Joaquín García
Orcid: 0000-0002-7453-4393Affiliations:
- Telecom SudParis, Networks and Telecommunication Services Department, Paris, France
- Autonomous University of Barcelone (UAB), Department of Information and Communications Engineering, Spain
According to our database1,
Joaquín García
authored at least 180 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on j.mp
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., August, 2024
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks.
J. Inf. Secur. Appl., 2024
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review.
CoRR, 2024
SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies.
CoRR, 2024
Proceedings of the IFIP Networking Conference, 2024
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Comput. Secur., November, 2023
Widening Blockchain Technology toward Access Control for Service Provisioning in Cellular Networks.
Sensors, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks.
CoRR, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA.
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022
2021
GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡.
Sensors, 2021
IEEE Access, 2021
DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds.
IEEE Access, 2021
Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market?
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021
2020
J. Inf. Secur. Appl., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2020
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications.
Trans. Emerg. Telecommun. Technol., 2019
Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations).
CoRR, 2019
The Influence of Conception Paradigms on Data Protection in E-Learning Platforms: A Case Study.
IEEE Access, 2019
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
Doppler Effect in the Acoustic Ultra Low Frequency Band for Wireless Underwater Networks.
Mob. Networks Appl., 2018
Internet Technol. Lett., 2018
Integration of an adaptive trust-based e-assessment system into virtual learning environments - The TeSLA project experience.
Internet Technol. Lett., 2018
Future Gener. Comput. Syst., 2018
Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems.
Trans. Emerg. Telecommun. Technol., 2018
Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition).
Comput. Electr. Eng., 2018
Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances.
IEEE Access, 2018
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
A polytope-based approach to measure the impact of events against critical infrastructures.
J. Comput. Syst. Sci., 2017
EURASIP J. Inf. Secur., 2017
Selection of Pareto-efficient response plans based on financial and operational assessments.
EURASIP J. Inf. Secur., 2017
Comput. Electr. Eng., 2017
Proceedings of the International Conference on Underwater Networks & Systems, 2017
Proceedings of the Secure IT Systems, 2017
Proceedings of the 21st International Conference Information Visualisation, 2017
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
The Sound of Communication in Underwater Acoustic Sensor Networks - (Position Paper).
Proceedings of the Ad Hoc Networks, 2017
Proceedings of the Ad Hoc Networks, 2017
2016
Secur. Commun. Networks, 2016
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
CACEV: A Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds.
Proceedings of the IEEE International Conference on Services Computing, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks.
CoRR, 2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index.
Comput. Electr. Eng., 2015
Comput. Electr. Eng., 2015
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2015
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics.
Proceedings of the SECRYPT 2015, 2015
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs).
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
NACER: A Network-Aware Cost-Efficient Resource Allocation Method for Processing-Intensive Tasks in Distributed Clouds.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Simulation of underwater communications with a colored noise approximation and mobility.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Searching for a black hole in interconnected networks using mobile agents and tokens.
J. Parallel Distributed Comput., 2014
J. Netw. Comput. Appl., 2014
Trans. Emerg. Telecommun. Technol., 2014
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model.
Proceedings of the IEEE International Conference on Communications, 2014
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs.
J. Netw. Comput. Appl., 2013
Inf. Secur. Tech. Rep., 2013
Comput. Electr. Eng., 2013
Proceedings of the IFIP Wireless Days, 2013
Proceedings of the IFIP Wireless Days, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Model-Driven Engineering Languages and Systems, 2013
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013
Proceedings of the Current Trends in Web Engineering, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
J. Netw. Comput. Appl., 2012
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
Wirel. Pers. Commun., 2011
Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011
J. Netw. Comput. Appl., 2011
Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes.
Ann. des Télécommunications, 2011
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011
A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011
2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the CRiSIS 2010, 2010
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
2009
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the CRiSIS 2009, 2009
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
2007
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications.
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Platform of intrusion management design and implementation. (Plate-forme de gestion d'intrusion: design et implémentation).
PhD thesis, 2006
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006
Proceedings of the Computer Safety, 2006
SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Computer Security, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Intelligence in Communication Systems, 2005
Proceedings of the Intelligence in Communication Systems, 2005
2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004