Joan Arnedo-Moreno

According to our database1, Joan Arnedo-Moreno
  • authored at least 46 papers between 2006 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Gamification: a systematic review of design frameworks.
J. Computing in Higher Education, 2017

Open Proctor: An Academic Integrity Tool for the Open Learning Environment.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017

A Robust and Non-invasive Strategy for Preserving Academic Integrity in an Open and Distance Learning Environment.
Proceedings of the 17th IEEE International Conference on Advanced Learning Technologies, 2017

A Method for Thematic and Structural Visualization of Academic Content.
Proceedings of the 17th IEEE International Conference on Advanced Learning Technologies, 2017

2016
Designing game-like activities to engage adult learners in higher education.
Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca, Spain, November 02, 2016

Gamification of cognitive training: a crowdsourcing-inspired approach for older adults.
Proceedings of the XVII International Conference on Human Computer Interaction, 2016

A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices.
Mobile Information Systems, 2015

A Literature Review of Gamification Design Frameworks.
Proceedings of the 7th International Conference on Games and Virtual Worlds for Serious Applications, 2015

FRAGGLE: A FRamework for AGile Gamification of Learning Experiences.
Proceedings of the Games and Learning Alliance - 4th International Conference, 2015

Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
ValID: A Trust-Based Virtual Assessment System.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Balancing Power Consumption in IoT Devices by Using Variable Packet Size.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Anonymously accessing JXTA community services through split message forwarding.
Mathematical and Computer Modelling, 2013

Analysis of the Forensic Traces Left by AirPrint in Apple iOS Devices.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

A Study on Practices against Malware in Free Software Projects.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Towards secure mobile P2P applications using JXME.
J. Internet Serv. Inf. Secur., 2012

JXTAnonym: An Anonymity Layer for JXTA Services Messaging.
IEICE Transactions, 2012

Versatile iPad forensic acquisition using the Apple Camera Connection Kit.
Computers & Mathematics with Applications, 2012

jxSensor: A Sensor Network Integration Layer for JXTA.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Split Message-Based Anonymity for JXTA Applications.
Proceedings of the Sixth International Conference on Complex, 2012

2011
Secure Communication Setup for a P2P-Based JXTA-Overlay Platform.
IEEE Trans. Industrial Electronics, 2011

The Impact of Security on VoIP Call Quality.
J. Mobile Multimedia, 2011

Lightweight Security for JXME-Proxied Relay Authentication.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Universal, Fast Method for iPad Forensics Imaging via USB Adapter.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An Anonymity Layer for JXTA Services.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Application of JXTA-Overlay Platform for Secure Robot Control.
J. Mobile Multimedia, 2010

XML-based security for JXTA core protocols.
Int. J. Auton. Comp., 2010

JXTA resource access control by means of advertisement encryption.
Future Generation Comp. Syst., 2010

JXTA-Overlay P2P Platform and Its Application for Robot Control.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

VoIP: making secure calls and maintaining high call quality.
Proceedings of the MoMM'2010, 2010

JXTA Security in Mobile Constrained Devices.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Secure JXTA-Overlay Platform for Robot Control.
Proceedings of the 3PGCIC 2010, 2010

ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys.
Proceedings of the 3PGCIC 2010, 2010

2009
A survey on security in JXTA applications.
Journal of Systems and Software, 2009

Maintaining Unlinkability in Group Based P2P Environments.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

Experimental Results and Evaluation of SmartBox Stimulation Device in a P2P E-learning System.
Proceedings of the NBiS 2009, 2009

A Security Framework for JXTA-Overlay.
Proceedings of the NBiS 2009, 2009

Securing a Java P2P framework: the JXTA-overlay case.
Proceedings of the iiWAS'2009, 2009

A Security-Aware Approach to JXTA-Overlay Primitives.
Proceedings of the ICPPW 2009, 2009

A Security Layer for JXTA Core Protocols.
Proceedings of the 2009 International Conference on Complex, 2009

2008
An Integrated Structure for a Virtual Networking Laboratory.
IEEE Trans. Industrial Electronics, 2008

Collaborative group membership and access control for JXTA.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Persistent Interoperable Security for JXTA Advertisements.
Proceedings of the Second International Conference on Complex, 2008

2006
Providing a collaborative mechanism for peer group access control.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006


  Loading...