Publicaciones en las que colabora con Alberto Huertas Celdran (48)

2023

  1. A Review of "Toward Pre-standardization of Reputation-based Trust Models Beyond 5G"

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  2. A methodology to identify identical single-board computers based on hardware behavior fingerprinting

    Journal of Network and Computer Applications, Vol. 212

  3. Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges

    ACM Computing Surveys, Vol. 55, Núm. 11

  4. Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges

    IEEE Communications Surveys and Tutorials, Vol. 25, Núm. 4, pp. 2983-3013

  5. Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion

    IJCAI International Joint Conference on Artificial Intelligence

  6. Framework seguro para entrenar modelos de inteligencia artificial federados y descentralizados

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  7. LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers

    Internet of Things (Netherlands), Vol. 22

  8. Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning

    Computer Communications, Vol. 211, pp. 229-238

2022

  1. Design of a Security and Trust Framework for 5G Multi-domain Scenarios

    Journal of Network and Systems Management, Vol. 30, Núm. 1

  2. Toward pre-standardization of reputation-based trust models beyond 5G

    Computer Standards and Interfaces, Vol. 81

  3. Trusted Execution Environment-Enabled Platform for 5G Security and Privacy Enhancement

    Studies in Big Data (Springer Science and Business Media Deutschland GmbH), pp. 203-223

2020

  1. BEHACOM - a dataset modelling users’ behaviour in computers

    Data in Brief

  2. Identification and classification of cyber threats through SSH honeypot systems

    Handbook of Research on Intrusion Detection Systems (IGI Global), pp. 105-129

  3. PROTECTOR: Towards the protection of sensitive data in Europe and the US

    Computer Networks, Vol. 181

  4. Review and Open Challenges of Public Safety Networks to Manage Emergency Settings in 5G

    17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2020