Manuel Gil Pérez

Orcid: 0000-0002-7768-9665

According to our database1, Manuel Gil Pérez authored at least 82 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots.
CoRR, 2024

2023
A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare.
ACM Comput. Surv., December, 2023

Opportunities for standardization in emergency scenarios in the European Union.
Int. J. Medical Informatics, November, 2023

Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges.
ACM Comput. Surv., November, 2023

Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning.
Comput. Commun., November, 2023

Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management.
J. Netw. Comput. Appl., October, 2023

LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers.
Internet Things, July, 2023

A methodology to identify identical single-board computers based on hardware behavior fingerprinting.
J. Netw. Comput. Appl., March, 2023

PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation.
Sensors, February, 2023

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense.
CoRR, 2023

Fedstellar: A Platform for Decentralized Federated Learning.
CoRR, 2023

Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges.
IEEE Commun. Surv. Tutorials, 2023

A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario.
IEEE Access, 2023

Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022


Design of a Security and Trust Framework for 5G Multi-domain Scenarios.
J. Netw. Syst. Manag., 2022

Toward pre-standardization of reputation-based trust models beyond 5G.
Comput. Stand. Interfaces, 2022

A Security and Trust Framework for Decentralized 5G Marketplaces.
CoRR, 2022

Trust-as-a-Service: A reputation-enabled trust framework for 5G networks.
CoRR, 2022


2021
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021

A novel Machine Learning-based approach for the detection of SSH botnet infection.
Future Gener. Comput. Syst., 2021

Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology.
CoRR, 2021

Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets.
IEEE Commun. Surv. Tutorials, 2021

Early DGA-based botnet identification: pushing detection to the edges.
Clust. Comput., 2021


2020

Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020

SELFNET 5G mobile edge computing infrastructure: Design and prototyping.
Softw. Pract. Exp., 2020

Scalable detection of botnets based on DGA: Efficient feature discovery process in machine learning techniques.
Soft Comput., 2020

UMUDGA: A dataset for profiling DGA-based botnet.
Comput. Secur., 2020

PROTECTOR: Towards the protection of sensitive data in Europe and the US.
Comput. Networks, 2020

2019
PALOT: Profiling and Authenticating Users Leveraging Internet of Things.
Sensors, 2019

Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019

Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019

Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Towards the autonomous provision of self-protection capabilities in 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Screening Out Social Bots Interference: Are There Any Silver Bullets?
IEEE Commun. Mag., 2019

A Management Platform for Citizen's Data Protection Regulation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

5G-CAGE: A Context and Situational Awareness System for City Public Safety with Video Processing at a Virtualized Ecosystem.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

2018
Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018

A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks.
IEEE Access, 2018

Real-time aggregation framework in a 5G SDN self-management environment.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Policy-based network slicing management for future mobile communications.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Catalog-Driven Services in a 5G SDN/NFV Self-Managed Environment.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

A Dynamic Continuous Authentication Framework in IoT-Enabled Environments.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

2017
Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017

Enabling Highly Dynamic Mobile Scenarios with Software Defined Networking.
IEEE Commun. Mag., 2017

An integrated aerial system for landmine detection: SDR-based Ground Penetrating Radar onboard an autonomous drone.
Adv. Robotics, 2017

Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017

On the performance of a deep learning-based anomaly detection system for 5G networks.
Proceedings of the 2017 IEEE SmartWorld, 2017

Automatic monitoring management for 5G mobile networks.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016

Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016

Resolving privacy-preserving relationships over outsourced encrypted data storages.
Int. J. Inf. Sec., 2016

MASTERY: A multicontext-aware system that preserves the users' privacy.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

I Don't Trust ICT: Research Challenges in Cyber Security.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015

Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Comput., 2014

Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014

Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014

What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013

RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management.
Proceedings of the Seventh International Conference on Complex, 2013

2011
An advanced certificate validation service and architecture based on XKMS.
Softw. Pract. Exp., 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

2010
Event-driven architecture based on patterns for detecting complex attacks.
Int. J. Crit. Comput. Based Syst., 2010

PKI-based trust management in inter-domain scenarios.
Comput. Secur., 2010

2009
Parallelizing the Design and Development of a Monitoring System.
Proceedings of the Cooperative Design, 2009

2008
Secure overlay networks for federated service provision and management.
Comput. Electr. Eng., 2008

Event-Driven Architecture for Intrusion Detection Systems Based on Patterns.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Design-Time Learning for Operational Planning Improvement.
Proceedings of the Second International Conference on Emerging Security Information, 2008

ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

2007
A Linguistic Fuzzy-XCS Classifier System.
Proceedings of the FUZZ-IEEE 2007, 2007

A Proposal for the Definition of Operational Plans to Provide Dependability and Security.
Proceedings of the Critical Information Infrastructures Security, 2007

2005
Providing advanced authentication services in IPv6 muti-domain scenarios.
Int. J. Internet Protoc. Technol., 2005

Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...