Jose Romero-Mariona

According to our database1, Jose Romero-Mariona authored at least 18 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures.
Int. J. Organ. Collect. Intell., 2021

2020
Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures.
Internet Things, 2020

Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures.
Proceedings of the 5th International Conference on Internet of Things, 2020

Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
Proceedings of the 5th International Conference on Complexity, 2020

2017
IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Security in the Industrial Internet of Things - The C-SEC Approach.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
C-SEC (Cyber SCADA evaluation capability): Securing critical infrastructures.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015

An Approach to Organizational Cybersecurity.
Proceedings of the Enterprise Security - Second International Workshop, 2015

2014
DITEC (DoD-Centric and Independent Technology Evaluation Capability): A Process for Testing Security.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

2013
CEALICIAN: Compact Encryption and Line-Integrated Circuitry for Information Assurance in Networking.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2010
Increasing Trustworthiness through Security Testing Support.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

ASSURE: automated support for secure and usable requirements engineering.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Formality of the Security Specification Process: Benefits Beyond Requirements.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Later stages support for security requirements.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

Secure and Usable Requirements Engineering.
Proceedings of the ASE 2009, 2009

Towards usable cyber security requirements.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
SRRS: a recommendation system for security requirements.
Proceedings of the 2008 International Workshop on Recommendation Systems for Software Engineering, 2008

2007
CCARCH: Architecting Common Criteria Security Requirements.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...