Ana Nieto

Orcid: 0000-0003-2826-9119

According to our database1, Ana Nieto authored at least 29 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Detecting Recent Changes of Ice-Free Extensions on Livingston Island, Northern Antarctic Peninsula Region Using Landsat Data.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

Characterizing the Ice-Free Area of Cierva Point (Antarctic Peninsula) Using Reflectance Spectroscopy.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Becoming JUDAS: Correlating Users and Devices During a Digital Investigation.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation.
Mob. Networks Appl., 2019

Cybersecurity profiles based on human-centric IoT devices.
Hum. centric Comput. Inf. Sci., 2019

Privacy-aware digital forensics.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.
Sensors, 2018

A Comprehensive Methodology for Deploying IoT Honeypots.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Using Reflectance Spectroscopy to Characterize Surface Landforms and Volcanic Deposits on Deception Island (Antarctica).
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Advances in Mapping Ice-Free Surfaces within the Northern Antarctic Peninsula Region using Polarimetric Radarsat-2 Data.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

An Overview of Proactive Forensic Solutions and its Applicability to 5G.
Proceedings of the IEEE 5G World Forum, 2018

2017
Dynamic Knowledge-Based Analysis in Nonsecure 5G Green Environments Using Contextual Data.
IEEE Syst. J., 2017

Digital Witness and Privacy in IoT: Anonymous Witnessing Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Methodology for Privacy-Aware IoT-Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Modeling Malware-driven Honeypots.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

2016
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Netw., 2016

Digital Witness: Digital Evidence Management Framework for the Internet of Things.
ERCIM News, 2016

2015
Relay selection for secure 5G green communications.
Telecommun. Syst., 2015

Contextualising heterogeneous information in unified communications with security restrictions.
Comput. Commun., 2015

Distribution of glacial and periglacial features within ice-free areas surrounding Maxwell Bay (South Shetland Islands) using polarimetric RADARSAT-2 data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

2014
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet.
Secur. Commun. Networks, 2014

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
Mob. Networks Appl., 2014

Security and QoS tradeoff recommendation system (SQT-RS) for dynamic assessing CPRM-based systems.
Proceedings of the Q2SWinet'14, 2014

A Context-based Parametric Relationship Model (CPRM) to measure the Security and QoS tradeoff in configurable environments.
Proceedings of the IEEE International Conference on Communications, 2014

Evaluation of Dynamic Instantiation in CPRM-Based Systems.
Proceedings of the Risks and Security of Internet and Systems, 2014

2012
Security and QoS Tradeoffs: Towards a FI Perspective.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Traffic Classifier for Heterogeneous and Cooperative Routing through Wireless Sensor Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012


  Loading...