Publikationen (25) Publikationen von Juan Ramon Bermejo Higuera Verweis auf Forschungsdaten anzeigen.

2023

  1. Application of the SAMA methodology to Ryuk malware

    Journal of Computer Virology and Hacking Techniques, Vol. 19, Núm. 2, pp. 165-198

  2. Implementation and Security Test of Zero-Knowledge Protocols on SSI Blockchain

    Applied Sciences (Switzerland), Vol. 13, Núm. 9

  3. New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution

    2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings

  4. The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  5. The application of blockchain algorithms to the management of education certificates

    Evolutionary Intelligence, Vol. 16, Núm. 6, pp. 1967-1984

2022

  1. A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques

    Computers and Security, Vol. 120

  2. Building a dataset through attack pattern modeling and analysis system

    Computers and Electrical Engineering, Vol. 97

  3. Systematic Approach for Web Protection Runtime Tools’ Effectiveness Analysis

    CMES - Computer Modeling in Engineering and Sciences, Vol. 133, Núm. 3, pp. 579-599

2021

  1. A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector

    Microprocessors and Microsystems, Vol. 87

  2. Detecting malware in cyberphysical systems using machine learning: A survey

    KSII Transactions on Internet and Information Systems, Vol. 15, Núm. 3, pp. 1119-1139

  3. Effective Filter for Common Injection Attacks in Online Web Applications

    IEEE Access, Vol. 9, pp. 10378-10391

  4. Hybrid security assessment methodology for web applications

    CMES - Computer Modeling in Engineering and Sciences, Vol. 126, Núm. 1, pp. 89-124

  5. MMALE a methodology for malware analysis in linux environments

    Computers, Materials and Continua, Vol. 67, Núm. 2, pp. 1447-1469

  6. On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey

    IEEE Access, Vol. 9, pp. 109289-109319

2020

  1. A New Mail System for Secure Data Transmission in Cyber Physical Systems

    International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems, Vol. 28, Núm. Supp02, pp. 23-48