Gregorio Martínez Pérez

Orcid: 0000-0001-5532-6604

Affiliations:
  • University of Murcia, Spain


According to our database1, Gregorio Martínez Pérez authored at least 230 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice.
Wirel. Networks, November, 2024

Mitigating communications threats in decentralized federated learning through moving target defense.
Wirel. Networks, November, 2024

Privacy-preserving hierarchical federated learning with biosignals to detect drowsiness while driving.
Neural Comput. Appl., November, 2024

Studying Drowsiness Detection Performance While Driving Through Scalable Machine Learning Models Using Electroencephalography.
Cogn. Comput., May, 2024

Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.
Appl. Intell., April, 2024

FederatedTrust: A solution for trustworthy federated learning.
Future Gener. Comput. Syst., March, 2024

Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification.
Future Gener. Comput. Syst., March, 2024

Single-board device individual authentication based on hardware performance and autoencoder transformer models.
Comput. Secur., February, 2024

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT.
IEEE Trans. Inf. Forensics Secur., 2024

SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces.
IEEE Trans. Dependable Secur. Comput., 2024

Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

NeuronLab: BCI framework for the study of biosignals.
Neurocomputing, 2024

A Big Data architecture for early identification and categorization of dark web sites.
Future Gener. Comput. Syst., 2024

Fedstellar: A Platform for Decentralized Federated Learning.
Expert Syst. Appl., 2024

Corrigendum to "Fedstellar: A platform for decentralized federated learning" [Expert Syst. Appl. 242 (2024) 122861].
Expert Syst. Appl., 2024

De-VertiFL: A Solution for Decentralized Vertical Federated Learning.
CoRR, 2024

Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls.
CoRR, 2024

Robust Federated Learning for execution time-based device model identification under label-flipping attack.
Clust. Comput., 2024

Building Trust in the Era of 6G: A Level of Trust Assessment Function for Cloud Continuum.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024


Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Behavioral fingerprinting to detect ransomware in resource-constrained devices.
Comput. Secur., December, 2023

CGAPP: A continuous group authentication privacy-preserving platform for industrial scene.
J. Inf. Secur. Appl., November, 2023

Opportunities for standardization in emergency scenarios in the European Union.
Int. J. Medical Informatics, November, 2023

Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges.
ACM Comput. Surv., November, 2023

Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning.
Comput. Commun., November, 2023

On the gathering of Tor onion addresses.
Future Gener. Comput. Syst., August, 2023

LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers.
Internet Things, July, 2023

Intelligent and behavioral-based detection of malware in IoT spectrum sensors.
Int. J. Inf. Sec., June, 2023

Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.
IEEE Internet Things J., May, 2023

Analyzing the impact of Driving tasks when detecting emotions through brain-computer interfaces.
Neural Comput. Appl., April, 2023

A methodology to identify identical single-board computers based on hardware behavior fingerprinting.
J. Netw. Comput. Appl., March, 2023

Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces.
CoRR, 2023

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation.
CoRR, 2023

Single-board Device Individual Authentication based on Hardware Performance and Anomaly Detection for Crowdsensing Platforms.
CoRR, 2023

Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges.
IEEE Commun. Surv. Tutorials, 2023

Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity.
Commun. ACM, 2023

Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices.
Proceedings of the NOMS 2023, 2023

Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield.
Proceedings of the IEEE Military Communications Conference, 2023

Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices.
Proceedings of the IEEE International Conference on Communications, 2023

RansomAI: AI-Powered Ransomware for Stealthy Encryption.
Proceedings of the IEEE Global Communications Conference, 2023

Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Framework Quantifying Trustworthiness of Supervised Machine and Deep Learning Models.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware.
Dataset, May, 2022



Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022

A Supervised ML Biometric Continuous Authentication System for Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Design of a Security and Trust Framework for 5G Multi-domain Scenarios.
J. Netw. Syst. Manag., 2022

Profiling users and bots in Twitter through social media analysis.
Inf. Sci., 2022

SAFECAR: A Brain-Computer Interface and intelligent framework to detect drivers' distractions.
Expert Syst. Appl., 2022

Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges.
ACM Comput. Surv., 2022

Toward pre-standardization of reputation-based trust models beyond 5G.
Comput. Stand. Interfaces, 2022

When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns.
CoRR, 2022

A Security and Trust Framework for Decentralized 5G Marketplaces.
CoRR, 2022

Trust-as-a-Service: A reputation-enabled trust framework for 5G networks.
CoRR, 2022

Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario.
CoRR, 2022

CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors.
CoRR, 2022

Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities.
Comput. Secur., 2022

Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces.
Clust. Comput., 2022

Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Study of P300 Detection Performance by Different P300 Speller Approaches Using Electroencephalography.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022

Intelligent Fingerprinting to Detect Data Leakage Attacks on Spectrum Sensors.
Proceedings of the IEEE International Conference on Communications, 2022

RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021

SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021

S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information.
Sensors, 2021

Nothing to Hide? On the Security and Privacy Threats Beyond Open Data.
IEEE Internet Comput., 2021

BOTTER: A framework to analyze social bots in Twitter.
CoRR, 2021

Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology.
CoRR, 2021

Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized.
CoRR, 2021

Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities.
CoRR, 2021

Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets.
IEEE Commun. Surv. Tutorials, 2021

AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning.
Comput. Secur., 2021

Early DGA-based botnet identification: pushing detection to the edges.
Clust. Comput., 2021


2020


Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020

SELFNET 5G mobile edge computing infrastructure: Design and prototyping.
Softw. Pract. Exp., 2020

Scalable detection of botnets based on DGA: Efficient feature discovery process in machine learning techniques.
Soft Comput., 2020

A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms.
Sensors, 2020

UMUDGA: A dataset for profiling DGA-based botnet.
Comput. Secur., 2020

PROTECTOR: Towards the protection of sensitive data in Europe and the US.
Comput. Networks, 2020

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends.
IEEE Access, 2020

IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity.
IEEE Access, 2020

Cyberattacks on Miniature Brain Implants to Disrupt Spontaneous Neural Signaling.
IEEE Access, 2020

Visualizing educational game data: A case study of visualizations to support teachers.
Proceedings of the Learning Analytics Summer Institute Spain 2020: Learning Analytics. Time for Adoption?, 2020

AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

Welcome Messages from IEEE EUC 2020 Program Chairs.
Proceedings of the 18th IEEE International Conference on Embedded and Ubiquitous Computing, 2020

2019
Security, Privacy, and Trust for Cyberphysical-Social Systems.
Secur. Commun. Networks, 2019

Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019

Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019

Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Towards the autonomous provision of self-protection capabilities in 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019

Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019

Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges.
CoRR, 2019

Detection of economic denial of sustainability (EDoS) threats in self-organizing networks.
Comput. Commun., 2019

Screening Out Social Bots Interference: Are There Any Silver Bullets?
IEEE Commun. Mag., 2019

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Management Platform for Citizen's Data Protection Regulation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

5G-CAGE: A Context and Situational Awareness System for City Public Safety with Video Processing at a Virtualized Ecosystem.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

2018
Guest Editorial Deep Learning Models for Industry Informatics.
IEEE Trans. Ind. Informatics, 2018

Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018

Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System.
Sensors, 2018

Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition).
Comput. Electr. Eng., 2018

A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks.
IEEE Access, 2018

Real-time aggregation framework in a 5G SDN self-management environment.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Policy-based network slicing management for future mobile communications.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Catalog-Driven Services in a 5G SDN/NFV Self-Managed Environment.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
SecRBAC: Secure data in the Clouds.
IEEE Trans. Serv. Comput., 2017

OHT: Open and cross-platform GUI testing.
J. Intell. Fuzzy Syst., 2017

Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017

Enabling Highly Dynamic Mobile Scenarios with Software Defined Networking.
IEEE Commun. Mag., 2017

Introduction to the Special Section on Critical Systems Modelling and Security.
Comput. Electr. Eng., 2017

Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017

On the performance of a deep learning-based anomaly detection system for 5G networks.
Proceedings of the 2017 IEEE SmartWorld, 2017

Automatic monitoring management for 5G mobile networks.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
A lightweight framework for dynamic GUI data verification based on scripts.
Softw. Test. Verification Reliab., 2016

SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016

Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016

A Script-Based Prototyping Framework to Boost Agile-UX Developments.
J. Comput. Sci. Technol., 2016

Resolving privacy-preserving relationships over outsourced encrypted data storages.
Int. J. Inf. Sec., 2016

Dynamic counter-measures for risk-based access control systems: An evolutive approach.
Future Gener. Comput. Syst., 2016

MASTERY: A multicontext-aware system that preserves the users' privacy.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

I Don't Trust ICT: Research Challenges in Cyber Security.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015

Intercloud Trust and Security Decision Support System: an Ontology-based Approach.
J. Grid Comput., 2015

Dynamic and flexible selection of a reputation mechanism for heterogeneous environments.
Future Gener. Comput. Syst., 2015

Towards privacy-preserving reputation management for hybrid broadcast broadband applications.
Comput. Secur., 2015

Managing XACML systems in distributed environments through Meta-Policies.
Comput. Secur., 2015

Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition).
Comput. Electr. Eng., 2015

Introduction to the special section on critical systems modelling and security.
Comput. Electr. Eng., 2015

Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Taxonomy of trust relationships in authorization domains for cloud computing.
J. Supercomput., 2014

Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014

Run-time model based framework for automatic evaluation of multimodal interfaces.
J. Multimodal User Interfaces, 2014

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Editorial: Special issue on Identity Protection and Management.
J. Inf. Secur. Appl., 2014

Editorial: Cloud computing service and architecture models.
Inf. Sci., 2014

Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Comput., 2014

A Context-Aware Interaction Model for the Analysis of Users' QoE in Mobile Environments.
Int. J. Hum. Comput. Interact., 2014

Semantic-aware multi-tenancy authorization system for cloud architectures.
Future Gener. Comput. Syst., 2014

Towards the integration of reputation management in OpenID.
Comput. Stand. Interfaces, 2014

Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014

Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014

Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition).
Comput. Electr. Eng., 2014

Live digital, remember digital: State of the art and research challenges.
Comput. Electr. Eng., 2014

ROMEO: ReputatiOn Model Enhancing OpenID Simulator.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wirel. Pers. Commun., 2013

RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013

Definition of an advanced identity management infrastructure.
Int. J. Inf. Sec., 2013

Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments.
IEEE Secur. Priv., 2013

Securing Cyberspace in the 21st Century.
Computer, 2013

Special issue on Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2013

RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management.
Proceedings of the Seventh International Conference on Complex, 2013

2012
A Non-monotonic Expressiveness Extension on the Semantic Web Rule Language.
J. Web Eng., 2012

Cloud Computing, Networking, and Services.
J. Netw. Syst. Manag., 2012

TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks.
J. Netw. Comput. Appl., 2012

LFTM, linguistic fuzzy trust mechanism for distributed networks.
Concurr. Comput. Pract. Exp., 2012

Do not snoop my habits: preserving privacy in the smart grid.
IEEE Commun. Mag., 2012

Introduction to Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2012

2011
Providing trust in wireless sensor networks using a bio-inspired technique.
Telecommun. Syst., 2011

Semantic Web-Based Management of Routing Configurations.
J. Netw. Syst. Manag., 2011

Trust and Reputation Models Comparison.
Internet Res., 2011

Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm.
Intell. Autom. Soft Comput., 2011

Semantic-based authorization architecture for Grid.
Future Gener. Comput. Syst., 2011

Towards a Semantic-Aware Collaborative Working Environment.
Comput. Informatics, 2011

Towards an Authorization System for Cloud Infrastructure Providers.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Towards Software Quality and User Satisfaction through User Interfaces.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Enhancing OpenID through a Reputation Framework.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Knowledge Authoring with ORE: Testing, Debugging and Validating Knowledge Rules in a Semantic Web Framework.
J. Univers. Comput. Sci., 2010

