iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/53/4378.xml
José María de Fuentes https://scholar.google.com/citations?user=eBt__HMAAAAJ https://orcid.org/0000-0002-4023-3197 https://www.wikidata.org/entity/Q61091315
Luis Ibanez-Lissen Lorena González-Manzano José María de Fuentes Manuel Goyanes On the Feasibility of Predicting Volumes of Fake News - The Spanish Case. 5230-5240 2024 August 11 IEEE Trans. Comput. Soc. Syst. 4 https://doi.org/10.1109/TCSS.2023.3297093 db/journals/tcss/tcss11.html#IbanezLissenGFG24 streams/journals/tcss
Luis Ibanez-Lissen José María de Fuentes Lorena González-Manzano Nicolas Anciaux Continuous Authentication Leveraging Matrix Profile. 7:1-7:13 2024 ARES https://doi.org/10.1145/3664476.3664481 conf/IEEEares/2024 db/conf/IEEEares/ares2024.html#Ibanez-LissenFG24
Cédric Eichler Nathan Champeil Nicolas Anciaux Alexandra Bensamoun Héber Hwang Arcolezi José María de Fuentes Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction. 2024 abs/2408.05968 CoRR https://doi.org/10.48550/arXiv.2408.05968 db/journals/corr/corr2408.html#abs-2408-05968 streams/journals/corr
Lorena González-Manzano Marta Beltrán José María de Fuentes Gianluca Dini Cristina Alcaraz Cybersecurity in the digital world. 242-243 2023 July 144 Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2023.03.001 db/journals/fgcs/fgcs144.html#GonzalezManzanoBFDA23
Mar Gimenez-Aguilar José María de Fuentes Lorena González-Manzano Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. 1445-1480 2023 October 22 Int. J. Inf. Sec. 5 https://doi.org/10.1007/s10207-023-00700-3 https://www.wikidata.org/entity/Q122966939 db/journals/ijisec/ijisec22.html#GimenezAguilarFG23
Lorena González-Manzano José María de Fuentes Flavio Lombardi Cristina Ramos A technical characterization of APTs by leveraging public resources. 1567-1584 2023 December 22 Int. J. Inf. Sec. 6 https://doi.org/10.1007/s10207-023-00706-x db/journals/ijisec/ijisec22.html#GonzalezManzanoFLR23
Luis Hernández-Álvarez Elena Barbierato Stefano Caputo José María de Fuentes Lorena González-Manzano Luis Hernández Encinas Lorenzo Mucchi KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism. 1-9 2023 September 173 Pattern Recognit. Lett. https://doi.org/10.1016/j.patrec.2023.07.008 db/journals/prl/prl173.html#HernandezAlvarezBCFGEM23
Miguel Peidro-Paredes José María de Fuentes Lorena González-Manzano Miguel Velasco-Gomez Characterizing the MasterPrint threat on Android devices with capacitive sensors. 16:1-16:11 2023 ARES https://doi.org/10.1145/3600160.3600177 conf/IEEEares/2023 db/conf/IEEEares/ares2023.html#Peidro-ParedesF23 José Reverte Cazorla José María de Fuentes Lorena González-Manzano Eye-based keystroke prediction for natural texts - a feasibility analysis. 375-382 2022 TrustCom https://doi.org/10.1109/TrustCom56396.2022.00059 conf/trustcom/2022 db/conf/trustcom/trustcom2022.html#CazorlaFG22
Mar Gimenez-Aguilar José María de Fuentes Lorena González-Manzano Carmen Camara Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields. 118553-118570 2021 9 IEEE Access https://doi.org/10.1109/ACCESS.2021.3106713 db/journals/access/access9.html#Gimenez-Aguilar21
Mar Gimenez-Aguilar José María de Fuentes Lorena González-Manzano David Arroyo Achieving cybersecurity in blockchain-based systems: A survey. 91-118 2021 124 Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2021.05.007 db/journals/fgcs/fgcs124.html#Gimenez-Aguilar21
