Félix Gómez Mármol

Orcid: 0000-0002-6424-3322

According to our database1, Félix Gómez Mármol authored at least 89 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Computational approaches to detect experts in distributed online communities: a case study on Reddit.
Clust. Comput., April, 2024

Adapting Knowledge Inference Algorithms to Measure Geometry Competencies through a Puzzle Game.
ACM Trans. Knowl. Discov. Data, January, 2024

A Big Data Architecture for Early Identification and Categorization of Dark Web Sites.
CoRR, 2024

SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies.
CoRR, 2024

2023
On the gathering of Tor onion addresses.
Future Gener. Comput. Syst., August, 2023

Evaluating different configurations of machine learning models and their transfer learning capabilities for stress detection using heart rate.
J. Ambient Intell. Humaniz. Comput., 2023

A Survey on Data-Driven Evaluation of Competencies and Capabilities Across Multimedia Environments.
Int. J. Interact. Multim. Artif. Intell., 2023

Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision.
CoRR, 2023

Identifying Professional Photographers Through Image Quality and Aesthetics in Flickr.
CoRR, 2023

Towards the Identification of Experts in Informal Learning Portals at Scale.
Proceedings of the Tenth ACM Conference on Learning @ Scale, 2023

2022

Profiling users and bots in Twitter through social media analysis.
Inf. Sci., 2022

On the Power of Social Networks to Analyze Threatening Trends.
IEEE Internet Comput., 2022

Identifying Experts in Question & Answer Portals: A Case Study on Data Science Competencies in Reddit.
CoRR, 2022

2021
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments.
Peer-to-Peer Netw. Appl., 2021

COnVIDa: COVID-19 multidisciplinary data collection and dashboard.
J. Biomed. Informatics, 2021

Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices.
J. Inf. Secur. Appl., 2021

Nothing to Hide? On the Security and Privacy Threats Beyond Open Data.
IEEE Internet Comput., 2021

BOTTER: A framework to analyze social bots in Twitter.
CoRR, 2021

Uncovering Cybercrimes in Social Media through Natural Language Processing.
Complex., 2021

MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology.
Complex., 2021

Battling against cyberattacks: towards pre-standardization of countermeasures.
Clust. Comput., 2021

A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection.
IEEE Access, 2021

Data-Driven Performance Prediction in a Geometry Game Environment.
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021

AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020

BlockSIEM: Protecting Smart City Services through a Blockchain-based and Distributed SIEM.
Sensors, 2020

Industry 4.0: Quo Vadis?
Eng. Appl. Artif. Intell., 2020

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends.
IEEE Access, 2020

2019
PALOT: Profiling and Authenticating Users Leveraging Internet of Things.
Sensors, 2019

COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things.
Sensors, 2019

Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019

Screening Out Social Bots Interference: Are There Any Silver Bullets?
IEEE Commun. Mag., 2019

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems.
IEEE Access, 2019

C3-Sex: a Chatbot to Chase Cyber Perverts.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

<i>B</i> SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM.
Wirel. Commun. Mob. Comput., 2018

Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms.
Symmetry, 2018

Security and Privacy in Wireless and Mobile Networks.
Future Internet, 2018

Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Gener. Comput. Syst., 2018

Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Commun. Surv. Tutorials, 2018

TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

A Dynamic Continuous Authentication Framework in IoT-Enabled Environments.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

2017
Shall I post this now? Optimized, delay-based privacy protection in social networks.
Knowl. Inf. Syst., 2017

2016
Resolving privacy-preserving relationships over outsourced encrypted data storages.
Int. J. Inf. Sec., 2016

Dynamic counter-measures for risk-based access control systems: An evolutive approach.
Future Gener. Comput. Syst., 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

I Don't Trust ICT: Research Challenges in Cyber Security.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015

Dynamic and flexible selection of a reputation mechanism for heterogeneous environments.
Future Gener. Comput. Syst., 2015

Reputation-based Web service orchestration in cloud computing: A survey.
Concurr. Comput. Pract. Exp., 2015

Towards privacy-preserving reputation management for hybrid broadcast broadband applications.
Comput. Secur., 2015

Managing XACML systems in distributed environments through Meta-Policies.
Comput. Secur., 2015

Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition).
Comput. Electr. Eng., 2015

Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management.
Wirel. Pers. Commun., 2014

Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Editorial: Special issue on Identity Protection and Management.
J. Inf. Secur. Appl., 2014

Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Comput., 2014

Towards the integration of reputation management in OpenID.
Comput. Stand. Interfaces, 2014

Smart Deferral of Messages for Privacy Protection in Online Social Networks.
CoRR, 2014

Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems.
Computer, 2014

Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition).
Comput. Electr. Eng., 2014

Live digital, remember digital: State of the art and research challenges.
Comput. Electr. Eng., 2014

ROMEO: ReputatiOn Model Enhancing OpenID Simulator.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

2013
WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wirel. Pers. Commun., 2013

RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013

Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments.
IEEE Secur. Priv., 2013

Introduction to advances in trust, security, and privacy for wireless networks.
EURASIP J. Wirel. Commun. Netw., 2013

Special issue on Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2013

2012
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks.
J. Netw. Comput. Appl., 2012

LFTM, linguistic fuzzy trust mechanism for distributed networks.
Concurr. Comput. Pract. Exp., 2012

Do not snoop my habits: preserving privacy in the smart grid.
IEEE Commun. Mag., 2012

Introduction to Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2012

Triggering IDM Authentication Methods based on Device Capabilities Information.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Graph-based XACML evaluation.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Providing trust in wireless sensor networks using a bio-inspired technique.
Telecommun. Syst., 2011

Trust and Reputation Models Comparison.
Internet Res., 2011

Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm.
Intell. Autom. Soft Comput., 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Enhancing OpenID through a Reputation Framework.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems.
Comput. Stand. Interfaces, 2010

TRIMS, a privacy-aware trust and reputation model for identity management systems.
Comput. Networks, 2010

Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
TACS, a Trust Model for P2P Networks.
Wirel. Pers. Commun., 2009

Security threats scenarios in trust and reputation models for distributed systems.
Comput. Secur., 2009

TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...