Juan Guarnizo

Orcid: 0000-0002-2161-308X

According to our database1, Juan Guarnizo authored at least 11 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Is Modeling Access Control Worth It?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2020
SmartWitness: A Proactive Software Transparency System using Smart Contracts.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019

PDFS: Practical Data Feed Service for Smart Contracts.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017


  Loading...