Luis Hernández-Álvarez José María de Fuentes Lorena González-Manzano Luis Hernández Encinas SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. 189-196 2021 147 Pattern Recognit. Lett. https://doi.org/10.1016/j.patrec.2021.04.013 db/journals/prl/prl147.html#Hernandez-Alvarez21
Luis Hernández-Álvarez José María de Fuentes Lorena González-Manzano Luis Hernández Encinas Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. 92 2021 21 Sensors 1 https://doi.org/10.3390/s21010092 https://www.wikidata.org/entity/Q104614898 db/journals/sensors/sensors21.html#Hernandez-Alvarez21
Carmen Camara Pedro Peris-Lopez José María de Fuentes Samuel Marchal Access Control for Implantable Medical Devices. 1126-1138 2021 9 IEEE Trans. Emerg. Top. Comput. 3 https://doi.org/10.1109/TETC.2020.2982461 db/journals/tetc/tetc9.html#CamaraPFM21
Lorena González-Manzano Upal Mahbub José María de Fuentes Rama Chellappa Impact of injection attacks on sensor-based continuous authentication for smartphones. 150-161 2020 163 Comput. Commun. https://doi.org/10.1016/j.comcom.2020.08.022 db/journals/comcom/comcom163.html#Gonzalez-Manzano20
Lorena González-Manzano Sergio Bernardez José María de Fuentes SmartLED: Smartphone-based covert channels leveraging the notification LED. 1748-1755 2020 TrustCom https://doi.org/10.1109/TrustCom50675.2020.00240 conf/trustcom/2020 db/conf/trustcom/trustcom2020.html#Gonzalez-Manzano20
Lorena González-Manzano José María de Fuentes Design recommendations for online cybersecurity courses. 238-256 2019 80 Comput. Secur. https://doi.org/10.1016/j.cose.2018.09.009 https://www.wikidata.org/entity/Q115059496 db/journals/compsec/compsec80.html#Gonzalez-Manzano19
Lorena González-Manzano José María de Fuentes Arturo Ribagorda Leveraging User-related Internet of Things for Continuous Authentication: A Survey. 53:1-53:38 2019 52 ACM Comput. Surv. 3 https://doi.org/10.1145/3314023 db/journals/csur/csur52.html#Gonzalez-Manzano19
Omid Mirzaei José María de Fuentes Juan E. Tapiador Lorena González-Manzano AndrODet: An adaptive Android obfuscation detector. 240-261 2019 90 Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2018.07.066 db/journals/fgcs/fgcs90.html#MirzaeiFTG19
Constantinos Patsakis Kleanthis Dellios José María de Fuentes Fran Casino Agusti Solanas External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security. 289-303 2019 3 J. Hardw. Syst. Secur. 3 https://doi.org/10.1007/s41635-019-00076-8 https://www.wikidata.org/entity/Q115143333 db/journals/jhss/jhss3.html#PatsakisDFCS19
José María de Fuentes Lorena González-Manzano Javier López 0001 Pedro Peris-Lopez Kim-Kwang Raymond Choo Editorial: Security and Privacy in Internet of Things. 878-880 2019 24 Mob. Networks Appl. 3 https://doi.org/10.1007/s11036-018-1150-8 db/journals/monet/monet24.html#FuentesGLPC19
Omid Mirzaei Guillermo Suarez-Tangil José María de Fuentes Juan Tapiador Gianluca Stringhini AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. 307-314 2019 AsiaCCS https://doi.org/10.1145/3321705.3329854 conf/ccs/2019asia db/conf/ccs/asiaccs2019.html#MirzaeiSFTS19
José María de Fuentes Lorena González-Manzano Agusti Solanas Fatbardh Veseli Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities. 44-53 2018 51 Computer 7 https://doi.org/10.1109/MC.2018.3011042 http://doi.ieeecomputersociety.org/10.1109/MC.2018.3011042 db/journals/computer/computer51.html#FuentesGSV18
Pedro Peris-Lopez Lorena González-Manzano Carmen Camara José María de Fuentes Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things. 67-77 2018 81 Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.11.037 db/journals/fgcs/fgcs81.html#Peris-LopezGCF18
