Ruben Rios

Orcid: 0000-0002-6251-4897

Affiliations:
  • University of Malaga, Spain


According to our database1, Ruben Rios authored at least 30 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A survey on the (in)security of trusted execution environments.
Comput. Secur., June, 2023

An empirical evaluation of BLE for ITS scenarios.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

2022
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 2022

Personal IoT Privacy Control at the Edge.
IEEE Secur. Priv., 2022

2020
Distributed Detection of APTs: Consensus vs. Clustering.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Immune System for the Internet of Things Using Edge Technologies.
IEEE Internet Things J., 2019

Edge-Assisted Vehicular Networks Security.
IEEE Internet Things J., 2019

Cybersecurity profiles based on human-centric IoT devices.
Hum. centric Comput. Inf. Sci., 2019

Privacy-aware digital forensics.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.
Sensors, 2018

Modelling privacy-aware trust negotiations.
Comput. Secur., 2018

Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018

2017
Evolving privacy: From sensors to the Internet of Things.
Future Gener. Comput. Syst., 2017

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Methodology for Privacy-Aware IoT-Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Query Privacy in Sensing-as-a-Service Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

From SMOG to Fog: A security perspective.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

2016
Privacy-Aware Trust Negotiation.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Location Privacy in Wireless Sensor Networks.
CRC Press / Taylor & Francis, ISBN: 9781498776332, 2016

2015
Probabilistic receiver-location privacy protection in wireless sensor networks.
Inf. Sci., 2015

2014
Preserving Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2014

2013
(Un)Suitability of Anonymous Communication Systems to WSN.
IEEE Syst. J., 2013

Covert communications through network configuration messages.
Comput. Secur., 2013

A privacy-aware continuous authentication scheme for proximity-based access control.
Comput. Secur., 2013

Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

2012
HIDE_DHCP: Covert Communications through Network Configuration Messages.
Proceedings of the Information Security and Privacy Research, 2012

Indistinguishable regions in geographic privacy.
Proceedings of the ACM Symposium on Applied Computing, 2012

Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Analysis of location privacy solutions in wireless sensor networks.
IET Commun., 2011

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks.
Comput. J., 2011


  Loading...