internet: A Global Vision.135-1512018Computer and Network Security Essentialshttps://doi.org/10.1007/978-3-319-58424-9_8books/sp/D2018db/books/collections/D2018.html#FuentesER18José María de FuentesLorena González-ManzanoJuan E. TapiadorPedro Peris-LopezPRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.127-141201769Comput. Secur.https://doi.org/10.1016/j.cose.2016.12.011https://www.wikidata.org/entity/Q115060188db/journals/compsec/compsec69.html#FuentesGTP17Lorena González-ManzanoJosé María de FuentesPedro Peris-LopezCarmen CamaraEncryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.136-148201777Future Gener. Comput. Syst.https://doi.org/10.1016/j.future.2017.07.018https://www.wikidata.org/entity/Q121268941db/journals/fgcs/fgcs77.html#Gonzalez-Manzano17Fei Yu 0001Chin-Chen Chang 0001Jian ShuIftikhar AhmadJun Zhang 0010José María de FuentesRecent Advances in Security and Privacy for Wireless Sensor Networks 2016.3057534:1-3057534:320172017J. Sensorshttps://doi.org/10.1155/2017/3057534https://www.wikidata.org/entity/Q59147068db/journals/js/js2017.html#YuCSAZF17José María de FuentesLorena González-ManzanoJetzabel Serna-OlveraFatbardh VeseliAssessment of attribute-based credentials for privacy-preserving road traffic services in smart cities.869-891201721Pers. Ubiquitous Comput.5https://doi.org/10.1007/s00779-017-1057-6db/journals/puc/puc21.html#FuentesGSV17Omid MirzaeiGuillermo Suarez-TangilJuan E. TapiadorJosé María de FuentesTriFlow: Triaging Android Applications using Speculative Information Flows.640-6512017AsiaCCShttps://doi.org/10.1145/3052973.3053001conf/ccs/2017asiadb/conf/ccs/asiaccs2017.html#MirzaeiSTF17Lorena González-ManzanoMark SlaymakerJosé María de FuentesDimitris VayenasSoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance.234-2522017ATCS/SePrIoT@SecureCommhttps://doi.org/10.1007/978-3-319-78816-6_17conf/securecomm/2017wdb/conf/securecomm/securecomm2017w.html#Gonzalez-Manzano17Alfonso Blanco BlancoJosé María de FuentesLorena González-ManzanoLuis Hernández EncinasAgustín Martín MuñozJosé Luis Rodrigo OlivaJ. Ignacio Sánchez GarcíaA Framework for Acquiring and Analyzing Traces from Cryptographic Devices.283-3002017ATCS/SePrIoT@SecureCommhttps://doi.org/10.1007/978-3-319-78816-6_20conf/securecomm/2017wdb/conf/securecomm/securecomm2017w.html#BlancoFGEMOG17Lorena González-ManzanoJosé María de FuentesSergio PastranaPedro Peris-LopezLuis Hernández EncinasPAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.59-71201671J. Netw. Comput. Appl.https://doi.org/10.1016/j.jnca.2016.06.001https://www.wikidata.org/entity/Q115041059db/journals/jnca/jnca71.html#Gonzalez-Manzano16José María de FuentesLorena González-ManzanoOmid MirzaeiPrivacy Models in Wireless Sensor Networks: A Survey.4082084:1-4082084:1820162016J. Sensorshttps://doi.org/10.1155/2016/4082084https://www.wikidata.org/entity/Q59129731db/journals/js/js2016.html#FuentesGM16Lorena González-ManzanoJosé María de FuentesKim-Kwang Raymond Chooase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.412-4282016SecureCommhttps://doi.org/10.1007/978-3-319-59608-2_24conf/securecomm/2016db/conf/securecomm/securecomm2016.html#Gonzalez-Manzano16José María de FuentesPedro Peris-LopezJuan E. TapiadorSergio PastranaProbabilistic yoking proofs for large scale IoT systems.43-52201532Ad Hoc