José María de Fuentes Lorena González-Manzano Arturo Ribagorda Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. 1219 2018 18 Sensors 4 https://doi.org/10.3390/s18041219 https://www.wikidata.org/entity/Q54945884 db/journals/sensors/sensors18.html#FuentesGR18
José María de Fuentes Luis Hernández Encinas Arturo Ribagorda Security Protocols for Networks and Internet: A Global Vision. 135-151 2018 Computer and Network Security Essentials https://doi.org/10.1007/978-3-319-58424-9_8 books/sp/D2018 db/books/collections/D2018.html#FuentesER18
José María de Fuentes Lorena González-Manzano Juan E. Tapiador Pedro Peris-Lopez PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. 127-141 2017 69 Comput. Secur. https://doi.org/10.1016/j.cose.2016.12.011 https://www.wikidata.org/entity/Q115060188 db/journals/compsec/compsec69.html#FuentesGTP17
Lorena González-Manzano José María de Fuentes Pedro Peris-Lopez Carmen Camara Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation. 136-148 2017 77 Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.07.018 https://www.wikidata.org/entity/Q121268941 db/journals/fgcs/fgcs77.html#Gonzalez-Manzano17
Fei Yu 0001 Chin-Chen Chang 0001 Jian Shu Iftikhar Ahmad Jun Zhang 0010 José María de Fuentes Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. 3057534:1-3057534:3 2017 2017 J. Sensors https://doi.org/10.1155/2017/3057534 https://www.wikidata.org/entity/Q59147068 db/journals/js/js2017.html#YuCSAZF17
José María de Fuentes Lorena González-Manzano Jetzabel Serna-Olvera Fatbardh Veseli Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities. 869-891 2017 21 Pers. Ubiquitous Comput. 5 https://doi.org/10.1007/s00779-017-1057-6 db/journals/puc/puc21.html#FuentesGSV17
Omid Mirzaei Guillermo Suarez-Tangil Juan E. Tapiador José María de Fuentes TriFlow: Triaging Android Applications using Speculative Information Flows. 640-651 2017 AsiaCCS https://doi.org/10.1145/3052973.3053001 conf/ccs/2017asia db/conf/ccs/asiaccs2017.html#MirzaeiSTF17 Lorena González-Manzano Mark Slaymaker José María de Fuentes Dimitris Vayenas SoNeUCON<sub>ABC</sub>Pro: An Access Control Model for Social Networks with Translucent User Provenance. 234-252 2017 ATCS/SePrIoT@SecureComm https://doi.org/10.1007/978-3-319-78816-6_17 conf/securecomm/2017w db/conf/securecomm/securecomm2017w.html#Gonzalez-Manzano17 Alfonso Blanco Blanco José María de Fuentes Lorena González-Manzano Luis Hernández Encinas Agustín Martín Muñoz José Luis Rodrigo Oliva J. Ignacio Sánchez García A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. 283-300 2017 ATCS/SePrIoT@SecureComm https://doi.org/10.1007/978-3-319-78816-6_20 conf/securecomm/2017w db/conf/securecomm/securecomm2017w.html#BlancoFGEMOG17
Lorena González-Manzano José María de Fuentes Sergio Pastrana Pedro Peris-Lopez Luis Hernández Encinas PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. 59-71 2016 71 J. Netw. Comput. Appl. https://doi.org/10.1016/j.jnca.2016.06.001 https://www.wikidata.org/entity/Q115041059 db/journals/jnca/jnca71.html#Gonzalez-Manzano16
José María de Fuentes Lorena González-Manzano Omid Mirzaei Privacy Models in Wireless Sensor Networks: A Survey. 4082084:1-4082084:18 2016 2016 J. Sensors https://doi.org/10.1155/2016/4082084 https://www.wikidata.org/entity/Q59129731 db/journals/js/js2016.html#FuentesGM16
Lorena González-Manzano José María de Fuentes Kim-Kwang Raymond Choo ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. 412-428 2016 SecureComm https://doi.org/10.1007/978-3-319-59608-2_24 conf/securecomm/2016 db/conf/securecomm/securecomm2016.html#Gonzalez-Manzano16
