Alberto Huertas Celdrán

Orcid: 0000-0001-7125-1710

According to our database1, Alberto Huertas Celdrán authored at least 112 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Data fusion in neuromarketing: Multimodal analysis of biosignals, lifecycle stages, current advances, datasets, trends, and challenges.
Inf. Fusion, May, 2024

FederatedTrust: A solution for trustworthy federated learning.
Future Gener. Comput. Syst., March, 2024

Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification.
Future Gener. Comput. Syst., March, 2024

Single-board device individual authentication based on hardware performance and autoencoder transformer models.
Comput. Secur., February, 2024

Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware.
CoRR, 2024

FEVER: Intelligent Behavioral Fingerprinting for Anomaly Detection in P4-Based Programmable Networks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios.
J. Inf. Secur. Appl., December, 2023

Behavioral fingerprinting to detect ransomware in resource-constrained devices.
Comput. Secur., December, 2023

CGAPP: A continuous group authentication privacy-preserving platform for industrial scene.
J. Inf. Secur. Appl., November, 2023

Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges.
ACM Comput. Surv., November, 2023

Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning.
Comput. Commun., November, 2023

LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers.
Internet Things, July, 2023

An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios.
IET Inf. Secur., July, 2023

Intelligent and behavioral-based detection of malware in IoT spectrum sensors.
Int. J. Inf. Sec., June, 2023

Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.
IEEE Internet Things J., May, 2023

Analyzing the impact of Driving tasks when detecting emotions through brain-computer interfaces.
Neural Comput. Appl., April, 2023

A methodology to identify identical single-board computers based on hardware behavior fingerprinting.
J. Netw. Comput. Appl., March, 2023

SUSAN: A Deep Learning based anomaly detection framework for sustainable industry.
Sustain. Comput. Informatics Syst., January, 2023

Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces.
CoRR, 2023

Assessing the Sustainability and Trustworthiness of Federated Learning Models.
CoRR, 2023

Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL.
CoRR, 2023

Sentinel: An Aggregation Function to Secure Decentralized Federated Learning.
CoRR, 2023

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation.
CoRR, 2023

TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning.
CoRR, 2023

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense.
CoRR, 2023

MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation.
CoRR, 2023

Fedstellar: A Platform for Decentralized Federated Learning.
CoRR, 2023

Single-board Device Individual Authentication based on Hardware Performance and Anomaly Detection for Crowdsensing Platforms.
CoRR, 2023

Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges.
IEEE Commun. Surv. Tutorials, 2023

Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity.
Commun. ACM, 2023

Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices.
Proceedings of the NOMS 2023, 2023

SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis.
Proceedings of the NOMS 2023, 2023

Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield.
Proceedings of the IEEE Military Communications Conference, 2023

Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices.
Proceedings of the IEEE International Conference on Communications, 2023

RansomAI: AI-Powered Ransomware for Stealthy Encryption.
Proceedings of the IEEE Global Communications Conference, 2023

Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Framework Quantifying Trustworthiness of Supervised Machine and Deep Learning Models.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware.
Dataset, May, 2022



Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022

A Supervised ML Biometric Continuous Authentication System for Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Design of a Security and Trust Framework for 5G Multi-domain Scenarios.
J. Netw. Syst. Manag., 2022

SAFECAR: A Brain-Computer Interface and intelligent framework to detect drivers' distractions.
Expert Syst. Appl., 2022

Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges.
ACM Comput. Surv., 2022

Toward pre-standardization of reputation-based trust models beyond 5G.
Comput. Stand. Interfaces, 2022

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT.
CoRR, 2022

When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns.
CoRR, 2022

Trust-as-a-Service: A reputation-enabled trust framework for 5G networks.
CoRR, 2022

Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario.
CoRR, 2022

Studying Drowsiness Detection Performance while Driving through Scalable Machine Learning Models using Electroencephalography.
CoRR, 2022

CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors.
CoRR, 2022

Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities.
Comput. Secur., 2022

Federated learning for malware detection in IoT devices.
Comput. Networks, 2022

Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces.
Clust. Comput., 2022

A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios.
IEEE Access, 2022

SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses.
Proceedings of the 24th IEEE Conference on Business Informatics, 2022

Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Study of P300 Detection Performance by Different P300 Speller Approaches Using Electroencephalography.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022

Intelligent Fingerprinting to Detect Data Leakage Attacks on Spectrum Sensors.
Proceedings of the IEEE International Conference on Communications, 2022

RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021

SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021

S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information.
Sensors, 2021

Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments.
Peer-to-Peer Netw. Appl., 2021

Towards the mitigation of distributed denial-of-service cyberbioattacks in bacteria-based biosensing systems.
Digit. Signal Process., 2021

Robust Federated Learning for execution time-based device model identification under label-flipping attack.
CoRR, 2021

Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology.
CoRR, 2021

Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized.
CoRR, 2021

Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities.
CoRR, 2021

Federated Learning for Malware Detection in IoT Devices.
CoRR, 2021

Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets.
IEEE Commun. Surv. Tutorials, 2021

AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning.
Comput. Secur., 2021

FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020


Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020

Self-Organized Laboratories for Smart Campus.
IEEE Trans. Learn. Technol., 2020

MADICS: A Methodology for Anomaly Detection in Industrial Control Systems.
Symmetry, 2020

A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms.
Sensors, 2020

PROTECTOR: Towards the protection of sensitive data in Europe and the US.
Comput. Networks, 2020

Cyberattacks on Miniature Brain Implants to Disrupt Spontaneous Neural Signaling.
IEEE Access, 2020

2019
PALOT: Profiling and Authenticating Users Leveraging Internet of Things.
Sensors, 2019

Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
Sensors, 2019

Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019

Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019

Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Towards the autonomous provision of self-protection capabilities in 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges.
CoRR, 2019

On the Generation of Anomaly Detection Datasets in Industrial Control Systems.
IEEE Access, 2019

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Management Platform for Citizen's Data Protection Regulation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

2018
Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018

Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System.
Sensors, 2018

Policy-based network slicing management for future mobile communications.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

A Dynamic Continuous Authentication Framework in IoT-Enabled Environments.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

2017
Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017

Enabling Highly Dynamic Mobile Scenarios with Software Defined Networking.
IEEE Commun. Mag., 2017

Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017

Automatic monitoring management for 5G mobile networks.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016

Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016

Resolving privacy-preserving relationships over outsourced encrypted data storages.
Int. J. Inf. Sec., 2016

MASTERY: A multicontext-aware system that preserves the users' privacy.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2014
Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014

What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014


  Loading...