José M. Fernandez
Orcid: 0000-0001-9836-3595Affiliations:
- Polytechnique Montréal, Canada
According to our database1,
José M. Fernandez
authored at least 55 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on polymtl.ca
-
on orcid.org
On csauthors.net:
Bibliography
2023
2021
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED).
Int. J. Inf. Sec., 2021
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021
2020
Spartan Networks: Self-feature-squeezing neural networks for increased robustness in adversarial settings.
Comput. Secur., 2020
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020
2018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.
ACM Trans. Priv. Secur., 2018
Comput. Secur., 2018
A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks.
Proceedings of the Critical Infrastructure Protection XII, 2018
Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Critical Information Infrastructures Security, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the HCI 2017, 2017
2016
Analysis of Performance of the Routing Protocols Ad Hoc using Random Waypoint Mobility Model Applied to an Urban Environment.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016
Proceedings of the Annual IEEE Systems Conference, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Critical Infrastructure Protection X, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Proceedings of the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2014
2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Int. J. Inf. Sec., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2010
Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
2008
Int. J. Inf. Sec., 2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Proceedings of the Computer Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Unconventional Computation, 6th International Conference, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
A common algebraic description for probabilistic and quantum computations<sup>, </sup>.
Theor. Comput. Sci., 2005
2004
A Common Algebraic Description for Probabilistic and Quantum Computations (Extended Abstract).
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004
2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003