L. Javier García-Villalba

Orcid: 0000-0001-7573-6272

Affiliations:
  • Complutense University of Madrid, Spain


According to our database1, L. Javier García-Villalba authored at least 189 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.
Data, 2024

2023
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests.
Appl. Math. Comput., December, 2023

A multi-channel approach for detecting tampering in colour filter images.
Expert Syst. Appl., November, 2023

StringENT test suite: ENT battery revisited for efficient P value computation.
J. Cryptogr. Eng., June, 2023

Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.
Future Internet, May, 2023

Agency theory: Forecasting agent remuneration at insurance companies.
Expert Syst. Appl., April, 2023

ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.
Sensors, February, 2023

Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack.
Sensors, 2023


2022
Analysis of MP4 Videos in 5G Using SDN.
IEEE Trans. Intell. Transp. Syst., 2022

Digital Video Manipulation Detection Technique Based on Compression Algorithms.
IEEE Trans. Intell. Transp. Syst., 2022

On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers.
Sensors, 2022

A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.
Multim. Tools Appl., 2022

Sensitivity and uniformity in statistical randomness tests.
J. Inf. Secur. Appl., 2022

FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences.
Entropy, 2022

Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2).
Entropy, 2022

Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes.
ACM Comput. Surv., 2022

A new approach to analyze the independence of statistical tests of randomness.
Appl. Math. Comput., 2022

Agency Theory: Designing Optimal Incentives in the Insurance Sector.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.
Proceedings of the 1st International Conference on 6G Networking, 2022

2021
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
Sensors, 2021

Improving Real-Time Hand Gesture Recognition with Semantic Segmentation.
Sensors, 2021

Copy-move forgery detection technique based on discrete cosine transform blocks features.
Neural Comput. Appl., 2021

Compression effects and scene details on the source camera identification of digital videos.
Expert Syst. Appl., 2021

A security framework for Ethereum smart contracts.
Comput. Commun., 2021

Adversarial attacks on a lexical sentiment analysis classifier.
Comput. Commun., 2021

2020
Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
Sensors, 2020

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence.
Future Internet, 2020

Image tampering detection by estimating interpolation patterns.
Future Gener. Comput. Syst., 2020

A machine learning forensics technique to detect post-processing in digital videos.
Future Gener. Comput. Syst., 2020

Authentication and integrity of smartphone videos through multimedia container structure analysis.
Future Gener. Comput. Syst., 2020

An Analysis of Smart Contracts Security Threats Alongside Existing Solutions.
Entropy, 2020

Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.
IEEE Access, 2020

Digital Video Source Identification Based on Container's Structure Analysis.
IEEE Access, 2020

An Energy Balanced Flooding Algorithm for a BLE Mesh Network.
IEEE Access, 2020

2019
Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.
Sensors, 2019

QoS Management and Flexible Traffic Detection Architecture for 5G Mobile Networks.
Sensors, 2019

Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation.
Sensors, 2019

A traffic analysis attack to compute social network measures.
Multim. Tools Appl., 2019

Locating similar names through locality sensitive hashing and graph theory.
Multim. Tools Appl., 2019

A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019

Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.
IEEE Access, 2019

Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019

Set of Usability Heuristics for Quality Assessment of Mobile Applications on Smartphones.
IEEE Access, 2019

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.
IEEE Access, 2019

Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019

EBVBF: Energy Balanced Vector Based Forwarding Protocol.
IEEE Access, 2019

2018
Analyzing the traffic of penetration testing tools with an IDS.
J. Supercomput., 2018

An algorithm to find relationships between web vulnerabilities.
J. Supercomput., 2018

Enlargement of vulnerable web applications for testing.
J. Supercomput., 2018

Adaptive artificial immune networks for mitigating DoS flooding attacks.
Swarm Evol. Comput., 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Clustering and Flow Conservation Monitoring Tool for Software Defined Networks.
Sensors, 2018

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018

New DoS Defense Method Based on Strong Designated Verifier Signatures.
Sensors, 2018

A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences.
Knowl. Based Syst., 2018

Orchestration of use-case driven analytics in 5G scenarios.
J. Ambient Intell. Humaniz. Comput., 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Software Defined Networks in Wireless Sensor Architectures.
Entropy, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
BATCP: Bandwidth-Aggregation Transmission Control Protocol.
Symmetry, 2017

Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

Reasoning and Knowledge Acquisition Framework for 5G Network Analytics.
Sensors, 2017

Distributed Data Service for Data Management in Internet of Things Middleware.
Sensors, 2017

Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.
Sensors, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Netw. Comput. Appl., 2017

Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
ISPRS Int. J. Geo Inf., 2017

An optimisation framework for monitoring of SDN/OpenFlow networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017

Towards Incidence Management in 5G Based on Situational Awareness.
Future Internet, 2017

Key Technologies in the Context of Future Networks: Operational and Management Requirements.
Future Internet, 2017

Advanced Payload Analyzer Preprocessor.
Future Gener. Comput. Syst., 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017

Entropy-Based Economic Denial of Sustainability Detection.
Entropy, 2017

An Approach to Data Analysis in 5G Networks.
Entropy, 2017

Future mode of operations for 5G - The SELFNET approach enabled by SDN/NFV.
Comput. Stand. Interfaces, 2017

2016
Design and Evaluation of a Services Interface for the Internet of Things.
Wirel. Pers. Commun., 2016

Disclosing user relationships in email networks.
J. Supercomput., 2016

Leveraging information security and computational trust for cybersecurity.
J. Supercomput., 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016

Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016

On multiple burst-correcting MDS codes.
J. Comput. Appl. Math., 2016

Advances on Software Defined Sensor, Mobile, and Fixed Networks.
Int. J. Distributed Sens. Networks, 2016

Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

SELFNET Framework self-healing capabilities for 5G mobile networks.
Trans. Emerg. Telecommun. Technol., 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

Online masquerade detection resistant to mimicry.
Expert Syst. Appl., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

2015
Network Intrusion Detection Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015

Privacy in Data Centers: A Survey of Attacks and Countermeasures.
Proceedings of the Handbook on Data Centers, 2015

Monitoring of Data Centers using Wireless Sensor Networks.
Proceedings of the Handbook on Data Centers, 2015

Extracting Association Patterns in Network Communications.
Sensors, 2015

Solving technological isolation to build virtual learning communities.
Multim. Tools Appl., 2015

Virtual learning communities: unsolved troubles.
Multim. Tools Appl., 2015

Analysis of errors in exif metadata on mobile devices.
Multim. Tools Appl., 2015

Web from preprocessor for crawling.
Multim. Tools Appl., 2015

Trends on virtualisation with software defined networking and network function virtualisation.
IET Networks, 2015

Guest Editorial.
IET Networks, 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Comput. Vis., 2015

Smartphone image clustering.
Expert Syst. Appl., 2015

Framework for optimized multimedia routing over software defined networks.
Comput. Networks, 2015

Optimum shortened cyclic codes for multiple burst-error correction.
ACM Commun. Comput. Algebra, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

Advanced Technologies and Communication Solutions for Internet of Things.
Int. J. Distributed Sens. Networks, 2014

SDN: Evolution and Opportunities in the Development IoT Applications.
Int. J. Distributed Sens. Networks, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
Int. J. Distributed Sens. Networks, 2014

GTrust: Group Extension for Trust Models in Distributed Systems.
Int. J. Distributed Sens. Networks, 2014

Design and evaluation of a decentralised information service architecture for IEEE 802.21 networks.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

2013
Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2013

Parallel approach of a bioinspired routing protocol for MANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Data model extension for security event notification with dynamic risk assessment purpose.
Sci. China Inf. Sci., 2013

Evolution and Challenges of Software Defined Networking.
Proceedings of the IEEE SDN for Future Networks and Services, 2013

Source smartphone identification using sensor pattern noise and wavelet transform.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

2012
Security Issues in Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

A distributed QoS mechanism for ad hoc network.
Int. J. Ad Hoc Ubiquitous Comput., 2012

An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Commun. Lett., 2012

Intelligent system for time series classification using support vector machines applied to supply-chain.
Expert Syst. Appl., 2012

Concurrency Optimization for NIDS (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012

2011
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks.
Sensors, 2011

Distributed Dynamic Host Configuration Protocol (D2HCP).
Sensors, 2011

Auto-Configuration Protocols in Mobile <i>Ad Hoc</i> Networks.
Sensors, 2011

An Extension Proposal of D2HCP for Network Merging.
J. Ubiquitous Syst. Pervasive Networks, 2011

