Joaquín García

Orcid: 0000-0002-7453-4393

Affiliations:
  • Telecom SudParis, Networks and Telecommunication Services Department, Paris, France
  • Autonomous University of Barcelone (UAB), Department of Information and Communications Engineering, Spain


According to our database1, Joaquín García authored at least 175 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies.
CoRR, 2024

2023
On the self-adjustment of privacy safeguards for query log streams.
Comput. Secur., November, 2023

Widening Blockchain Technology toward Access Control for Service Provisioning in Cellular Networks.
Sensors, 2023

Anonymous certification for E-assessment opinion polls.
J. Ambient Intell. Humaniz. Comput., 2023

ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks.
CoRR, 2023

Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks.
CoRR, 2023

Cyber-Resilience Approaches for Cyber-Physical Systems.
CoRR, 2023

A Quantum Algorithm for Shapley Value Estimation.
CoRR, 2023

Quantum Algorithms for Shapley Value Calculation.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems.
Proceedings of the IFIP Networking Conference, 2023

Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Design, Modeling and Implementation of Digital Twins.
Sensors, 2022

Research Trends in Collaborative Drones.
Sensors, 2022

Cyber-Physical Defense in the Quantum Era.
CoRR, 2022

Ontology-based Attack Graph Enrichment.
CoRR, 2022

Implementation of a Stateful Network Protocol Intrusion Detection Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

Resilience via Blackbox Self-Piloting Plants.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2021
Agents in a privacy-preserving world.
Trans. Data Priv., 2021

GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡.
Sensors, 2021

Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics.
IEEE Access, 2021

DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds.
IEEE Access, 2021

Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market?
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Risky Zone Avoidance Strategies for Drones.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

2020
Stateful RORI-based countermeasure selection using hypergraphs.
J. Inf. Secur. Appl., 2020

Switched-Based Resilient Control of Cyber-Physical Systems.
IEEE Access, 2020

A Real-Time Query Log Protection Method for Web Search Engines.
IEEE Access, 2020

Metrics to Enhance the Resilience of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Capacity Requirements in Networks of Quantum Repeaters and Terminals.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2020

Cyber-Resilience Evaluation of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
LockDown: Balance Availability Attack against Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

On the Difficulty of Hiding the Balance of Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications.
Trans. Emerg. Telecommun. Technol., 2019

Misconfiguration Management of Network Security Components.
CoRR, 2019

Next Generation Resilient Cyber-Physical Systems.
CoRR, 2019

Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations).
CoRR, 2019

The Influence of Conception Paradigms on Data Protection in E-Learning Platforms: A Case Study.
IEEE Access, 2019

Towards an Adaptive Defuzzification: Using Numerical Choquet Integral.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019

Geocaching-inspired Resilient Path Planning for Drone Swarms.
Proceedings of the IEEE INFOCOM 2019, 2019

Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Reflective Attenuation of Cyber-Physical Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks.
Mob. Networks Appl., 2018

Cyber-physical architecture assisted by programmable networking.
Internet Technol. Lett., 2018

Hypergraph-driven mitigation of cyberattacks.
Internet Technol. Lett., 2018

Integration of an adaptive trust-based e-assessment system into virtual learning environments - The TeSLA project experience.
Internet Technol. Lett., 2018

Dynamic risk management response system to handle cyber threats.
Future Gener. Comput. Syst., 2018

Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems.
Trans. Emerg. Telecommun. Technol., 2018

Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition).
Comput. Electr. Eng., 2018

Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances.
IEEE Access, 2018

A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Lifelogging Protection Scheme for Internet-Based Personal Assistants.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Low Frequency Mobile Communications in Underwater Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

A Pyramidal-based Model to Compute the Impact of Cyber Security Events.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Secure Localization in the Presence of Colluders in WSNs.
Sensors, 2017

A polytope-based approach to measure the impact of events against critical infrastructures.
J. Comput. Syst. Sci., 2017

On the use of watermark-based schemes to detect cyber-physical attacks.
EURASIP J. Inf. Secur., 2017

Selection of Pareto-efficient response plans based on financial and operational assessments.
EURASIP J. Inf. Secur., 2017

Introduction to the Special Section on Critical Systems Modelling and Security.
Comput. Electr. Eng., 2017

Learning to Communicate Underwater: An Exploration of Limited Mobility Agents.
Proceedings of the International Conference on Underwater Networks & Systems, 2017

Anonymous Certification for an e-Assessment Framework.
Proceedings of the Secure IT Systems, 2017

Security Challenges in e-Assessment and Technical Solutions.
Proceedings of the 21st International Conference Information Visualisation, 2017

Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

<i>PCS</i> , A Privacy-Preserving Certification Scheme.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Towards a Security Event Data Taxonomy.
Proceedings of the Risks and Security of Internet and Systems, 2017

The Sound of Communication in Underwater Acoustic Sensor Networks - (Position Paper).
Proceedings of the Ad Hoc Networks, 2017

Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band.
Proceedings of the Ad Hoc Networks, 2017

2016
Reputation trust mechanism under the organizational-based access control model.
Secur. Commun. Networks, 2016

Channel selection using a multiple radio model.
J. Netw. Comput. Appl., 2016

Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Towards an Automated and Dynamic Risk Management Response System.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Security of Cyber-Physical Systems - From Theory to Testbeds and Validation.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events.
Proceedings of the Risks and Security of Internet and Systems, 2016

CACEV: A Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds.
Proceedings of the IEEE International Conference on Services Computing, 2016

Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks.
Proceedings of the Advanced Research in Data Privacy, 2015

