José María de Fuentes

Orcid: 0000-0002-4023-3197

According to our database1, José María de Fuentes authored at least 55 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Feasibility of Predicting Volumes of Fake News - The Spanish Case.
IEEE Trans. Comput. Soc. Syst., August, 2024

Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction.
CoRR, 2024

Continuous Authentication Leveraging Matrix Profile.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A technical characterization of APTs by leveraging public resources.
Int. J. Inf. Sec., December, 2023

Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus.
Int. J. Inf. Sec., October, 2023

KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism.
Pattern Recognit. Lett., September, 2023

Cybersecurity in the digital world.
Future Gener. Comput. Syst., July, 2023

Characterizing the MasterPrint threat on Android devices with capacitive sensors.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Eye-based keystroke prediction for natural texts - a feasibility analysis.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Access Control for Implantable Medical Devices.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review.
Sensors, 2021

SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation.
Pattern Recognit. Lett., 2021

Achieving cybersecurity in blockchain-based systems: A survey.
Future Gener. Comput. Syst., 2021

Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields.
IEEE Access, 2021

2020
Impact of injection attacks on sensor-based continuous authentication for smartphones.
Comput. Commun., 2020

SmartLED: Smartphone-based covert channels leveraging the notification LED.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Editorial: Security and Privacy in Internet of Things.
Mob. Networks Appl., 2019

External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security.
J. Hardw. Syst. Secur., 2019

AndrODet: An adaptive Android obfuscation detector.
Future Gener. Comput. Syst., 2019

Leveraging User-related Internet of Things for Continuous Authentication: A Survey.
ACM Comput. Surv., 2019

Design recommendations for online cybersecurity courses.
Comput. Secur., 2019

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
Sensors, 2018

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Gener. Comput. Syst., 2018

Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities.
Computer, 2018

Security Protocols for Networks and Internet: A Global Vision.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities.
Pers. Ubiquitous Comput., 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Gener. Comput. Syst., 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Comput. Secur., 2017

SoNeUCON<sub>ABC</sub>Pro: An Access Control Model for Social Networks with Translucent User Provenance.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Acquiring and Analyzing Traces from Cryptographic Devices.
Proceedings of the Security and Privacy in Communication Networks, 2017

TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Privacy Models in Wireless Sensor Networks: A Survey.
J. Sensors, 2016

PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Netw. Comput. Appl., 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

Access Control for the Cloud Based on Multi-device Authentication.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks.
J. Syst. Softw., 2014

Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.
Int. J. Distributed Sens. Networks, 2014

SoNeUCON<sub>ABC</sub>, an expressive usage control model for Web-Based Social Networks.
Comput. Secur., 2014

CooPeD: Co-owned Personal Data management.
Comput. Secur., 2014

AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
User-Managed Access Control in Web Based Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

WEVAN - A mechanism for evidence creation and verification in VANETs.
J. Syst. Archit., 2013

Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills.
J. Educ. Technol. Soc., 2013

A taxonomy and survey of attacks on digital signatures.
Comput. Secur., 2013

Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations.
Ad Hoc Networks, 2013

2012
A framework for avoiding steganography usage over HTTP.
J. Netw. Comput. Appl., 2012

U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

2010
L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...