Publicaciones (1.534) Publicaciones en las que ha participado algún/a investigador/a Ver datos de investigación referenciados.

2024

  1. A Big Data architecture for early identification and categorization of dark web sites

    Future Generation Computer Systems, Vol. 157, pp. 67-81

  2. A Convolutional Neural Network approach for image-based anomaly detection in smart agriculture

    Expert Systems with Applications, Vol. 247

  3. A General Purpose Anomaly-Based Method for Detecting Cheaters in Online Courses

    IEEE Transactions on Learning Technologies, Vol. 17, pp. 1-11

  4. A Review of Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  5. A Review of “Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management”

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  6. A Summary of Adversarial Attacks and Defenses on ML- and Hardware-based IoT Device Fingerprinting and Identification

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  7. A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  8. A general and modular framework for dark web analysis

    Cluster Computing, Vol. 27, Núm. 4, pp. 4687-4703

  9. A multimodal study of the interplay between stress, executive function, and biometrics in game-based assessment

    Expert Systems with Applications, Vol. 242

  10. A review of “A comprehensive review of the state of the art on security and privacy issues in Healthcare”

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  11. Adapting Containerized Workloads for the Continuum Computing

    IEEE Access, Vol. 12, pp. 104102-104114

  12. Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    CMES - Computer Modeling in Engineering and Sciences, Vol. 141, Núm. 2, pp. 1447-1471

  13. Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification

    Future Generation Computer Systems, Vol. 152, pp. 30-42

  14. An NLP-Based Framework to Spot Extremist Networks in Social Media

    Complexity, Vol. 2024

  15. Analyzing frameworks to modeldisinformation attacks in online social networks

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  16. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario

    Applied Intelligence, Vol. 54, Núm. 8, pp. 6637-6653

  17. Análisis del impacto de ciberataques neuronales aplicados a la visión

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  18. Attacking O-RAN Interfaces: Threat Modeling, Analysis and Practical Experimentation

    IEEE Open Journal of the Communications Society, Vol. 5, pp. 4559-4577

  19. Automated CyberExercise and CyberScenariogeneration framework

    IX Jornadas Nacionales de Investigación En Ciberseguridad