Remarks on Peinado <i>et al.</i>'s Analysis of J3Gen.
Sensors, 2015

Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks.
CoRR, 2015

Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index.
Comput. Electr. Eng., 2015

Introduction to the special section on critical systems modelling and security.
Comput. Electr. Eng., 2015

Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2015

Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics.
Proceedings of the SECRYPT 2015, 2015

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Automated Classification of C&C Connections Through Malware URL Clustering.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs).
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

NACER: A Network-Aware Cost-Efficient Resource Allocation Method for Processing-Intensive Tasks in Distributed Clouds.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Location-free link state routing for underwater acoustic sensor networks.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Simulation of underwater communications with a colored noise approximation and mobility.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

On the Isofunctionality of Network Access Control Lists.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Searching for a black hole in interconnected networks using mobile agents and tokens.
J. Parallel Distributed Comput., 2014

KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems.
J. Netw. Comput. Appl., 2014

On the similarity of commercial EPC Gen2 pseudorandom number generators.
Trans. Emerg. Telecommun. Technol., 2014

The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model.
Proceedings of the IEEE International Conference on Communications, 2014

Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
J3Gen: A PRNG for Low-Cost Passive RFID.
Sensors, 2013

A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs.
J. Netw. Comput. Appl., 2013

Semantic analysis of role mining results and shadowed roles detection.
Inf. Secur. Tech. Rep., 2013

Editorial.
J. Inf. Secur. Appl., 2013

Management of stateful firewall misconfiguration.
Comput. Secur., 2013

Onion routing circuit construction via latency graphs.
Comput. Secur., 2013

A privacy-aware access control model for distributed network monitoring.
Comput. Electr. Eng., 2013

QoS and security in Link State Routing protocols for MANETs.
Proceedings of the IFIP Wireless Days, 2013

A new analytic model for the cognitive radio jump-stay algorithm.
Proceedings of the IFIP Wireless Days, 2013

Attribute-Based Mining Process for the Organization-Based Access Control Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Real-time malicious fast-flux detection using DNS and bot related features.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Model-Driven Extraction and Analysis of Network Security Policies.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

Fine-grained privacy control for the RFID middleware of EPCglobal networks.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

Towards an Access-Control Metamodel for Web Content Management Systems.
Proceedings of the Current Trends in Web Engineering, 2013

Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Privacy-enhanced filtering and collection middleware in EPCglobal networks.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Contributions to the security of EPC/RFID wireless technologies.
, 2013

2012
Transaction-based authentication and key agreement protocol for inter-domain VoIP.
J. Netw. Comput. Appl., 2012

On the Use of Latency Graphs for the Construction of Tor Circuits
CoRR, 2012

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Handling Stateful Firewall Anomalies.
Proceedings of the Information Security and Privacy Research, 2012

A model-driven approach for the extraction of network access-control policies.
Proceedings of the Model-Driven Security Workshop, 2012

HADEGA: A novel MPLS-based mitigation solution to handle network attacks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
Wirel. Pers. Commun., 2011

Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011

Improved flooding of broadcast messages using extended multipoint relaying.
J. Netw. Comput. Appl., 2011

Proactive Threshold Cryptosystem for EPC Tags.
Ad Hoc Sens. Wirel. Networks, 2011

Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes.
Ann. des Télécommunications, 2011

Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol.
Proceedings of the Foundations and Practice of Security, 2011

Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.
Proceedings of the Financial Cryptography and Data Security, 2010

Model-Driven Security Policy Deployment: Property Oriented Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Mitigation of topology control traffic attacks in OLSR networks.
Proceedings of the CRiSIS 2010, 2010

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Evaluation of Anonymized ONS Queries
CoRR, 2009

A Survey on Cross-Site Scripting Attacks
CoRR, 2009

A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.
Proceedings of the Emerging Challenges for Security, 2009

Evaluation of Two Privacy-Preserving Protocols for the DNS.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Spyware-Based Menaces Against Web Applications.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

Security Threat Mitigation Trends in Low-Cost RFID Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

A secured delegation of remote services on IPv6 home networks.
Proceedings of the CRiSIS 2009, 2009

Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Semantic context aware security policy deployment.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008

Preventing Coordinated Attacks Via Distributed Alert Exchange
CoRR, 2008

Anonymous Resolution of DNS Queries.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Security Threats on EPC Based RFID Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Distributed Exchange of Alerts for the Detection of Coordinated Attacks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Analysis of Threats to the Security of EPC Networks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2007
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007

Management of Exceptions on Access Control Policies.
Proceedings of the New Approaches for Security, 2007

Prevention of Cross-Site Scripting Attacks on Current Web Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications.
Proceedings of the Critical Information Infrastructures Security, 2007

Aggregating and Deploying Network Access Control Policies.
Proceedings of the The Second International Conference on Availability, 2007

2006
Platform of intrusion management design and implementation. (Plate-forme de gestion d'intrusion: design et implémentation).
PhD thesis, 2006

Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006

Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.
Proceedings of the Computer Safety, 2006

SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Analysis of Policy Anomalies on Distributed Network Security Setups.
Proceedings of the Computer Security, 2006

Protection of Components Based on a Smart-Card Enhanced Security Module.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Digital Chips for an On-Line Casino.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Amapola: A Simple Infrastructure for Ubiquitous Computing.
Proceedings of the Intelligence in Communication Systems, 2005

Decoupling Components of an Attack Prevention System Using Publish/Subscribe.
Proceedings of the Intelligence in Communication Systems, 2005

2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004


  Loading...