L. Javier García-Villalba
Orcid: 0000-0001-7573-6272Affiliations:
- Complutense University of Madrid, Spain
 
  According to our database1,
  L. Javier García-Villalba
  authored at least 193 papers
  between 1999 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on zbmath.org
 - 
    on scopus.com
 - 
    on orcid.org
 - 
    on gass.ucm.es
 
On csauthors.net:
Bibliography
  2025
Question-Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning.
    
  
    Future Internet, 2025
    
  
  2024
Natural Language Processing Applied to Forensics Information Extraction With Transformers and Graph Visualization.
    
  
    IEEE Trans. Comput. Soc. Syst., August, 2024
    
  
    Syst., 2024
    
  
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.
    
  
    Data, 2024
    
  
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol.
    
  
    Cryptogr., 2024
    
  
  2023
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests.
    
  
    Appl. Math. Comput., December, 2023
    
  
    Expert Syst. Appl., November, 2023
    
  
    J. Cryptogr. Eng., June, 2023
    
  
Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.
    
  
    Future Internet, May, 2023
    
  
    Expert Syst. Appl., April, 2023
    
  
ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.
    
  
    Sensors, February, 2023
    
  
    Sensors, 2023
    
  
    Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023
    
  
  2022
    IEEE Trans. Intell. Transp. Syst., 2022
    
  
    Sensors, 2022
    
  
A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.
    
  
    Multim. Tools Appl., 2022
    
  
    J. Inf. Secur. Appl., 2022
    
  
Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2).
    
  
    Entropy, 2022
    
  
    ACM Comput. Surv., 2022
    
  
    Appl. Math. Comput., 2022
    
  
    Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
    
  
Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.
    
  
    Proceedings of the 1st International Conference on 6G Networking, 2022
    
  
  2021
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
    
  
    Sensors, 2021
    
  
    Sensors, 2021
    
  
Copy-move forgery detection technique based on discrete cosine transform blocks features.
    
  
    Neural Comput. Appl., 2021
    
  
Compression effects and scene details on the source camera identification of digital videos.
    
  
    Expert Syst. Appl., 2021
    
  
    Comput. Commun., 2021
    
  
  2020
Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
    
  
    Sensors, 2020
    
  
    Future Internet, 2020
    
  
    Future Gener. Comput. Syst., 2020
    
  
    Future Gener. Comput. Syst., 2020
    
  
Authentication and integrity of smartphone videos through multimedia container structure analysis.
    
  
    Future Gener. Comput. Syst., 2020
    
  
    Entropy, 2020
    
  
Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.
    
  
    IEEE Access, 2020
    
  
    IEEE Access, 2020
    
  
  2019
    Sensors, 2019
    
  
    Sensors, 2019
    
  
Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation.
    
  
    Sensors, 2019
    
  
    Multim. Tools Appl., 2019
    
  
    Multim. Tools Appl., 2019
    
  
A comparison of learning methods over raw data: forecasting cab services market share in New York City.
    
  
    Multim. Tools Appl., 2019
    
  
Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.
    
  
    IEEE Access, 2019
    
  
Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
    
  
    IEEE Access, 2019
    
  
Set of Usability Heuristics for Quality Assessment of Mobile Applications on Smartphones.
    
  
    IEEE Access, 2019
    
  
Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
    
  
    IEEE Access, 2019
    
  
  2018
    J. Supercomput., 2018
    
  
    J. Supercomput., 2018
    
  
    Swarm Evol. Comput., 2018
    
  
    Sensors, 2018
    
  
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
    
  
    Sensors, 2018
    
  
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
    
  
    Sensors, 2018
    
  
    Sensors, 2018
    
  
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
    
  
    Sensors, 2018
    
  
A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences.
    
  
    Knowl. Based Syst., 2018
    
  
    J. Ambient Intell. Humaniz. Comput., 2018
    
  
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments.
    
  
    Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
    
  
    Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
    
  
  2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
    
  
    Symmetry, 2017
    
  
    Sensors, 2017
    
  
    Sensors, 2017
    
  
Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.
    
  
    Sensors, 2017
    
  
Alert correlation framework for malware detection by anomaly-based packet payload analysis.
    
  
    J. Netw. Comput. Appl., 2017
    
  
    ISPRS Int. J. Geo Inf., 2017
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2017
    
  
    Future Internet, 2017
    
  
Key Technologies in the Context of Future Networks: Operational and Management Requirements.
    
  
    Future Internet, 2017
    
  
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
    
  
    Future Gener. Comput. Syst., 2017
    
  
    Comput. Stand. Interfaces, 2017
    
  
  2016
    Wirel. Pers. Commun., 2016
    
  
    J. Supercomput., 2016
    
  
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
    
  
    Sensors, 2016
    
  
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
    
  
    Sensors, 2016
    
  
Image source acquisition identification of mobile devices based on the use of features.
    
