Ignacio Sanchez

Orcid: 0000-0001-6650-5683

According to our database1, Ignacio Sanchez authored at least 24 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Liability Regimes in the Age of AI: a Use-Case Driven Analysis of the Burden of Proof.
J. Artif. Intell. Res., 2023

The potential of large language models for improving probability learning: A study on ChatGPT3.5 and first-year computer engineering students.
CoRR, 2023

2021
Nonlinear Model Predictive Path Following Controller with Obstacle Avoidance.
J. Intell. Robotic Syst., 2021

The CoronaSurveys System for COVID-19 Incidence Data Collection and Processing.
Frontiers Comput. Sci., 2021

Characterization and computation of control invariant sets within target regions for linear impulsive control systems.
CoRR, 2021

2020
What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security.
IEEE Access, 2020

Modelling GOP Structure Effects on ENF-Based Video Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

2019
Improved Forensic Recovery of PKZIP Stream Cipher Passwords.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Obstacle Avoiding Path Following based on Nonlinear Model Predictive Control using Artificial Variables.
Proceedings of the 19th International Conference on Advanced Robotics, 2019

Cyber Chronix, Participatory Research Approach to Develop and Evaluate a Storytelling Game on Personal Data Protection Rights and Privacy Risks.
Proceedings of the Games and Learning Alliance - 8th International Conference, 2019

2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Inf. Forensics Secur., 2017

A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017

Reducing the Risk of Accidents with Not Insured British Vehicles in Southern Spain.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017

The Smart World Revolution.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Improved cryptanalysis of the DECT standard cipher.
J. Cryptogr. Eng., 2016

Technical recommendations for improving security of email communications.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

2015
Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios.
Secur. Commun. Networks, 2015

Detection of DECT identity spoofing through radio frequency fingerprinting.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Privacy leakages in Smart Home wireless technologies.
Proceedings of the International Carnahan Conference on Security Technology, 2014

A probabilistic framework for improved password strength metrics.
Proceedings of the International Carnahan Conference on Security Technology, 2014


  Loading...