Gregorio Martínez Pérez
Orcid: 0000-0001-5532-6604Affiliations:
- University of Murcia, Spain
According to our database1,
Gregorio Martínez Pérez
authored at least 230 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on webs.um.es
On csauthors.net:
Bibliography
2024
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice.
Wirel. Networks, November, 2024
Mitigating communications threats in decentralized federated learning through moving target defense.
Wirel. Networks, November, 2024
Privacy-preserving hierarchical federated learning with biosignals to detect drowsiness while driving.
Neural Comput. Appl., November, 2024
Studying Drowsiness Detection Performance While Driving Through Scalable Machine Learning Models Using Electroencephalography.
Cogn. Comput., May, 2024
Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.
Appl. Intell., April, 2024
Future Gener. Comput. Syst., March, 2024
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification.
Future Gener. Comput. Syst., March, 2024
Single-board device individual authentication based on hardware performance and autoencoder transformer models.
Comput. Secur., February, 2024
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT.
IEEE Trans. Inf. Forensics Secur., 2024
SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces.
IEEE Trans. Dependable Secur. Comput., 2024
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors.
IEEE Trans. Dependable Secur. Comput., 2024
A Big Data architecture for early identification and categorization of dark web sites.
Future Gener. Comput. Syst., 2024
Expert Syst. Appl., 2024
Corrigendum to "Fedstellar: A platform for decentralized federated learning" [Expert Syst. Appl. 242 (2024) 122861].
Expert Syst. Appl., 2024
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls.
CoRR, 2024
Robust Federated Learning for execution time-based device model identification under label-flipping attack.
Clust. Comput., 2024
Building Trust in the Era of 6G: A Level of Trust Assessment Function for Cloud Continuum.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024
Proceedings of the IEEE Global Engineering Education Conference, 2024
Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Comput. Secur., December, 2023
CGAPP: A continuous group authentication privacy-preserving platform for industrial scene.
J. Inf. Secur. Appl., November, 2023
Int. J. Medical Informatics, November, 2023
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges.
ACM Comput. Surv., November, 2023
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning.
Comput. Commun., November, 2023
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers.
Internet Things, July, 2023
Int. J. Inf. Sec., June, 2023
Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.
IEEE Internet Things J., May, 2023
Analyzing the impact of Driving tasks when detecting emotions through brain-computer interfaces.
Neural Comput. Appl., April, 2023
A methodology to identify identical single-board computers based on hardware behavior fingerprinting.
J. Netw. Comput. Appl., March, 2023
Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces.
CoRR, 2023
CoRR, 2023
Single-board Device Individual Authentication based on Hardware Performance and Anomaly Detection for Crowdsensing Platforms.
CoRR, 2023
Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges.
IEEE Commun. Surv. Tutorials, 2023
Commun. ACM, 2023
Proceedings of the NOMS 2023, 2023
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield.
Proceedings of the IEEE Military Communications Conference, 2023
Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A Framework Quantifying Trustworthiness of Supervised Machine and Deep Learning Models.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023
2022
MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware.
Dataset, May, 2022
Spotting political social bots in Twitter: a dataset for the 2019 Spanish general election.
Dataset, May, 2022
Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices.
Proceedings of the Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 2022
IEEE Trans. Ind. Informatics, 2022
J. Netw. Syst. Manag., 2022
SAFECAR: A Brain-Computer Interface and intelligent framework to detect drivers' distractions.
Expert Syst. Appl., 2022
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges.
ACM Comput. Surv., 2022
Comput. Stand. Interfaces, 2022
When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns.
CoRR, 2022
Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario.
CoRR, 2022
CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors.
CoRR, 2022
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities.
Comput. Secur., 2022
Clust. Comput., 2022
Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Study of P300 Detection Performance by Different P300 Speller Approaches Using Electroencephalography.
Proceedings of the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 18th International Conference on Network and Service Management, 2022
2021
SafeMan: A unified framework to manage cybersecurity and safety in manufacturing industry.
Softw. Pract. Exp., 2021
S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information.
Sensors, 2021
IEEE Internet Comput., 2021
Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology.
CoRR, 2021
Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized.
CoRR, 2021
Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities.
CoRR, 2021
Mitigation of cyber threats: Protection mechanisms in federated SDN/NFV infrastructures for 5G within FIRE+.
Concurr. Comput. Pract. Exp., 2021
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets.
IEEE Commun. Surv. Tutorials, 2021
AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning.
Comput. Secur., 2021
Clust. Comput., 2021
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
2020
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election.
IEEE Trans. Netw. Serv. Manag., 2020
Softw. Pract. Exp., 2020
Scalable detection of botnets based on DGA: Efficient feature discovery process in machine learning techniques.
Soft Comput., 2020
A Scalable Architecture for the Dynamic Deployment of Multimodal Learning Analytics Applications in Smart Classrooms.
Sensors, 2020
Comput. Networks, 2020
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Visualizing educational game data: A case study of visualizations to support teachers.
Proceedings of the Learning Analytics Summer Institute Spain 2020: Learning Analytics. Time for Adoption?, 2020
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture.
Proceedings of the 2020 European Conference on Networks and Communications, 2020
Proceedings of the 18th IEEE International Conference on Embedded and Ubiquitous Computing, 2020
2019
Secur. Commun. Networks, 2019
Dynamic network slicing management of multimedia scenarios for future remote healthcare.
