Félix Gómez Mármol

According to our database1, Félix Gómez Mármol authored at least 51 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Security and Privacy in Wireless and Mobile Networks.
Future Internet, 2018

Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Generation Comp. Syst., 2018

Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Communications Surveys and Tutorials, 2018

2017
Shall I post this now? Optimized, delay-based privacy protection in social networks.
Knowl. Inf. Syst., 2017

2016
Resolving privacy-preserving relationships over outsourced encrypted data storages.
Int. J. Inf. Sec., 2016

Dynamic counter-measures for risk-based access control systems: An evolutive approach.
Future Generation Comp. Syst., 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

I Don't Trust ICT: Research Challenges in Cyber Security.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015

Dynamic and flexible selection of a reputation mechanism for heterogeneous environments.
Future Generation Comp. Syst., 2015

Editorial: special issue on advances in security and privacy for future mobile communications.
Electronic Commerce Research, 2015

Reputation-based Web service orchestration in cloud computing: A survey.
Concurrency and Computation: Practice and Experience, 2015

Towards privacy-preserving reputation management for hybrid broadcast broadband applications.
Computers & Security, 2015

Managing XACML systems in distributed environments through Meta-Policies.
Computers & Security, 2015

Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition).
Computers & Electrical Engineering, 2015

Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management.
Wireless Personal Communications, 2014

Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
MONET, 2014

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Editorial: Special issue on Identity Protection and Management.
J. Inf. Sec. Appl., 2014

Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Computing, 2014

Towards the integration of reputation management in OpenID.
Computer Standards & Interfaces, 2014

ROMEO: ReputatiOn Model Enhancing OpenID Simulator.
CoRR, 2014

Smart Deferral of Messages for Privacy Protection in Online Social Networks.
CoRR, 2014

Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems.
IEEE Computer, 2014

Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition).
Computers & Electrical Engineering, 2014

Live digital, remember digital: State of the art and research challenges.
Computers & Electrical Engineering, 2014

ROMEO: ReputatiOn Model Enhancing OpenID Simulator.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

2013
WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wireless Personal Communications, 2013

RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Network Syst. Manage., 2013

Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments.
IEEE Security & Privacy, 2013

Introduction to advances in trust, security, and privacy for wireless networks.
EURASIP J. Wireless Comm. and Networking, 2013

Special issue on Recent Advances in Security and Privacy in Distributed Communications.
Computers & Electrical Engineering, 2013

2012
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks.
J. Network and Computer Applications, 2012

LFTM, linguistic fuzzy trust mechanism for distributed networks.
Concurrency and Computation: Practice and Experience, 2012

Do not snoop my habits: preserving privacy in the smart grid.
IEEE Communications Magazine, 2012

Introduction to Recent Advances in Security and Privacy in Distributed Communications.
Computers & Electrical Engineering, 2012

Triggering IDM Authentication Methods based on Device Capabilities Information.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Graph-based XACML evaluation.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Providing trust in wireless sensor networks using a bio-inspired technique.
Telecommunication Systems, 2011

Trust and Reputation Models Comparison.
Internet Research, 2011

Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm.
Intelligent Automation & Soft Computing, 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Enhancing OpenID through a Reputation Framework.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems.
Computer Standards & Interfaces, 2010

TRIMS, a privacy-aware trust and reputation model for identity management systems.
Computer Networks, 2010

Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
TACS, a Trust Model for P2P Networks.
Wireless Personal Communications, 2009

Security threats scenarios in trust and reputation models for distributed systems.
Computers & Security, 2009

TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...