José María de Fuentes Pedro Peris-Lopez Juan E. Tapiador Sergio Pastrana Probabilistic yoking proofs for large scale IoT systems. 43-52 2015 32 Ad Hoc Networks https://doi.org/10.1016/j.adhoc.2015.01.003 https://www.wikidata.org/entity/Q113881404 db/journals/adhoc/adhoc32.html#FuentesPTP15
Fei Yu 0001 Chin-Chen Chang 0001 Jian Shu Iftikhar Ahmad Jun Zhang 0010 José María de Fuentes Recent Advances in Security and Privacy for Wireless Sensor Networks. 169305:1-169305:2 2015 2015 J. Sensors https://doi.org/10.1155/2015/169305 https://www.wikidata.org/entity/Q59114324 db/journals/js/js2015.html#YuCSAZF15
Lorena González-Manzano José María de Fuentes Agustín Orfila Access Control for the Cloud Based on Multi-device Authentication. 856-863 2015 TrustCom/BigDataSE/ISPA (1) https://doi.org/10.1109/Trustcom.2015.457 conf/trustcom/2015-1 db/conf/trustcom/trustcom2015-1.html#Gonzalez-Manzano15
Lorena González-Manzano Ana Isabel González-Tablas Ferreres José María de Fuentes Arturo Ribagorda SoNeUCON<sub>ABC</sub>, an expressive usage control model for Web-Based Social Networks. 159-187 2014 43 Comput. Secur. https://doi.org/10.1016/j.cose.2014.03.009 https://www.wikidata.org/entity/Q115060764 db/journals/compsec/compsec43.html#Gonzalez-ManzanoGFR14
Lorena González-Manzano Ana Isabel González-Tablas Ferreres José María de Fuentes Arturo Ribagorda CooPeD: Co-owned Personal Data management. 41-65 2014 47 Comput. Secur. https://doi.org/10.1016/j.cose.2014.06.003 https://www.wikidata.org/entity/Q115060713 db/journals/compsec/compsec47.html#Gonzalez-ManzanoFFR14
José María de Fuentes Jorge Blasco Alís Ana Isabel González-Tablas Ferreres Lorena González-Manzano Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles. 2014 10 Int. J. Distributed Sens. Networks https://doi.org/10.1155/2014/120626 db/journals/ijdsn/ijdsn10.html#FuentesAFG14
Lorena González-Manzano Ana Isabel González-Tablas Ferreres José María de Fuentes Arturo Ribagorda Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks. 50-71 2014 94 J. Syst. Softw. https://doi.org/10.1016/j.jss.2014.04.044 db/journals/jss/jss94.html#Gonzalez-ManzanoFFR14
Julian Schütte Dennis Titze José María de Fuentes AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. 370-379 2014 TrustCom https://doi.org/10.1109/TrustCom.2014.48 https://doi.ieeecomputersociety.org/10.1109/TrustCom.2014.48 conf/trustcom/2014 db/conf/trustcom/trustcom2014.html#SchutteTF14
Ana Isabel González-Tablas Ferreres Almudena Alcaide José María de Fuentes José Montero-Castillo Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. 2693-2709 2013 11 Ad Hoc Networks 8 https://doi.org/10.1016/j.adhoc.2013.05.008 db/journals/adhoc/adhoc11.html#FerreresAFM13
Jorge L. Hernandez-Ardieta Ana Isabel González-Tablas Ferreres José María de Fuentes Benjamín Ramos A taxonomy and survey of attacks on digital signatures. 67-112 2013 34 Comput. Secur. https://doi.org/10.1016/j.cose.2012.11.009 https://www.wikidata.org/entity/Q115061096 db/journals/compsec/compsec34.html#Hernandez-ArdietaFFR13
Ana Isabel González-Tablas Ferreres José María de Fuentes Jorge L. Hernandez-Ardieta Benjamín Ramos Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills. 28-43 2013 16 J. Educ. Technol. Soc. 3 http://www.ifets.info/download_pdf.php?j_id=60&a_id=1375 db/journals/ets/ets16.html#FerreresFHR13
José María de Fuentes Lorena González-Manzano Ana Isabel González-Tablas Ferreres Jorge Blasco Alís WEVAN - A mechanism for evidence creation and verification in VANETs. 985-995 2013 59 J. Syst. Archit. 10-B https://doi.org/10.1016/j.sysarc.2013.07.009 db/journals/jsa/jsa59.html#FuentesGFA13
