José Roldán Gómez

Orcid: 0000-0001-5787-1294

According to our database1, José Roldán Gómez authored at least 17 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A self-contained emulator for the forensic examination of IoE scenarios.
Ad Hoc Networks, 2025

2024
A TabPFN-based intrusion detection system for the industrial internet of things.
J. Supercomput., September, 2024

An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection.
Wirel. Networks, August, 2024

A forensic tool for the identification, acquisition and analysis of sources of evidence in IoT investigations.
Internet Things, 2024

A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents.
Comput. J., 2024

Forensic Analysis of the IoT Operating System Ubuntu Core.
Comput. Informatics, 2024

2023
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms.
Comput. Networks, September, 2023

MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats.
J. Supercomput., 2023

An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns.
Eng. Appl. Artif. Intell., 2023

2021
Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures.
PeerJ Comput. Sci., 2021

A context-centered methodology for IoT forensic investigations.
Int. J. Inf. Sec., 2021

Developing an IoT forensic methodology. A concept proposal.
Digit. Investig., 2021

Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

2020
An instrumentation based algorithm for stack overflow detection.
J. Comput. Virol. Hacking Tech., 2020

Automatic Analysis Architecture of IoT Malware Samples.
Secur. Commun. Networks, 2020

Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks.
Expert Syst. Appl., 2020

2019
Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core.
Entropy, 2019


  Loading...