Folgen
Jose Maria de Fuentes
Jose Maria de Fuentes
Associate Professor, Universidad Carlos III de Madrid (Spain)
Bestätigte E-Mail-Adresse bei inf.uc3m.es - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Overview of security issues in vehicular ad-hoc networks
JM De Fuentes, AI González-Tablas, A Ribagorda
Handbook of research on mobility and computing: Evolving technologies and …, 2011
2032011
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
JM de Fuentes, L González-Manzano, J Tapiador, P Peris-Lopez
computers & security 69, 127-141, 2017
542017
AndrODet: An adaptive Android obfuscation detector
O Mirzaei, JM de Fuentes, J Tapiador, L Gonzalez-Manzano
Future Generation Computer Systems 90, 240-261, 2019
432019
Appcaulk: Data leak prevention by injecting targeted taint tracking into android apps
J Schutte, D Titze, JM De Fuentes
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
432014
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
342014
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
322016
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
P Peris-Lopez, L González-Manzano, C Camara, JM de Fuentes
Future Generation Computer Systems 81, 67-77, 2018
292018
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
292012
Leveraging user-related internet of things for continuous authentication: A survey
L Gonzalez-Manzano, JMD Fuentes, A Ribagorda
ACM Computing Surveys (CSUR) 52 (3), 1-38, 2019
282019
A taxonomy and survey of attacks on digital signatures
JL Hernandez-Ardieta, AI Gonzalez-Tablas, JM De Fuentes, B Ramos
Computers & security 34, 67-112, 2013
262013
A framework for avoiding steganography usage over HTTP
J Blasco, JC Hernandez-Castro, JM de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
262012
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
JM de Fuentes, L González-Manzano, J Serna-Olvera, F Veseli
Personal and Ubiquitous Computing 21 (5), 869-891, 2017
252017
Andrensemble: Leveraging api ensembles to characterize android malware families
O Mirzaei, G Suarez-Tangil, JM de Fuentes, J Tapiador, G Stringhini
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
232019
Design recommendations for online cybersecurity courses
L González-Manzano, JM de Fuentes
Computers & Security 80, 238-256, 2019
232019
Attribute-based credentials for privacy-aware smart health services in IoT-based smart cities
JM de Fuentes, L Gonzalez-Manzano, A Solanas, F Veseli
Computer 51 (7), 44-53, 2018
232018
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
212009
Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation
L González-Manzano, JM de Fuentes, P Peris-Lopez, C Camara
Future Generation Computer Systems 77, 136-148, 2017
192017
Triflow: Triaging android applications using speculative information flows
O Mirzaei, G Suarez-Tangil, J Tapiador, JM de Fuentes
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
192017
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
192014
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
AI González-Tablas, A Alcaide, JM de Fuentes, J Montero
Ad hoc networks 11 (8), 2693-2709, 2013
172013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20