Publicacions (71) Publicacions en què ha participat algun/a investigador/a Veure dades d'investigació referenciades.

2024

  1. Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada

    Electronics (Switzerland), Vol. 13, Núm. 16

  2. Benchmarking Android Malware Analysis Tools

    Electronics (Switzerland), Vol. 13, Núm. 11

  3. Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia

    Electronics (Switzerland), Vol. 13, Núm. 5

  4. STEG-XAI: explainable steganalysis in images using neural networks

    Multimedia Tools and Applications, Vol. 83, Núm. 17, pp. 50601-50618

  5. Systematic Review: Anti-Forensic Computer Techniques

    Applied Sciences (Switzerland), Vol. 14, Núm. 12

  6. Unsupervised Approaches in Anomaly Detection

    Intelligent Systems Reference Library (Springer Science and Business Media Deutschland GmbH), pp. 57-83

2023

  1. Application of the SAMA methodology to Ryuk malware

    Journal of Computer Virology and Hacking Techniques, Vol. 19, Núm. 2, pp. 165-198

  2. Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges

    Electronics (Switzerland), Vol. 12, Núm. 21

  3. Descifrando TLS: cuando nos facilitan la factorización entera...

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  4. El Marco Europeo de Identidad Digital: análisis del enfoque coordinado a través del "Toolbox" de la UE

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  5. Explorando anomalías ocultas en UGR’16 con Kitsune

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  6. Exploring Hidden Anomalies in UGR’16 Network Dataset with Kitsune

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  7. Future smart grids creation and dimensionality reduction with signal handling on smart grid using targeted projection

    Sustainable Computing: Informatics and Systems, Vol. 39

  8. HODINT: arquitectura distribuida para larecolección y análisis del tráfico de fondo de Internet

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  9. Implementation and Security Test of Zero-Knowledge Protocols on SSI Blockchain

    Applied Sciences (Switzerland), Vol. 13, Núm. 9

  10. New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution

    2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings

  11. RETRACTED ARTICLE: Deep learning approach to Automated data collection and processing of video surveillance in sports activity prediction

    Annals of Operations Research, Vol. 326, pp. 57

  12. SIEM-SC: Cost analysis of security policies in SIEM events from the sustainability point of view

    Proceedings - 2023 4th International Conference on Information Systems and Software Technologies, ICI2ST 2023

  13. Systematic review of SIEM technology: SIEM-SC birth

    International Journal of Information Security, Vol. 22, Núm. 3, pp. 691-711

  14. The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)