David Arroyo
Orcid: 0000-0001-8894-9779
According to our database1,
David Arroyo
authored at least 51 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024
A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components.
CoRR, 2024
XAI-DisInfodemics: eXplainable AI for disinformation and conspiracy detection during infodemics.
Proceedings of the Seminar of the Spanish Society for Natural Language Processing: Projects and System Demonstrations (SEPLN-CEDI-PD 2024) co-located with the 7th Spanish Conference on Informatics (CEDI 2024), 2024
2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Blockchain and Applications, 5th International Congress, 2023
2022
Evol. Syst., 2022
Following Negationists on Twitter and Telegram: Application of NCD to the Analysis of Multiplatform Misinformation Dynamics.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
Proceedings of the Disinformation in Open Online Media, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Proceedings of the Blockchain and Applications, 4th International Congress, 2022
Rumor and clickbait detection by combining information divergence measures and deep learning techniques.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Future Gener. Comput. Syst., 2021
Building A blockchain-based decentralized digital asset management system for commercial aircraft leasing.
Comput. Ind., 2021
2020
On the application of compression-based metrics to identifying anomalous behaviour in web traffic.
Log. J. IGPL, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the Blockchain and Applications - 2nd International Congress, 2020
2019
A compression based framework for the detection of anomalies in heterogeneous data sources.
CoRR, 2019
Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.
Proceedings of the Computer and Network Security Essentials., 2018
2017
Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features.
Int. J. Bifurc. Chaos, 2017
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
2016
Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges.
CoRR, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the International Joint Conference, 2015
On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities.
Proceedings of the International Joint Conference, 2015
2014
Knowl. Based Syst., 2014
A formal methodology for integral security design and verification of network protocols.
J. Syst. Softw., 2014
Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps.
Commun. Nonlinear Sci. Numer. Simul., 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
2013
Signal Process., 2013
Application of symbolic dynamics to characterize coordinated activity in the context of biological neural networks.
J. Frankl. Inst., 2013
2012
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
CoRR, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
Proceedings of the Chaos-Based Cryptography - Theory, Algorithms and Applications, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
Int. J. Bifurc. Chaos, 2010
2009
A general view of pseudoharmonics and pseudoantiharmonics to calculate external arguments of Douady and Hubbard.
Appl. Math. Comput., 2009
2008
CoRR, 2008
Drawing and computing external rays in the multiple-spiral medallions of the Mandelbrot set.
Comput. Graph., 2008
2007
CoRR, 2007