Next Generation Networks (NGNs).
Int. J. Commun. Syst., 2010

Event-driven architecture based on patterns for detecting complex attacks.
Int. J. Crit. Comput. Based Syst., 2010

Towards an authorisation model for distributed systems based on the Semantic Web.
IET Inf. Secur., 2010

Detection of semantic conflicts in ontology and rule-based information systems.
Data Knowl. Eng., 2010

OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification.
Comput. Syst. Sci. Eng., 2010

Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems.
Comput. Stand. Interfaces, 2010

PKI-based trust management in inter-domain scenarios.
Comput. Secur., 2010

TRIMS, a privacy-aware trust and reputation model for identity management systems.
Comput. Networks, 2010

A Proposal for Automatic Testing of GUIs Based on Annotated Use Cases.
Adv. Softw. Eng., 2010

The SignSpeak Project - Bridging the Gap Between Signers and Speakers.
Proceedings of the International Conference on Language Resources and Evaluation, 2010

Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
TACS, a Trust Model for P2P Networks.
Wirel. Pers. Commun., 2009

Intrusion detection using a linguistic hedged fuzzy-XCS classifier system.
Soft Comput., 2009

Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server.
J. Syst. Archit., 2009

Call for Papers: on '<i>Next Generation Networks</i> (<i>NGNs</i>)'.
Int. J. Commun. Syst., 2009

Security threats scenarios in trust and reputation models for distributed systems.
Comput. Secur., 2009

Multi-layer framework for analysing and managing routing configurations.
Comput. Electr. Eng., 2009

TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Automated GUI Testing Validation guided by Annotated Use Cases.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
OpenIKEv2: Design and Implementation of an IKEv2 Solution.
IEICE Trans. Inf. Syst., 2008

Secure overlay networks for federated service provision and management.
Comput. Electr. Eng., 2008

Towards semantic web-based management of security services.
Ann. des Télécommunications, 2008

Towards the Definition of a Web Service Based Management Framework.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Event-Driven Architecture for Intrusion Detection Systems Based on Patterns.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Building and Managing Policy-Based Secure Overlay Networks.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

2007
Towards semantic-aware management of security services in GT4.
Multiagent Grid Syst., 2007

Managing semantic-aware policies in a distributed firewall scenario.
Internet Res., 2007

Key research challenges in network management.
IEEE Commun. Mag., 2007

POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

A Linguistic Fuzzy-XCS Classifier System.
Proceedings of the FUZZ-IEEE 2007, 2007

2006
Dynamic and secure management of VPNs in IPv6 multi-domain scenarios.
Comput. Commun., 2006

Dynamic Policy-Based Network Management for a Secure Coalition Environment.
IEEE Commun. Mag., 2006

Distributed Provision and Management of Security Services in Globus Toolkit 4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

2005
Providing advanced authentication services in IPv6 muti-domain scenarios.
Int. J. Internet Protoc. Technol., 2005

Providing AAA services in IPv6 networks.
Int. J. Internet Protoc. Technol., 2005

Deployment of AAA Infrastructures in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Policy-Driven Routing Management Using CIM.
Proceedings of the Computer Network Security, 2005

An XML-Seamless Policy Based Management Framework.
Proceedings of the Computer Network Security, 2005

A Semantically-Rich Management System Based on CIM for the OGSA Security Services.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Policy-based dynamic provision of IP services in a secure VPN coalition scenario.
IEEE Commun. Mag., 2004

A Proposal of a CIM-Based Policy Management Model for the OGSA Security Architecture.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture.
Proceedings of the Computational Science, 2004

2003
PKI Services for IPv6.
IEEE Internet Comput., 2003

New security services based on PKI.
Future Gener. Comput. Syst., 2003

2002
Policy-based Management for ALAN-Enabled Networks.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Different Smartcard-Based Approaches to Physical Access Control.
Proceedings of the Infrastructure Security, International Conference, 2002

2001
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.
Proceedings of the Information Security, 4th International Conference, 2001


  Loading...