Ignacio Sanchez
Orcid: 0000-0001-6650-5683
According to our database1,
Ignacio Sanchez
authored at least 24 papers
between 2014 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Liability Regimes in the Age of AI: a Use-Case Driven Analysis of the Burden of Proof.
J. Artif. Intell. Res., 2023
The potential of large language models for improving probability learning: A study on ChatGPT3.5 and first-year computer engineering students.
CoRR, 2023
2021
J. Intell. Robotic Syst., 2021
Frontiers Comput. Sci., 2021
Characterization and computation of control invariant sets within target regions for linear impulsive control systems.
CoRR, 2021
2020
What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security.
IEEE Access, 2020
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020
2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Obstacle Avoiding Path Following based on Nonlinear Model Predictive Control using Artificial Variables.
Proceedings of the 19th International Conference on Advanced Robotics, 2019
Cyber Chronix, Participatory Research Approach to Develop and Evaluate a Storytelling Game on Personal Data Protection Rights and Privacy Risks.
Proceedings of the Games and Learning Alliance - 8th International Conference, 2019
2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Inf. Forensics Secur., 2017
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the Traffic Mining Applied to Police Activities, 2017
The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017
2016
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
2015
Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios.
Secur. Commun. Networks, 2015
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014