Miguel Vargas Martin

Orcid: 0000-0001-8169-6836

According to our database1, Miguel Vargas Martin authored at least 78 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
Emotion recognition models for companion robots.
J. Supercomput., 2022

Targeted Honeyword Generation with Language Models.
CoRR, 2022

HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases.
CoRR, 2021

SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Fool Me Once: A Study of Password Selection Evolution over the Past Decade.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

A More Effective Sentence-Wise Text Segmentation Approach Using BERT.
Proceedings of the 16th International Conference on Document Analysis and Recognition, 2021

A Novel Short-term Post-accident Traffic Prediction Model.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

2020
Artificial Empathy for Clinical Companion Robots with Privacy-By-Design.
Proceedings of the Wireless Mobile Communication and Healthcare, 2020

2019
Inside out - A study of users' perceptions of password memorability and recall.
J. Inf. Secur. Appl., 2019

Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to.
Int. J. Inf. Sec., 2019

On the null relationship between personality types and passwords.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Towards Classifying Motor Imagery Using a Consumer-Grade Brain-Computer Interface.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

Using EEG to Predict and Analyze Password Memorability.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

2018
3D-RadVis Antenna: Visualization and performance measure for many-objective optimization.
Swarm Evol. Comput., 2018

Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition.
Comput. Entertain., 2018

Enhanced Correlation Matrix Based Visualization for Multi- and Many-objective optimization.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Facial Expression Detection Employing a Brain Computer Interface.
Proceedings of the 9th International Conference on Information, 2018

(WKSP) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Classification of EEG Signals Using Neural Networks to Predict Password Memorability.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Can an Evidence-Based Blended Learning Model Serve Healthcare Patients and Adult Education Students?
Proceedings of the Blended Learning. Enhancing Learning Success, 2018

Reinforcing System-Assigned Passphrases Through Implicit Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
System-Assigned Passwords You Can't Write Down, But Don't Need To.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A brain-computer interface to examine the effects of sound on a haptic-based virtual drilling task.
Proceedings of the 8th International Conference on Information, 2017

Use of Machine Learning for Detection of Unaware Facial Recognition Without Individual Training.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Excuse Me, Do I Know You From Somewhere? Unaware Facial Recognition Using Brain-Computer Interfaces.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Fusion of Many-Objective Non-dominated Solutions Using Reference Points.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2017

Fusion-based hybrid many-objective optimization algorithm.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Detection of Subconscious Face Recognition Using Consumer-Grade Brain-Computer Interfaces.
ACM Trans. Appl. Percept., 2016

Validating Design Patterns for Mobile Groupware Applications by Expert Users: a USAER Case.
Computación y Sistemas, 2016

Evaluating a sound-enhanced intrusion detection system to identify network congestion.
Proceedings of the 24th Mediterranean Conference on Control and Automation, 2016

EliteNSGA-III: An improved evolutionary many-objective optimization algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

3D-RadVis: Visualization of Pareto front in many-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2016

Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs.
Proceedings of the 7th International Conference on Ambient Systems, 2016

Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

What Really Works in Hybrid Learning: A Cognitive Perspective.
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015

Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
MDE: Differential evolution with merit-based mutation strategy.
Proceedings of the 2014 IEEE Symposium on Differential Evolution, 2014

Crypto-assistant: Towards facilitating developer's encryption of sensitive data.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Classification of Design Patterns to Support Mobile Groupware Systems.
Proceedings of the 5th Mexican Conference on Human-Computer Interaction, 2014

Personalized-Adaptive Learning - A Model for CIT Curricula.
Proceedings of the Hybrid Learning. Theory and Practice - 7th International Conference, 2014

Detection of side-channel communication in ad hoc networks using request to send (RTS) messages.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

Simulated Raindrop algorithm for global optimization.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

Automatic Hotlink Insertion in Live Production Websites.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
MISSED - Studying Students' Development of Misconceptions in Hybrid Courses.
Proceedings of the Hybrid Learning and Continuing Education - 6th International Conference, 2013

Navdriver: Adaptive Websites via SaaS.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2011
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Evidence-Based Educational Practices and a Theoretical Framework for Hybrid Learning.
Proceedings of the Hybrid Learning - 4th International Conference, 2011

2010
ROAD-MAP for Educational Simulations and Serious Games.
Proceedings of the Hybrid Learning, Third International Conference, 2010

A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websites.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010

Unconscious mind: Authenticating with something you don't know? Or just an infallible liveness test?
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

Emerging trends in network forensics.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Web Service-Security Specification based on Usability Criteria and Pattern Approach.
J. Comput., 2009

A methodology for designing information security feedback based on User Interface Patterns.
Adv. Eng. Softw., 2009

A frame handler module for a side-channel in mobile ad hoc networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

A Pattern Methodology to Specify Usable Security in Websites.
Proceedings of the Database and Expert Systems Applications, 2009

A measurement model for secure and usable e-commerce websites.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

Workshop on cybersecurity: security and privacy in the 21st century.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009

2008
Auditory Display as a Tool for Teaching Network Intrusion Detection.
Int. J. Emerg. Technol. Learn., 2008

A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria.
Proceedings of the Computer-Aided Design of User Interfaces VI, 2008

2007
Assigning Bookmarks in Perfect Binary Trees.
Ars Comb., 2007

Statiscal-based skin classifier for omni-directional images.
Proceedings of the VISAPP 2007: Proceedings of the Second International Conference on Computer Vision Theory and Applications, Barcelona, Spain, March 8-11, 2007, 2007

Toward Sound-Assisted Intrusion Detection Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Monitoreo del Desempeño de los Factores de Seguridad de una Transacción Web a través de la Interfaz de Usuario.
Proceedings of the VI Jornadas Iberoamericanas de Ingeniería del Software e Ingeniería del Conocimiento-JIISIC'07, 2007

Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A monitoring system for detecting repeated packets with applications to computer worms.
Int. J. Inf. Sec., 2006

A classification of security patterns for the transactions between a requester, an intermediary, and a web-service.
Proceedings of the Third IASTED International Conference on Communication, 2006

Security Issues in VOIP Applications.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

Toward New Paradigms to Combating Internet Child Pornography.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2003
Optimizing Web Server's Data Transfer with Hotlinks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
The Hotlink Optimizer.
Proceedings of the International Conference on Internet Computing, 2002

2000
Strategies for Hotlink Assignments.
Proceedings of the Algorithms and Computation, 11th International Conference, 2000


  Loading...