selected publications
-
issue
- Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science. 2014
-
academic article
- ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks. Journal of Information Security and Applications. 85:103840-103840. 2024
- A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. . 2024
- On the self-adjustment of privacy safeguards for query log streams. Computers & Security. 134:103450-103450. 2023
- Cyber-physical defense in the quantum Era. Scientific Reports. 12. 2022
- 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?. Digitale Welt. 5:34-39. 2021
- 1. Quantum Applications - Inhalt. Digitale Welt. 5:14-15. 2021
- Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access. 9:46462-46475. 2021
- The Quantum What? Advantage, Utopia or Threat?. Digitale Welt. 2021
- Stateful RORI-based countermeasure selection using hypergraphs. Journal of Information Security and Applications. 54:102541-102541. 2020
- Stateful RORI-based countermeasure selection using hypergraphs. Journal of Information Security and Applications. 54:102562-102562. 2020
- A Real-Time Query Log Protection Method for Web Search Engines. IEEE Access. 8:87393-87413. 2020
- Switched-Based Resilient Control of Cyber-Physical Systems. IEEE Access. 8:212194-212208. 2020
- Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing. 14:14979-14993. 2019
- Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications. Transactions on Emerging Telecommunications Technologies. 30. 2019
- Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition). Computers & Electrical Engineering. 71:1040-1042. 2018
- Integration of an adaptive trust-based e-assessment system into virtual learning environments-The TeSLA project experience. Internet Technology Letters. 1. 2018
- Cyber‐physical architecture assisted by programmable networking. Internet Technology Letters. 1. 2018
- Hypergraph-driven mitigation of cyberattacks. Internet Technology Letters. 1. 2018
- Secure Localization in the Presence of Colluders in WSNs. Sensors. 17:1892-1892. 2017
- On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP Journal on Information Security. 2017. 2017
- Introduction to the Special Section on Critical Systems Modelling and Security. Computers & Electrical Engineering. 59:73-75. 2017
- A polytope-based approach to measure the impact of events against critical infrastructures. Journal of Computer and System Sciences. 83:3-21. 2016
- Channel selection using a multiple radio model. Journal of Network and Computer Applications. 64:113-123. 2016
- Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481. . 2015
- Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. Computers & Electrical Engineering. 47:13-34. 2015
- Remarks on Peinado et al.’s Analysis of J3Gen. Sensors. 15:6217-6220. 2015
- Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention. Electronic Proceedings in Theoretical Computer Science. 165. 2014
- Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247. . 2013
- Editorial. Journal of Information Security and Applications. 18:1-1. 2013
- KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications. 39:152-166. 2013
- J3Gen: A PRNG for Low-Cost Passive RFID. Sensors. 13:3816-3830. 2013
- Management of stateful firewall misconfiguration. Computers & Security. 39:64-85. 2013
- A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. Journal of Network and Computer Applications. 36:744-755. 2013
- On the similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on Emerging Telecommunications Technologies. 25:151-154. 2012
- Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security. . 2011
- A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags. Wireless Personal Communications. 59:27-42. 2010
- Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes. Annals of Telecommunications. 66:535-552. 2010
- Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security. . 2010
- Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications. 61:197-217. 2006
-
blog posting
- Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access. arXiv (Cornell University). 2025
- Cyber-Resilience Approaches for Cyber-Physical Systems. arXiv (Cornell University). 2023
- Misconfiguration Management of Network Security Components. arXiv (Cornell University). 2019
- Cyber-Physical Architecture Assisted by Programmable Networking 2018
- Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks. arXiv (Cornell University). 2015
-
book
- Computer Security. ESORICS 2023 International Workshops 2024
- Foundations and Practice of Security 2024
- Foundations and Practice of Security 2024
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2023
- Foundations and Practice of Security 2023
- Foundations and Practice of Security 2022
- Foundations and Practice of Security 2021
- Risks and Security of Internet and Systems 2021
- Security and Privacy in Communication Networks 2021
- Security and Privacy in Communication Networks 2021
- Computer Security 2020
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2020
- Foundations and Practice of Security 2019
- Security and Safety Interplay of Intelligent Software Systems 2019
- Security and safety interplay of intelligent software systems: ESORICS 2018 international workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, revised selected papers 2019
- Data Privacy Management, Cryptocurrencies and Blockchain Technology 2018
- Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2018 international workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, proceedings 2018
- Foundations and Practice of Security 2018
- Risks and Security of Internet and Systems 2018
- ATC 2016 : 13th Annual International Conference on Advanced and Trusted Computing 2016
- Data Privacy Management, and Security Assurance 2016
- Research in Attacks, Intrusions, and Defenses 2016
- Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 2015
- Data privacy management, autonomous spontaneous security, and security assurance : 9th international workshop, DPM 2014, 7th international workshop, SETOP 2014, and 3rd international workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014 : revised selected papers 2015
- FPS 2014 : 7th International Symposium on Foundations and Practice of Security : revised selected papers 2015
- 2014 Twelfth annual conference on privacy, security and trust 2014
- Proceedings 2014 : International Workshop on Advanced Intrusion Detection and Prevention 2014
- Data Privacy Management and Autonomous Spontaneus Security 2012
- Data Privacy Management and Autonomous Spontaneous Security 2011
-
chapter
- Quantifying the Impact Propagation of Cyber Attacks Using Business Logic Modeling. Lecture notes in computer science. 49-71. 2024
- Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems. Springer eBooks. 347-370. 2022
- Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition. Lecture notes in computer science. 55-70. 2020
- Security and Privacy in the TeSLA Architecture. Lecture notes on data engineering and communications technologies. 85-108. 2019
- Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band. Ad Hoc Networks. 3-12. 2018
- Lifelogging Protection Scheme for Internet-Based Personal Assistants. Lecture notes in computer science. 431-440. 2018
- Low Frequency Mobile Communications in Underwater Networks. Lecture notes in computer science. 239-251. 2018
- The Sound of Communication in Underwater Acoustic Sensor Networks. Ad Hoc Networks. 13-23. 2018
- Towards a Security Event Data Taxonomy. Lecture notes in computer science. 29-45. 2018
- $$\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme. Lecture notes in computer science. 239-256. 2017
- An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. Lecture notes in computer science. 87-102. 2017
- Anonymous Certification for an e-Assessment Framework. Lecture notes in computer science. 70-85. 2017
- Security of Cyber-Physical Systems. Lecture notes in computer science. 3-18. 2017
- Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks. Lecture notes in computer science. 3-19. 2016
- Towards an Automated and Dynamic Risk Management Response System. Lecture notes in computer science. 37-53. 2016
- Automated Classification of C&C Connections Through Malware URL Clustering. IFIP advances in information and communication technology. 252-266. 2015
- Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. IFIP advances in information and communication technology. 218-233. 2015
- Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. Security and Privacy in Communication Networks. 538-555. 2015
- Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks. Studies in computational intelligence. 303-324. 2014
- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. Lecture notes in computer science. 209-226. 2014
- Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks. Lecture notes in computer science. 197-208. 2014
- Model-Driven Extraction and Analysis of Network Security Policies. Lecture notes in computer science. 52-68. 2013
- Towards an Access-Control Metamodel for Web Content Management Systems. Lecture notes in computer science. 148-155. 2013
- A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. Lecture notes in computer science. 208-217. 2012
- Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol. Lecture notes in computer science. 118-131. 2012
- Security Issues in Link State Routing Protocols for MANETs. Mathematics in industry. 117-148. 2012
- MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies. Lecture notes in computer science. 203-215. 2011
- Amapola: A Simple Infrastructure for Ubiquitous Computing. Springer eBooks. 77-86. 2006
-
conference paper
- SHIELD : assessing security-by-design in federated data spaces using attack graphs. . 2025
- Platelet: Pioneering Security and Privacy Compliant Simulation for Intelligent Transportation Systems and V2X. . 61-67. 2024
- Entrenamiento bajo demanda en competencias de ciberseguridad en redes sociales. . 2023
- Metodología para automatizar agentes atacantes en plataformas de entrenamiento Cyber Range. . 2023
- Gestion des menaces biologiques et technologiques pour la sécurité urbaine (Projet H2020 IMPETUS). . 2023
- Technical Program Committee. . 1-4. 2021
- Risky Zone Avoidance Strategies for Drones. . 1-6. 2021
- Pilot Contamination Attack Detection in 5G Massive MIMO Systems Using Generative Adversarial Networks. . 479-484. 2021
- Capacity Requirements in Networks of Quantum Repeaters and Terminals. 2022 IEEE International Conference on Quantum Computing and Engineering (QCE). 148-157. 2020
- Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks. 2022 IEEE Globecom Workshops (GC Wkshps). 1-6. 2019
- Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles. 2022 IEEE Globecom Workshops (GC Wkshps). 1-6. 2019
- Geocaching-inspired Resilient Path Planning for Drone Swarms. IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 620-625. 2019
- The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications. HAL (Le Centre pour la Communication Scientifique Directe). 2018
- A Pyramidal-based Model to Compute the Impact of Cyber Security Events. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-10. 2018
- Learning to Communicate Underwater. . 1-5. 2017
- PCS, a privacy-preserving certification scheme. . 2017
- Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. 2015 IEEE Trustcom/BigDataSE/ISPA. 340-348. 2016
- Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks. . 21-28. 2016
- Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. . 137-146. 2016
- CACEV: A Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds. . 275-282. 2016
- Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). . 1-6. 2015
- Location-free link state routing for underwater acoustic sensor networks. . 1544-1549. 2015
- Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. . 30-39. 2014
- The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model. 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 1-5. 2014
- A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model. . 1590-1595. 2014
- Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. . 113-120. 2014
- A new analytic model for the cognitive radio jump-stay algorithm. . 1-3. 2013
- QoS and security in Link State Routing protocols for MANETs. . 1-6. 2013
- Fine-grained privacy control for the RFID middleware of EPCglobal networks. . 60-67. 2013
- Revised Selected Papers of the 6th International Symposium on Foundations and Practice of Security - Volume 8352. Foundations and Practice of Security. 2013
- Privacy-enhanced filtering and collection middleware in EPCglobal networks. . 1-8. 2013
- Attribute-Based Mining Process for the Organization-Based Access Control Model. . 421-430. 2013
- Real-time malicious fast-flux detection using DNS and bot related features. . 369-372. 2013
- Proceedings of the 5th international conference on Foundations and Practice of Security. Foundations and Practice of Security. 2012
- System architecture for collaborative security and privacy monitoring in multi-domain networks. . 1-6. 2011
- Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks. . 167-174. 2011
- Mitigation of topology control traffic attacks in OLSR networks. . 1-8. 2010
- RFID EPC-Gen2 for postal applications: A security and privacy survey. . 118-123. 2010
- Evaluation of Two Privacy-Preserving Protocols for the DNS. . 411-416. 2009
-
proceedings
-
report
- Quantum computing assisted medium access control for multiple client station networks. HAL (Le Centre pour la Communication Scientifique Directe). 2015