  
    Multim. Tools Appl., 2016
    
  
    Int. J. Distributed Sens. Networks, 2016
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2016
    
  
    Trans. Emerg. Telecommun. Technol., 2016
    
  
    Expert Syst. Appl., 2016
    
  
  2015
    Proceedings of the Handbook on Data Centers, 2015
    
  
Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
    
  
    Proceedings of the Handbook on Data Centers, 2015
    
  
    Proceedings of the Handbook on Data Centers, 2015
    
  
    Proceedings of the Handbook on Data Centers, 2015
    
  
    Multim. Tools Appl., 2015
    
  
Trends on virtualisation with software defined networking and network function virtualisation.
    
  
    IET Networks, 2015
    
  
    IET Comput. Vis., 2015
    
  
    Comput. Networks, 2015
    
  
    ACM Commun. Comput. Algebra, 2015
    
  
  2014
    Int. J. Distributed Sens. Networks, 2014
    
  
    Int. J. Distributed Sens. Networks, 2014
    
  
    Int. J. Distributed Sens. Networks, 2014
    
  
    Int. J. Distributed Sens. Networks, 2014
    
  
Design and evaluation of a decentralised information service architecture for IEEE 802.21 networks.
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2014
    
  
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
    
  
    Computing, 2014
    
  
  2013
    Int. J. Distributed Sens. Networks, 2013
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2013
    
  
Data model extension for security event notification with dynamic risk assessment purpose.
    
  
    Sci. China Inf. Sci., 2013
    
  
    Proceedings of the IEEE SDN for Future Networks and Services, 2013
    
  
    Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
    
  
  2012
Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
    
  
    Int. J. Distributed Sens. Networks, 2012
    
  
Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
    
  
    Int. J. Distributed Sens. Networks, 2012
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2012
    
  
An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
    
  
    IEEE Commun. Lett., 2012
    
  
Intelligent system for time series classification using support vector machines applied to supply-chain.
    
  
    Expert Syst. Appl., 2012
    
  
    Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
    
  
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
    
  
    Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
    
  
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract).
    
  
    Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
    
  
    Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
    
  
    Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012
    
  
  2011
    Sensors, 2011
    
  
    J. Ubiquitous Syst. Pervasive Networks, 2011
    
  
    J. Ubiquitous Syst. Pervasive Networks, 2011
    
  
    IET Commun., 2011
    
  
    IEEE Commun. Lett., 2011
    
  
Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
    
  
    CoRR, 2011
    
  
Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
    
  
    Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
    
  
    Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
    
  
    Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
    
  
A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
    
  
    Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
    
  
Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
    
  
    Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
    
  
Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure.
    
  
    Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
    
  
  2010
    IEEE Trans. Inf. Theory, 2010
    
  
Dynamic multi-objective routing algorithm: a multi-objective routing algorithm for the simple hybrid routing protocol on wireless sensor networks.
    
  
    IET Commun., 2010
    
  
    IEEE Commun. Lett., 2010
    
  
  2009
  2008
    Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
    
  
  2007
    Proceedings of the Personal Wireless Communications, 2007
    
  
    Proceedings of the Computational Science and Its Applications, 2007
    
  
  2006
Evaluation of the Dynamic Reconfiguration of Mobile IPv4 Agents in MANET.
  
    Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
    
  
    Proceedings of the Personal Wireless Communications, 2006
    
  
    Proceedings of the Computational Science and Its Applications, 2006
    
  
Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.
    
  
    Proceedings of the Computational Science and Its Applications, 2006
    
  
    Proceedings of the High Performance Computing and Communications, 2006
    
  
Performance Evaluation of Mobile IP Agents' Auto-reconfiguration Mechanisms in MANET.
    
  
    Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
    
  
  2005
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
  
    Proceedings of the Security in Information Systems, 2005
    
  
SisBrAV - Brazilian Vulnerability Alert System.
  
    Proceedings of the Security in Information Systems, 2005
    
  
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network.
  
    Proceedings of the Security in Information Systems, 2005
    
  
  2004
Hiding Data in Games.
  
    J. Int. Comput. Games Assoc., 2004
    
  
Security in the Management of Networks with SNMPv3.
  
    Proceedings of the Security In Information Systems, 2004
    
  
    Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004
    
  
    Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
    
  
    Proceedings of the Computational Science and Its Applications, 2004
    
  
    Proceedings of the Computational Science and Its Applications, 2004
    
  
Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks.
    
  
    Proceedings of the Embedded and Ubiquitous Computing, 2004
    
  
A Simulation-Based Performance Analysis of Dynamic Routing Protocols for Mobile Ad Hoc Networks.
    
  
    Proceedings of the Embedded and Ubiquitous Computing, 2004
    
  
    Proceedings of the Embedded and Ubiquitous Computing, 2004
    
  
  2003
    Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
    
  
    Proceedings of the Computer and Information Sciences, 2003
    
  
    Proceedings of the Web Engineering, International Conference, 2003
    
  
    Proceedings of the Computational Science and Its Applications, 2003
    
  
    Proceedings of the Computational Science and Its Applications, 2003
    
  
    Proceedings of the Computational Science and Its Applications, 2003
    
  
  2002
    Proceedings of the 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 2002
    
  
  2001
    Theor. Comput. Sci., 2001
    
  
    Appl. Math. Lett., 2001
    
  
    Proceedings of the Progress in Artificial Intelligence, 2001
    
  
  2000
    Inf. Process. Lett., 2000
    
  
  1999
    Inf. Process. Lett., 1999