Networkshttps://doi.org/10.1016/j.adhoc.2015.01.003https://www.wikidata.org/entity/Q113881404db/journals/adhoc/adhoc32.html#FuentesPTP15Fei Yu 0001Chin-Chen Chang 0001Jian ShuIftikhar AhmadJun Zhang 0010José María de FuentesRecent Advances in Security and Privacy for Wireless Sensor Networks.169305:1-169305:220152015J. Sensorshttps://doi.org/10.1155/2015/169305https://www.wikidata.org/entity/Q59114324db/journals/js/js2015.html#YuCSAZF15Lorena González-ManzanoJosé María de FuentesAgustín OrfilaAccess Control for the Cloud Based on Multi-device Authentication.856-8632015TrustCom/BigDataSE/ISPA (1)https://doi.org/10.1109/Trustcom.2015.457conf/trustcom/2015-1db/conf/trustcom/trustcom2015-1.html#Gonzalez-Manzano15Lorena González-ManzanoAna Isabel González-Tablas FerreresJosé María de FuentesArturo RibagordaSoNeUCONABC, an expressive usage control model for Web-Based Social Networks.159-187201443Comput. Secur.https://doi.org/10.1016/j.cose.2014.03.009https://www.wikidata.org/entity/Q115060764db/journals/compsec/compsec43.html#Gonzalez-ManzanoGFR14Lorena González-ManzanoAna Isabel González-Tablas FerreresJosé María de FuentesArturo RibagordaCooPeD: Co-owned Personal Data management.41-65201447Comput. Secur.https://doi.org/10.1016/j.cose.2014.06.003https://www.wikidata.org/entity/Q115060713db/journals/compsec/compsec47.html#Gonzalez-ManzanoFFR14José María de FuentesJorge Blasco AlísAna Isabel González-Tablas FerreresLorena González-ManzanoApplying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.201410Int. J. Distributed Sens. Networkshttps://doi.org/10.1155/2014/120626db/journals/ijdsn/ijdsn10.html#FuentesAFG14Lorena González-ManzanoAna Isabel González-Tablas FerreresJosé María de FuentesArturo RibagordaExtended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.50-71201494J. Syst. Softw.https://doi.org/10.1016/j.jss.2014.04.044db/journals/jss/jss94.html#Gonzalez-ManzanoFFR14Julian SchütteDennis TitzeJosé María de FuentesAppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps.370-3792014TrustComhttps://doi.org/10.1109/TrustCom.2014.48https://doi.ieeecomputersociety.org/10.1109/TrustCom.2014.48conf/trustcom/2014db/conf/trustcom/trustcom2014.html#SchutteTF14Ana Isabel González-Tablas FerreresAlmudena AlcaideJosé María de FuentesJosé Montero-CastilloPrivacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations.2693-2709201311Ad Hoc Networks8https://doi.org/10.1016/j.adhoc.2013.05.008db/journals/adhoc/adhoc11.html#FerreresAFM13Jorge L. Hernandez-ArdietaAna Isabel González-Tablas FerreresJosé María de FuentesBenjamín RamosA taxonomy and survey of attacks on digital signatures.67-112201334Comput. Secur.https://doi.org/10.1016/j.cose.2012.11.009https://www.wikidata.org/entity/Q115061096db/journals/compsec/compsec34.html#Hernandez-ArdietaFFR13Ana Isabel González-Tablas FerreresJosé María de FuentesJorge L. Hernandez-ArdietaBenjamín RamosLeveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills.28-43201316J. Educ. Technol. Soc.3http://www.ifets.info/download_pdf.php?j_id=60&a_id=1375db/journals/ets/ets16.html#FerreresFHR13José María de FuentesLorena González-ManzanoAna Isabel González-Tablas FerreresJorge Blasco AlísWEVAN - A mechanism for evidence creation and verification in VANETs.985-995201359J. Syst. Archit.10-Bhttps://doi.org/10.1016/j.sysarc.2013.07.009db/journals/jsa/jsa59.html#FuentesGFA13Lorena González-ManzanoAna