Javier Carrillo Mondéjar

Orcid: 0000-0001-8371-4305

According to our database1, Javier Carrillo Mondéjar authored at least 19 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
WFE-Tab: Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance.
Future Gener. Comput. Syst., 2025

Identifying runtime libraries in statically linked linux binaries.
Future Gener. Comput. Syst., 2025

A self-contained emulator for the forensic examination of IoE scenarios.
Ad Hoc Networks, 2025

Adaptive Weighted Ensemble Learning for Intrusion Detection in Industrial IoT and Edge Computing.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

2024
A TabPFN-based intrusion detection system for the industrial internet of things.
J. Supercomput., September, 2024

A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents.
Comput. J., 2024

2023
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms.
Comput. Networks, September, 2023

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants.
IEEE Internet Things J., May, 2023

MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats.
J. Supercomput., 2023

An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns.
Eng. Appl. Artif. Intell., 2023

2022
Forensic analysis of the Xiaomi Mi Smart Sensor Set.
Digit. Investig., 2022

On how VoIP attacks foster the malicious call ecosystem.
Comput. Secur., 2022

2021
A context-centered methodology for IoT forensic investigations.
Int. J. Inf. Sec., 2021

Developing an IoT forensic methodology. A concept proposal.
Digit. Investig., 2021

Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

2020
An instrumentation based algorithm for stack overflow detection.
J. Comput. Virol. Hacking Tech., 2020

Automatic Analysis Architecture of IoT Malware Samples.
Secur. Commun. Networks, 2020

Characterizing Linux-based malware: Findings and recent trends.
Future Gener. Comput. Syst., 2020

2019
Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core.
Entropy, 2019


  Loading...