Marta Beltrán

Orcid: 0000-0002-1689-7479

According to our database1, Marta Beltrán authored at least 50 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics.
Inf. Comput. Secur., 2024

Implications of Age Assurance on Privacy and Data Protection: A Systematic Threat Model - Research Paper.
Proceedings of the Privacy Technologies and Policy - 12th Annual Privacy Forum, 2024

2023
A privacy threat model for identity verification based on facial recognition.
Comput. Secur., September, 2023

Cybersecurity in the digital world.
Future Gener. Comput. Syst., July, 2023

2022
Combining user behavioural information at the feature level to enhance continuous authentication systems.
Knowl. Based Syst., 2022

A Model For risk-Based adaptive security controls.
Comput. Secur., 2022

An Adaptive Web Application Firewall.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
An approach to detect user behaviour anomalies within identity federations.
Comput. Secur., 2021

A survey for user behavior analysis based on machine learning techniques: current models and applications.
Appl. Intell., 2021

Protecting End User's Privacy When using Social Login through GDPR Compliance.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Remote Attestation as a Service for Edge-Enabled IoT.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
Edge-centric delegation of authorization for constrained devices in the Internet of Things.
Comput. Commun., 2020

Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Understanding and mitigating OpenID Connect threats.
Comput. Secur., 2019

Potential Impacts in Citizens' Privacy of using Federated Identity Management to Offer e-Government Services.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things.
Comput. Secur., 2018

2017
Federated system-to-service authentication and authorization combining PUFs and tokens.
Proceedings of the 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2017

2016
BECloud: A new approach to analyse elasticity enablers of cloud services.
Future Gener. Comput. Syst., 2016

Defining an Elasticity Metric for Cloud Computing Environments.
EAI Endorsed Trans. Cloud Syst., 2016

2015
Automatic provisioning of multi-tier applications in cloud computing environments.
J. Supercomput., 2015

Mobile Cloud Computing to Provide Mobiquity as a Service on Telecommunication Vertical Clouds.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

2014
Centralized Optical-Frequency-Comb-Based RF Carrier Generator for DWDM Fiber-Wireless Access Systems.
JOCN, 2014

Extending the JCR standard to work efficiently in mobile RCS environments.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Solving Queueing Network Models in Cloud Provisioning Contexts.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

2013
Performance evaluation for DFB and VCSEL-based 60 GHz radio-over-fiber system.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013

Fiber-supported 60 GHz mobile backhaul links for access/metropolitan deployment.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013

DWDM fiber-wireless access system with centralized optical frequency comb-based RF carrier generation.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

Using CloudSim to learn cloud computing architecture/system concepts in a graduate course.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

The importance of the avatar gender in training simulators based on virtual reality.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

2012
An automatic machine scaling solution for cloud systems.
Proceedings of the 19th International Conference on High Performance Computing, 2012

2011
Performance of a 60-GHz DCM-OFDM and BPSK-Impulse Ultra-Wideband System with Radio-Over-Fiber and Wireless Transmission Employing a Directly-Modulated VCSEL.
IEEE J. Sel. Areas Commun., 2011

A Simulation Framework To Help In Lean Manufacturing Initiatives.
Proceedings of the 25th European Conference on Modelling and Simulation, 2011

2010
High level performance metrics for FPGA-based multiprocessor systems.
Perform. Evaluation, 2010

Defining the entity transfer interoperability reference model for military applications.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
LDAP Injection Techniques.
Wirel. Sens. Netw., 2009

The Impact of Workload Variability on Load Balancing Algorithms.
Scalable Comput. Pract. Exp., 2009

How to Balance the Load on Heterogeneous Clusters.
Int. J. High Perform. Comput. Appl., 2009

Experimental Analysis of 3.5 GHz WiMAX 802.16e Interference in WiMedia-defined UWB Radio Transmissions.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Using Simulation For Decision Making In Zero Latency Enterprise Projects.
Proceedings of the European Conference on Modelling and Simulation, 2009

Scalability Analysis to Optimize a Network on Chip.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A New CPU Availability Prediction Model for Time-Shared Systems.
IEEE Trans. Computers, 2008

Designing HIPAOC: High Performance Architecture On Chip.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Designing Load Balancing Algorithms Capable of Dealing with Workload Variability.
Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC 2008), 2008

2006
Dealing with Heterogeneity in Load Balancing Algorithms.
Proceedings of the 5th International Symposium on Parallel and Distributed Computing (ISPDC 2006), 2006

2005
Initiating Load Balancing Operations.
Proceedings of the Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30, 2005

Information policies for load balancing on heterogeneous systems.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Resource Dissemination Policies on Grids.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Estimating a Workstation CPU Assignment with the DYPAP Monitor.
Proceedings of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 2004

2003
Dynamic Tasks Assignment for Real Heterogeneous Clusters.
Proceedings of the Parallel Processing and Applied Mathematics, 2003

Predicting the Response Time of a New Task on a Beowulf Cluster.
Proceedings of the Parallel Processing and Applied Mathematics, 2003


  Loading...