Isabel González-Tablas FerreresJosé María de FuentesArturo RibagordaUser-Managed Access Control in Web Based Social Networks.97-1372013Security and Privacy Preserving in Social Networkshttps://doi.org/10.1007/978-3-7091-0894-9_4series/lnsn/2013cbdb/series/lnsn/cb2013.html#Gonzalez-ManzanoGFR13Jorge Blasco AlísJulio César Hernández CastroJosé María de FuentesBenjamín RamosA framework for avoiding steganography usage over HTTP.491-501201235J. Netw. Comput. Appl.1https://doi.org/10.1016/j.jnca.2011.10.003db/journals/jnca/jnca35.html#AlisCFR12Lorena González-ManzanoAna Isabel González-Tablas FerreresJosé María de FuentesArturo RibagordaU+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.1387-13922012TrustComhttps://doi.org/10.1109/TrustCom.2012.288https://doi.ieeecomputersociety.org/10.1109/TrustCom.2012.288conf/trustcom/2012db/conf/trustcom/trustcom2012.html#Gonzalez-ManzanoFFR12Ana Isabel González-Tablas FerreresAlmudena AlcaideGuillermo Suarez-TangilJosé María de FuentesIsrael Barroso-PerezPOSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.224-2272011MobiQuitoushttps://doi.org/10.1007/978-3-642-30973-1_21http://eudl.eu/doi/10.1007/978-3-642-30973-1_21conf/mobiquitous/2011db/conf/mobiquitous/mobiquitous2011.html#Gonzalez-TablasASFB11Almudena AlcaideAli E. AbdallahAna Isabel González-Tablas FerreresJosé María de FuentesL-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols.108-1222010DPM/SETOPhttps://doi.org/10.1007/978-3-642-19348-4_9conf/esorics/2010-6514db/conf/esorics/lncs6514.html#AlcaideAFF10Guillermo Suarez-TangilEsther PalomarJosé María de FuentesJorge Blasco AlísArturo RibagordaAutomatic Rule Generation Based on Genetic Programming for Event Correlation.127-1342009CISIShttps://doi.org/10.1007/978-3-642-04091-7_16conf/cisis-spain/2009db/conf/cisis-spain/cisis2009.html#Suarez-TangilPFAR09José María de FuentesAna Isabel González-Tablas FerreresArturo RibagordaCERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.363-3682008AREShttps://doi.org/10.1109/ARES.2008.146https://doi.ieeecomputersociety.org/10.1109/ARES.2008.146conf/IEEEares/2008db/conf/IEEEares/ares2008.html#FuentesFR08Ali E. AbdallahIftikhar AhmadAlmudena AlcaideCristina AlcarazJorge Blasco AlísNicolas AnciauxHéber Hwang ArcoleziDavid ArroyoElena BarbieratoIsrael Barroso-PerezMarta BeltránAlexandra BensamounSergio BernardezAlfonso Blanco BlancoCarmen CamaraStefano CaputoFran CasinoJulio César Hernández CastroJosé Reverte CazorlaNathan ChampeilChin-Chen Chang 0001Rama ChellappaKim-Kwang Raymond ChooKleanthis DelliosGianluca DiniCédric EichlerLuis Hernández EncinasJ. Ignacio Sánchez GarcíaMar Gimenez-AguilarLorena González-ManzanoAna I. González-TablasAna Isabel González-Tablas FerreresManuel GoyanesLuis Hernández-ÁlvarezJorge L. Hernandez-ArdietaLuis Ibanez-LissenFlavio LombardiJavier López 0001Upal MahbubSamuel MarchalAgustín Martín 0001Agustín Martín MuñozOmid MirzaeiJosé Montero-CastilloLorenzo MucchiJosé Luis Rodrigo OlivaAgustín OrfilaEsther PalomarSergio PastranaConstantinos PatsakisMiguel Peidro-ParedesPedro Peris-LopezBenjamín RamosCristina RamosArturo RibagordaJulian SchütteJetzabel Serna-OlveraJian ShuMark SlaymakerAgusti SolanasGianluca StringhiniGuillermo Suarez-TangilJuan TapiadorJuan E. TapiadorDennis TitzeDimitris VayenasMiguel Velasco-GomezFatbardh VeseliFei Yu 0001Jun Zhang 0010