Multim. Tools Appl., 2019
Policy-Based Management for Green Mobile Networks Through Software-Defined Networking.
Mob. Networks Appl., 2019
Dynamic management of a deep learning-based anomaly detection system for 5G networks.
J. Ambient Intell. Humaniz. Comput., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Editorial: special issue on advances in security and privacy for future mobile communications.
Electron. Commer. Res., 2019
Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges.
CoRR, 2019
Detection of economic denial of sustainability (EDoS) threats in self-organizing networks.
Comput. Commun., 2019
IEEE Commun. Mag., 2019
Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
5G-CAGE: A Context and Situational Awareness System for City Public Safety with Video Processing at a Virtualized Ecosystem.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future.
Sustain. Comput. Informatics Syst., 2018
Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System.
Sensors, 2018
Introduction to the Special Section on Critical Systems Modelling and Security (Third Edition).
Comput. Electr. Eng., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
2017
Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets.
IEEE Internet Comput., 2017
IEEE Commun. Mag., 2017
Comput. Electr. Eng., 2017
Preserving patients' privacy in health scenarios through a multicontext-aware system.
Ann. des Télécommunications, 2017
On the performance of a deep learning-based anomaly detection system for 5G networks.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017
2016
Softw. Test. Verification Reliab., 2016
SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-Preserving and Context-Aware Smart Applications.
IEEE Syst. J., 2016
Design of a recommender system based on users' behavior and collaborative location and tracking.
J. Comput. Sci., 2016
J. Comput. Sci. Technol., 2016
Int. J. Inf. Sec., 2016
Dynamic counter-measures for risk-based access control systems: An evolutive approach.
Future Gener. Comput. Syst., 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
2015
Chasing Offensive Conduct in Social Networks: A Reputation-Based Practical Approach for Frisber.
ACM Trans. Internet Techn., 2015
J. Grid Comput., 2015
Dynamic and flexible selection of a reputation mechanism for heterogeneous environments.
Future Gener. Comput. Syst., 2015
Towards privacy-preserving reputation management for hybrid broadcast broadband applications.
Comput. Secur., 2015
Comput. Secur., 2015
Introduction to the Special Issue on Recent Advances in Security and Privacy in Distributed Communications (Fourth Edition).
Comput. Electr. Eng., 2015
Comput. Electr. Eng., 2015
Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2014
J. Supercomput., 2014
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
Mob. Networks Appl., 2014
J. Multimodal User Interfaces, 2014
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014
J. Inf. Secur. Appl., 2014
Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach.
IEEE Internet Comput., 2014
A Context-Aware Interaction Model for the Analysis of Users' QoE in Mobile Environments.
Int. J. Hum. Comput. Interact., 2014
Future Gener. Comput. Syst., 2014
Comput. Stand. Interfaces, 2014
Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014
Precise: Privacy-aware recommender based on context information for cloud service environments.
IEEE Commun. Mag., 2014
Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition).
Comput. Electr. Eng., 2014
Comput. Electr. Eng., 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
What Private Information Are You Disclosing? A Privacy-Preserving System Supervised by Yourself.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
Wirel. Pers. Commun., 2013
RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013
Int. J. Inf. Sec., 2013
Identity Management-In Privacy We Trust: Bridging the Trust Gap in eHealth Environments.
IEEE Secur. Priv., 2013
Special issue on Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2013
RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management.
Proceedings of the Seventh International Conference on Complex, 2013
2012
J. Web Eng., 2012
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks.
J. Netw. Comput. Appl., 2012
Concurr. Comput. Pract. Exp., 2012
IEEE Commun. Mag., 2012
Introduction to Recent Advances in Security and Privacy in Distributed Communications.
Comput. Electr. Eng., 2012
2011
Telecommun. Syst., 2011
Intell. Autom. Soft Comput., 2011
Future Gener. Comput. Syst., 2011
Comput. Informatics, 2011
Towards an Authorization System for Cloud Infrastructure Providers.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
2010
Knowledge Authoring with ORE: Testing, Debugging and Validating Knowledge Rules in a Semantic Web Framework.
J. Univers. Comput. Sci., 2010
Int. J. Crit. Comput. Based Syst., 2010
IET Inf. Secur., 2010
Data Knowl. Eng., 2010
OpenHMI-tester: an open and cross-platform architecture for GUI testing and certification.
Comput. Syst. Sci. Eng., 2010
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems.
Comput. Stand. Interfaces, 2010
Comput. Networks, 2010
Adv. Softw. Eng., 2010
Proceedings of the International Conference on Language Resources and Evaluation, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Soft Comput., 2009
Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server.
J. Syst. Archit., 2009
Int. J. Commun. Syst., 2009
Comput. Secur., 2009
Comput. Electr. Eng., 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
2008
IEICE Trans. Inf. Syst., 2008
Comput. Electr. Eng., 2008
Ann. des Télécommunications, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 16th Euromicro International Conference on Parallel, 2008
2007
Multiagent Grid Syst., 2007
Internet Res., 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
2006
Comput. Commun., 2006
IEEE Commun. Mag., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006
2005
Int. J. Internet Protoc. Technol., 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005
Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005
On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
IEEE Commun. Mag., 2004
A Proposal of a CIM-Based Policy Management Model for the OGSA Security Architecture.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004
Proceedings of the Computational Science, 2004
2003
2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Infrastructure Security, International Conference, 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001