David Arroyo

Orcid: 0000-0001-8894-9779

According to our database1, David Arroyo authored at least 48 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components.
CoRR, 2024

2023
On the Design of a Misinformation Widget (MsW) Against Cloaked Science.
Proceedings of the Network and System Security - 17th International Conference, 2023

Analyzing the Effectiveness of Native Token Airdrop Campaigns in NFT Marketplaces.
Proceedings of the Blockchain and Applications, 5th International Congress, 2023

2022
Developing new deep-learning model to enhance network intrusion classification.
Evol. Syst., 2022

Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation Dynamics.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

Advancing the Use of Information Compression Distances in Authorship Attribution.
Proceedings of the Disinformation in Open Online Media, 2022

Improving LSTMs' under-performance in Authorship Attribution for short texts.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Enhancing the Anonymity and Auditability of Whistleblowers Protection.
Proceedings of the Blockchain and Applications, 4th International Congress, 2022

Rumor and clickbait detection by combining information divergence measures and deep learning techniques.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Achieving cybersecurity in blockchain-based systems: A survey.
Future Gener. Comput. Syst., 2021

A Compression-Based Method for Detecting Anomalies in Textual Data.
Entropy, 2021

Building A blockchain-based decentralized digital asset management system for commercial aircraft leasing.
Comput. Ind., 2021

2020
On the application of compression-based metrics to identifying anomalous behaviour in web traffic.
Log. J. IGPL, 2020

Fake News Detection - Do Complex Problems Need Complex Solutions?
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Securing Blockchain with Quantum Safe Cryptography: When and How?
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Sandbox for Minimal Viable Governance of Blockchain Services and DAOs: CLAUDIA.
Proceedings of the Blockchain and Applications - 2nd International Congress, 2020

2019
A compression based framework for the detection of anomalies in heterogeneous data sources.
CoRR, 2019

Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features.
Int. J. Bifurc. Chaos, 2017

A Parameter-Free Method for the Detection of Web Attacks.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Fair and Accountable Anonymity for the Tor Network.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges.
CoRR, 2016

2015
libgroupsig: An extensible C library for group signatures.
IACR Cryptol. ePrint Arch., 2015

Privacy Threats in E-Shopping (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Non-conventional Digital Signatures and Their Implementations - A Review.
Proceedings of the International Joint Conference, 2015

On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities.
Proceedings of the International Joint Conference, 2015

2014
On securing online registration protocols: Formal verification of a new proposal.
Knowl. Based Syst., 2014

A formal methodology for integral security design and verification of network protocols.
J. Syst. Softw., 2014

Fair anonymity for the Tor network.
CoRR, 2014

New X.509-based mechanisms for fair anonymity management.
Comput. Secur., 2014

Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps.
Commun. Nonlinear Sci. Numer. Simul., 2014

Methodological Security Verification of a Registration Protocol.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Cryptanalysis of a one round chaos-based Substitution Permutation Network.
Signal Process., 2013

Application of symbolic dynamics to characterize coordinated activity in the context of biological neural networks.
J. Frankl. Inst., 2013

2012
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
CoRR, 2012

Anonymity Revocation through Standard Infrastructures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers.
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011

An Approach for Adapting Moodle into a Secure Infrastructure.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps.
Int. J. Bifurc. Chaos, 2010

2009
A general view of pseudoharmonics and pseudoantiharmonics to calculate external arguments of Douady and Hubbard.
Appl. Math. Comput., 2009

2008
A Basic Framework for the Cryptanalysis of Digital Chaos-Based Cryptography
CoRR, 2008

Drawing and computing external rays in the multiple-spiral medallions of the Mandelbrot set.
Comput. Graph., 2008

2007
Cryptanalysis of a computer cryptography scheme based on a filter bank
CoRR, 2007

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
CoRR, 2007


  Loading...