Renzo E. Navas

Orcid: 0000-0002-8784-7444

According to our database1, Renzo E. Navas authored at least 14 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Dissecting 5G New-Radio Latency: Interacting Layers and Latency-Generating Operations.
Proceedings of the 2025 IFIP Networking Conference, Limassol, Cyprus, 26-30 May 2025., 2025

Towards Context-aware Intrusion Detection in Individual-oriented Information Systems: An Empirical Study on Android Malware.
Proceedings of the 21st International Conference on Network and Service Management, 2025

2024
Lightweight Security for IoT Systems leveraging Moving Target Defense and Intrusion Detection.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Energy-Aware Spreading Factor Selection in LoRaWAN Using Delayed-Feedback Bandits.
Proceedings of the IFIP Networking Conference, 2023

2021
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT.
IEEE Internet Things J., 2021

Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming.
Comput. Networks, 2021

2020
Improving the resilience of the constrained Internet of Things: a moving target defense approach. (Amélioration de la résilience de l'internet des objets contraint).
PhD thesis, 2020

Watch out! Doxware on the way...
J. Inf. Secur. Appl., 2020

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2018
LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2016
Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2015
Handover triggering in IEEE 802.11 networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015


  Loading...