Lorena González-Manzano Ana Isabel González-Tablas Ferreres José María de Fuentes Arturo Ribagorda User-Managed Access Control in Web Based Social Networks. 97-137 2013 Security and Privacy Preserving in Social Networks https://doi.org/10.1007/978-3-7091-0894-9_4 series/lnsn/2013cb db/series/lnsn/cb2013.html#Gonzalez-ManzanoGFR13
Jorge Blasco Alís Julio César Hernández Castro José María de Fuentes Benjamín Ramos A framework for avoiding steganography usage over HTTP. 491-501 2012 35 J. Netw. Comput. Appl. 1 https://doi.org/10.1016/j.jnca.2011.10.003 db/journals/jnca/jnca35.html#AlisCFR12
Lorena González-Manzano Ana Isabel González-Tablas Ferreres José María de Fuentes Arturo Ribagorda U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. 1387-1392 2012 TrustCom https://doi.org/10.1109/TrustCom.2012.288 https://doi.ieeecomputersociety.org/10.1109/TrustCom.2012.288 conf/trustcom/2012 db/conf/trustcom/trustcom2012.html#Gonzalez-ManzanoFFR12 Ana Isabel González-Tablas Ferreres Almudena Alcaide Guillermo Suarez-Tangil José María de Fuentes Israel Barroso-Perez POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations. 224-227 2011 MobiQuitous https://doi.org/10.1007/978-3-642-30973-1_21 http://eudl.eu/doi/10.1007/978-3-642-30973-1_21 conf/mobiquitous/2011 db/conf/mobiquitous/mobiquitous2011.html#Gonzalez-TablasASFB11 Almudena Alcaide Ali E. Abdallah Ana Isabel González-Tablas Ferreres José María de Fuentes L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols. 108-122 2010 DPM/SETOP https://doi.org/10.1007/978-3-642-19348-4_9 conf/esorics/2010-6514 db/conf/esorics/lncs6514.html#AlcaideAFF10 Guillermo Suarez-Tangil Esther Palomar José María de Fuentes Jorge Blasco Alís Arturo Ribagorda Automatic Rule Generation Based on Genetic Programming for Event Correlation. 127-134 2009 CISIS https://doi.org/10.1007/978-3-642-04091-7_16 conf/cisis-spain/2009 db/conf/cisis-spain/cisis2009.html#Suarez-TangilPFAR09 José María de Fuentes Ana Isabel González-Tablas Ferreres Arturo Ribagorda CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. 363-368 2008 ARES https://doi.org/10.1109/ARES.2008.146 https://doi.ieeecomputersociety.org/10.1109/ARES.2008.146 conf/IEEEares/2008 db/conf/IEEEares/ares2008.html#FuentesFR08 Ali E. Abdallah Iftikhar Ahmad Almudena Alcaide Cristina Alcaraz Jorge Blasco Alís Nicolas Anciaux Héber Hwang Arcolezi David Arroyo Elena Barbierato Israel Barroso-Perez Marta Beltrán Alexandra Bensamoun Sergio Bernardez Alfonso Blanco Blanco Carmen Camara Stefano Caputo Fran Casino Julio César Hernández Castro José Reverte Cazorla Nathan Champeil Chin-Chen Chang 0001 Rama Chellappa Kim-Kwang Raymond Choo Kleanthis Dellios Gianluca Dini Cédric Eichler Luis Hernández Encinas J. Ignacio Sánchez García Mar Gimenez-Aguilar Lorena González-Manzano Ana I. González-TablasAna Isabel González-Tablas Ferreres Manuel Goyanes Luis Hernández-Álvarez Jorge L. Hernandez-Ardieta Luis Ibanez-Lissen Flavio Lombardi Javier López 0001 Upal Mahbub Samuel Marchal Agustín Martín 0001Agustín Martín Muñoz Omid Mirzaei José Montero-Castillo Lorenzo Mucchi José Luis Rodrigo Oliva Agustín Orfila Esther Palomar Sergio Pastrana Constantinos Patsakis Miguel Peidro-Paredes Pedro Peris-Lopez Benjamín Ramos Cristina Ramos Arturo Ribagorda Julian Schütte Jetzabel Serna-Olvera Jian Shu Mark Slaymaker Agusti Solanas Gianluca Stringhini Guillermo Suarez-Tangil Juan TapiadorJuan E. Tapiador Dennis Titze Dimitris Vayenas Miguel Velasco-Gomez Fatbardh Veseli Fei Yu 0001 Jun Zhang 0010