José M. Fernandez

Orcid: 0000-0001-9836-3595

Affiliations:
  • Polytechnique Montréal, Canada


According to our database1, José M. Fernandez authored at least 55 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ESAT: Extended Security in the Air using TESLA.
CoRR, 2023

2021
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED).
Int. J. Inf. Sec., 2021

Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
The never ending war in the stack and the reincarnation of ROP attacks.
CoRR, 2020

Spartan Networks: Self-feature-squeezing neural networks for increased robustness in adversarial settings.
Comput. Secur., 2020

Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.
ACM Trans. Priv. Secur., 2018

Survey of publicly available reports on advanced persistent threat actors.
Comput. Secur., 2018

A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks.
Proceedings of the Critical Infrastructure Protection XII, 2018

Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
On the Security of Aircraft Communication Networks.
Proceedings of the Critical Information Infrastructures Security, 2017

An Empirical Analysis of Risk Aversion in Malware Infections.
Proceedings of the Risks and Security of Internet and Systems, 2017

POISED: Spotting Twitter Spam Off the Beaten Paths.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Age and gender as independent risk factors for malware victimisation.
Proceedings of the HCI 2017, 2017

2016
Analysis of Performance of the Routing Protocols Ad Hoc using Random Waypoint Mobility Model Applied to an Urban Environment.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Providing SCADA Network Data Sets for Intrusion Detection Research.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

A Modbus command and control channel.
Proceedings of the Annual IEEE Systems Conference, 2016

Follow the traffic: Stopping click fraud by disrupting the value chain.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Lightweight Journaling for Scada Systems via Event Correlation.
Proceedings of the Critical Infrastructure Protection X, 2016

A Practical flow white list approach for SCADA systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
Measuring the health of antivirus ecosystems.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Scalable Security Verification of Software at Compile Time.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

Risk prediction of malware victimization based on user behavior.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Modelling physical impact of cyber attacks.
Proceedings of the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2014

2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

A comprehensive study of queue management as a DoS counter-measure.
Int. J. Inf. Sec., 2013

Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.
Proceedings of the Network and System Security - 7th International Conference, 2013

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

An isolated virtual cluster for SCADA network security research.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

A clinical study of risk factors related to malware infections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Methodology for a Field Study of Anti-malware Software.
Proceedings of the Financial Cryptography and Data Security, 2012

Ethical and Secure Data Sharing across Borders.
Proceedings of the Financial Cryptography and Data Security, 2012

Aligot: cryptographic function identification in obfuscated binary programs.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010

The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Evaluating Security Products with Clinical Trials.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Optimising sybil attacks against P2P-based botnets.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

2008
Alambic : a privacy-preserving recommender system for electronic commerce.
Int. J. Inf. Sec., 2008

Sybil attacks as a mitigation strategy against the Storm botnet.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Proceedings of the Computer Security, 2008

Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System.
Proceedings of the The Third International Conference on Availability, 2008

2007
Optimal Algorithmic Cooling of Spins.
Proceedings of the Unconventional Computation, 6th International Conference, 2007

Queue Management as a DoS Counter-Measure?
Proceedings of the Information Security, 10th International Conference, 2007

Optimising Networks Against Malware.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Implementing and testing dynamic timeout adjustment as a dos counter-measure.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Privacy-preserving demographic filtering.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Optimising malware.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
A common algebraic description for probabilistic and quantum computations<sup>, </sup>.
Theor. Comput. Sci., 2005

2004
A Common Algebraic Description for Probabilistic and Quantum Computations (Extended Abstract).
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004

2003
PCFinder: An Intelligent Product Recommendation Agent for E-Commerce.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003


  Loading...