Félix Gómez Mármol
Orcid: 0000-0002-6424-3322
According to our database1,
Félix Gómez Mármol
authored at least 93 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Identifying professional photographers through image quality and aesthetics in Flickr.
Expert Syst. J. Knowl. Eng., April, 2024
Computational approaches to detect experts in distributed online communities: a case study on Reddit.
Clust. Comput., April, 2024
Adapting Knowledge Inference Algorithms to Measure Geometry Competencies through a Puzzle Game.
ACM Trans. Knowl. Discov. Data, January, 2024
Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections.
Inf. Fusion, 2024
A Big Data architecture for early identification and categorization of dark web sites.
Future Gener. Comput. Syst., 2024
A multimodal study of the interplay between stress, executive function, and biometrics in game-based assessment.
Expert Syst. Appl., 2024
SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies.
CoRR, 2024
2023
Evaluating different configurations of machine learning models and their transfer learning capabilities for stress detection using heart rate.
J. Ambient Intell. Humaniz. Comput., 2023
A Survey on Data-Driven Evaluation of Competencies and Capabilities Across Multimedia Environments.
Int. J. Interact. Multim. Artif. Intell., 2023
Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision.
CoRR, 2023
Proceedings of the Tenth ACM Conference on Learning @ Scale, 2023
2022
Spotting political social bots in Twitter: a dataset for the 2019 Spanish general election.
Dataset, May, 2022
IEEE Internet Comput., 2022
Identifying Experts in Question & Answer Portals: A Case Study on Data Science Competencies in Reddit.
CoRR, 2022
2021
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments.
Peer-to-Peer Netw. Appl., 2021
J. Biomed. Informatics, 2021
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices.
J. Inf. Secur. Appl., 2021
IEEE Internet Comput., 2021
Complex., 2021
Complex., 2021
Clust. Comput., 2021
A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection.
IEEE Access, 2021
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020
BlockSIEM: Protecting Smart City Services through a Blockchain-based and Distributed SIEM.
Sensors, 2020
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends.
IEEE Access, 2020
2019
Sensors, 2019
Sensors, 2019
Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019
IEEE Commun. Mag., 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
<i>B</i> SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Symmetry, 2018
Dendron : Genetic trees driven rule induction for network intrusion detection systems.
Future Gener. Comput. Syst., 2018
Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
2017
Knowl. Inf. Syst., 2017
2016
Int. J. Inf. Sec., 2016
Dynamic counter-measures for risk-based access control systems: An evolutive approach.
Future Gener. Comput. Syst., 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015
Dynamic and flexible selection of a reputation mechanism for heterogeneous environments.
Future Gener. Comput. Syst., 2015
Concurr. Comput. Pract. Exp., 2015
Towards privacy-preserving reputation management for hybrid broadcast broadband applications.
Comput. Secur., 2015
Comput. Secur., 2015
Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition).
Comput. Electr. Eng., 2015
Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2014
To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management.
Wirel. Pers. Commun., 2014
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014
J. Inf. Secur. Appl., 2014
Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Comput., 2014
Comput. Stand. Interfaces, 2014
CoRR, 2014
Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition).
Comput. Electr. Eng., 2014
Comput. Electr. Eng., 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
2013
Wirel. Pers. Commun., 2013
RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013
Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments.
IEEE Secur. Priv., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Special issue on Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2013
2012
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks.
J. Netw. Comput. Appl., 2012
Concurr. Comput. Pract. Exp., 2012
IEEE Commun. Mag., 2012
Introduction to Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
2011
Telecommun. Syst., 2011
Intell. Autom. Soft Comput., 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
2010
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems.
Comput. Stand. Interfaces, 2010
Comput. Networks, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Comput. Secur., 2009
Proceedings of IEEE International Conference on Communications, 2009