Publicacions en què col·labora amb Jose Maria Jorquera Valero (22)

2024

  1. Building Trust in the Era of 6G: A Level of Trust Assessment Function for Cloud Continuum

    2024 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2024

  2. SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces

    IEEE Transactions on Dependable and Secure Computing, Vol. 21, Núm. 4, pp. 1863-1875

  3. Towards Secure 5G Service Marketplaces: A review of “an SLA-driven Trust and ReputationManagement Framework”

    IX Jornadas Nacionales de Investigación En Ciberseguridad

  4. Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System

    ACM International Conference Proceeding Series

2022

  1. A Security and Trust Framework forDecentralized 5G Marketplaces

    Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) (Fundación Tecnalia Research and Innovation), pp. 237-240

  2. Design of a Security and Trust Framework for 5G Multi-domain Scenarios

    Journal of Network and Systems Management, Vol. 30, Núm. 1

  3. Toward pre-standardization of reputation-based trust models beyond 5G

    Computer Standards and Interfaces, Vol. 81

  4. Trusted Execution Environment-Enabled Platform for 5G Security and Privacy Enhancement

    Studies in Big Data (Springer Science and Business Media Deutschland GmbH), pp. 203-223

2021

  1. A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

    IEEE Communications Surveys and Tutorials, Vol. 23, Núm. 2, pp. 1048-1077

2020

  1. BEHACOM - a dataset modelling users’ behaviour in computers

    Data in Brief

  2. Identification and classification of cyber threats through SSH honeypot systems

    Handbook of Research on Intrusion Detection Systems (IGI Global), pp. 105-129

  3. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices

    Handbook of Research on Intrusion Detection Systems (IGI Global), pp. 1-25