Félix J. García Clemente

Orcid: 0000-0001-6181-5033

Affiliations:
  • University of Murcia, Spain


According to our database1, Félix J. García Clemente authored at least 83 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Exploring Technology- and Sensor-Driven Trends in Education: A Natural-Language-Processing-Enhanced Bibliometrics Study.
Sensors, December, 2023

VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios.
J. Inf. Secur. Appl., December, 2023

A framework to support interoperable Game-based Assessments as a Service (GBAaaS): Design, development, and use cases.
Softw. Pract. Exp., November, 2023

A Systematic Literature Review of Game-Based Assessment Studies: Trends and Challenges.
IEEE Trans. Learn. Technol., August, 2023

An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios.
IET Inf. Secur., July, 2023

SUSAN: A Deep Learning based anomaly detection framework for sustainable industry.
Sustain. Comput. Informatics Syst., January, 2023

AI-driven Teacher Analytics: Informative Insights on Classroom Activities.
Proceedings of the IEEE International Conference on Teaching, 2023

Towards Game-based Assessment at Scale.
Proceedings of the Tenth ACM Conference on Learning @ Scale, 2023

Computer Vision Based Auto-ID for Optimizing Logistics Operations.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2022
Large scale analysis of open MOOC reviews to support learners' course selection.
Expert Syst. Appl., 2022

A Systematic Literature Review of Digital Game-based Assessment Empirical Studies: Current Trends and Open Challenges.
CoRR, 2022

FARMIT: continuous assessment of crop quality using machine learning and deep learning techniques for IoT-based smart farming.
Clust. Comput., 2022

Analyzing Trends and Patterns Across the Educational Technology Communities Using Fontana Framework.
IEEE Access, 2022

A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios.
IEEE Access, 2022

2021
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021

COnVIDa: COVID-19 multidisciplinary data collection and dashboard.
J. Biomed. Informatics, 2021

Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021

Bibliometric Analysis of the Last Ten Years of the European Conference on Technology-Enhanced Learning.
Proceedings of the Technology-Enhanced Learning for a Free, Safe, and Sustainable World, 2021

Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
Self-Organized Laboratories for Smart Campus.
IEEE Trans. Learn. Technol., 2020

Automatic Generation and Easy Deployment of Digitized Laboratories.
IEEE Trans. Ind. Informatics, 2020

MADICS: A Methodology for Anomaly Detection in Industrial Control Systems.
Symmetry, 2020

A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms.
Sensors, 2020

Practical passive localization system based on wireless signals for fast deployment of occupancy services.
Future Gener. Comput. Syst., 2020

PROTECTOR: Towards the protection of sensitive data in Europe and the US.
Comput. Networks, 2020

2019
PALOT: Profiling and Authenticating Users Leveraging Internet of Things.
Sensors, 2019

Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
Sensors, 2019

Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019

Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019

Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Towards the autonomous provision of self-protection capabilities in 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Easy Java/JavaScript Simulations as a tool for Learning Analytics.
CoRR, 2019

On the Generation of Anomaly Detection Datasets in Industrial Control Systems.
IEEE Access, 2019

A Management Platform for Citizen's Data Protection Regulation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

5G-CAGE: A Context and Situational Awareness System for City Public Safety with Video Processing at a Virtualized Ecosystem.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

2018
Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018

A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks.
IEEE Access, 2018

Policy-based network slicing management for future mobile communications.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Beyond the RSSI value in BLE-based passive indoor localization: let data speak.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

A Dynamic Continuous Authentication Framework in IoT-Enabled Environments.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

ICE++: Improving Security, QoS, and High Availability of Medical Cyber-Physical Systems through Mobile Edge Computing.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

2017
Using Dimensionality Reduction Techniques for Refining Passive Indoor Positioning Systems Based on Radio Fingerprinting.
Sensors, 2017

Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017

Enabling Highly Dynamic Mobile Scenarios with Software Defined Networking.
IEEE Commun. Mag., 2017

Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017

On the performance of a deep learning-based anomaly detection system for 5G networks.
Proceedings of the 2017 IEEE SmartWorld, 2017

Collecting Experience Data from Remotely Hosted Learning Applications.
Proceedings of the Online Engineering & Internet of Things, 2017

Human behavior monitoring using a passive indoor positioning system: a case study in a SME.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

Automatic monitoring management for 5G mobile networks.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016

Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016

MASTERY: A multicontext-aware system that preserves the users' privacy.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Learning Technological Innovation on Mobile Applications by Means of a Spiral of Projects.
Proceedings of the Interactive Collaborative Learning - Proceedings of the 19th ICL Conference, 2016

Validating Passive Localization Methods for Occupancy Sensing Systems in Wireless Environments: A Case Study.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
Anonymity in Preference-Aware Location-based Services without Third Trusted-Party.
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2015

A privacy-preserving recommender system for mobile commerce.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Taxonomy of trust relationships in authorization domains for cloud computing.
J. Supercomput., 2014

Semantic-aware multi-tenancy authorization system for cloud architectures.
Future Gener. Comput. Syst., 2014

Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014

What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2011
Semantic Web-Based Management of Routing Configurations.
J. Netw. Syst. Manag., 2011

Semantic-based authorization architecture for Grid.
Future Gener. Comput. Syst., 2011

Towards an Authorization System for Cloud Infrastructure Providers.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Knowledge Authoring with ORE: Testing, Debugging and Validating Knowledge Rules in a Semantic Web Framework.
J. Univers. Comput. Sci., 2010

Detection of semantic conflicts in ontology and rule-based information systems.
Data Knowl. Eng., 2010

2009
Multi-layer framework for analysing and managing routing configurations.
Comput. Electr. Eng., 2009

2008
Secure overlay networks for federated service provision and management.
Comput. Electr. Eng., 2008

Towards semantic web-based management of security services.
Ann. des Télécommunications, 2008

Building and Managing Policy-Based Secure Overlay Networks.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

2007
Towards semantic-aware management of security services in GT4.
Multiagent Grid Syst., 2007

Managing semantic-aware policies in a distributed firewall scenario.
Internet Res., 2007

POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2006
Dynamic and secure management of VPNs in IPv6 multi-domain scenarios.
Comput. Commun., 2006

Distributed Provision and Management of Security Services in Globus Toolkit 4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

2005
Providing advanced authentication services in IPv6 muti-domain scenarios.
Int. J. Internet Protoc. Technol., 2005

Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Policy-Driven Routing Management Using CIM.
Proceedings of the Computer Network Security, 2005

An XML-Seamless Policy Based Management Framework.
Proceedings of the Computer Network Security, 2005

A Semantically-Rich Management System Based on CIM for the OGSA Security Services.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A Proposal of a CIM-Based Policy Management Model for the OGSA Security Architecture.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture.
Proceedings of the Computational Science, 2004


  Loading...