An Extension Proposal of AntOR for Parallel Computing.
J. Ubiquitous Syst. Pervasive Networks, 2011

Secure extension to the optimised link state routing protocol.
IET Inf. Secur., 2011

Advantages of identity certificate segregation in P2PSIP systems.
IET Commun., 2011

IEEE 802.21 Information services deployment for heterogeneous mobile environments.
IET Commun., 2011

Efficient Shortened Cyclic Codes Correcting Either Random Errors or Bursts.
IEEE Commun. Lett., 2011

Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011

Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Grid of Learning Resources in E-learning Communities.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
On the efficiency of shortened cyclic single-burst-correcting codes.
IEEE Trans. Inf. Theory, 2010

Dynamic multi-objective routing algorithm: a multi-objective routing algorithm for the simple hybrid routing protocol on wireless sensor networks.
IET Commun., 2010

Bio-inspired routing protocol for mobile ad hoc networks.
IET Commun., 2010

Hierarchical Neighbor Discovery Scheme for Handover Optimization.
IEEE Commun. Lett., 2010

Likelihood that a pseudorandom sequence generator has optimal properties
CoRR, 2010

2009
Routing Protocols in Wireless Sensor Networks.
Sensors, 2009

2008
A proposal of a wireless sensor network routing protocol.
Telecommun. Syst., 2008

Enhancing an Integer Challenge-Response Protocol.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
Implementation and Attacks Analysis of a Honeypot.
Proceedings of the Computational Science and Its Applications, 2007

2006
Evaluation of the Dynamic Reconfiguration of Mobile IPv4 Agents in MANET.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments.
Proceedings of the Personal Wireless Communications, 2006

Survivable Mechanism for IEEE 802.11 WLAN Improvements.
Proceedings of the Computational Science and Its Applications, 2006

Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.
Proceedings of the Computational Science and Its Applications, 2006

A New Proposal of TCP for IEEE 802.11 Wireless Networks.
Proceedings of the High Performance Computing and Communications, 2006

Performance Evaluation of Mobile IP Agents' Auto-reconfiguration Mechanisms in MANET.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
Proceedings of the Security in Information Systems, 2005

SisBrAV - Brazilian Vulnerability Alert System.
Proceedings of the Security in Information Systems, 2005

A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network.
Proceedings of the Security in Information Systems, 2005

2004
Hiding Data in Games.
J. Int. Comput. Games Assoc., 2004

Security in the Management of Networks with SNMPv3.
Proceedings of the Security In Information Systems, 2004

Beyond Boosting: Recursive ECOC Learning Machines.
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004

On multiple burst-correcting shortened cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Use of Spectral Techniques in the Design of Symmetrical Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2004

Load Balancing and Survivability for Network Services Based on Intelligent Agents.
Proceedings of the Computational Science and Its Applications, 2004

Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A Simulation-Based Performance Analysis of Dynamic Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Authentication and Autoconfiguration for MANET Nodes.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
Good Error Correcting Output Codes for Adaptive Multiclass Learning.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

Network Dependability: An Availability Measure in N-Tier Client/Server Architecture.
Proceedings of the Computer and Information Sciences, 2003

Scalable QoS Approach in a Core Internet Network.
Proceedings of the Web Engineering, International Conference, 2003

Why Not RSVP over DTM?
Proceedings of the Web Engineering, International Conference, 2003

A Modular Architecture for Distributed IDS in MANET.
Proceedings of the Computational Science and Its Applications, 2003

On the Number of Equivalence Classes in Certain Stream Ciphers.
Proceedings of the Computational Science and Its Applications, 2003

On MARS's s-boxes Strength against Linear Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2003

2001
An efficient algorithm to generate binary sequences for cryptographic purposes.
Theor. Comput. Sci., 2001

A family of keystream generators with large linear complexity.
Appl. Math. Lett., 2001

Recursive Adaptive ECOC Models.
Proceedings of the Progress in Artificial Intelligence, 2001

Computing the Genus of a Class of Curves.
Proceedings of the Applied Algebra, 2001

2000
On the linear complexity of the sequences generated by nonlinear filterings.
Inf. Process. Lett., 2000

1999
On the General Classification of Nonlinear Filters of <i>m</i>-Sequences.
Inf. Process. Lett., 1999


  Loading...