Jorge Blasco Alís
Título
Citado por
Citado por
Año
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
2512014
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
1152016
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
612014
A multi-agent scanner to detect stored-XSS vulnerabilities
E Galán, A Alcaide, A Orfila, J Blasco
International Conference for Internet Technology and Secured Transactions …, 2010
482010
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
322014
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
312016
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
272011
Automated generation of colluding apps for experimental research
J Blasco, TM Chen
Journal of Computer Virology and Hacking Techniques 14 (2), 127-138, 2018
262018
Improving network intrusion detection by means of domain-aware genetic programming
J Blasco, A Orfila, A Ribagorda
International Conference on Availability, Reliability, and Security (ARES …, 2010
242010
A framework for avoiding steganography usage over HTTP
J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
232012
On the feasibility of low-cost wearable sensors for multi-modal biometric verification
J Blasco, P Peris-Lopez
Sensors 18 (9), 2782, 2018
222018
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
212009
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape
P Sivakumaran, J Blasco
28th USENIX Security Symposium (USENIX Security 19), 2019
192019
Intrusion Detection
TM Chen, J Blasco, J Alzubi, O Alzubi
IET Engineering & Technology Reference, 1-9, 2014
192014
Towards Automated Android App Collusion Detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Innovations in Mobile Privacy and Security 1575, 29-37, 2016
182016
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
182014
Bypassing information leakage protection with trusted applications
J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda
Computers & Security 31 (4), 557–568, 2012
182012
A review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
J Qadri, TM Chen, J Blasco
International Journal on Cyber Situational Awareness 1 (1), 2016
142016
Hindering data theft with encrypted data trees
J Blasco, JE Tapiador, P Peris-Lopez, G Suarez-Tangil
Journal of Systems and Software 101, 147-158, 2015
122015
A low energy profile: Analysing characteristic security on ble peripherals
P Sivakumaran, J Blasco Alis
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
112018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20