L. Javier García-Villalba
Orcid: 0000-0001-7573-6272Affiliations:
- Complutense University of Madrid, Spain
According to our database1,
L. Javier García-Villalba
authored at least 191 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on gass.ucm.es
On csauthors.net:
Bibliography
2024
Natural Language Processing Applied to Forensics Information Extraction With Transformers and Graph Visualization.
IEEE Trans. Comput. Soc. Syst., August, 2024
Syst., 2024
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.
Data, 2024
2023
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests.
Appl. Math. Comput., December, 2023
Expert Syst. Appl., November, 2023
J. Cryptogr. Eng., June, 2023
Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.
Future Internet, May, 2023
Expert Syst. Appl., April, 2023
ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.
Sensors, February, 2023
Sensors, 2023
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Sensors, 2022
A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.
Multim. Tools Appl., 2022
J. Inf. Secur. Appl., 2022
Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2).
Entropy, 2022
ACM Comput. Surv., 2022
Appl. Math. Comput., 2022
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.
Proceedings of the 1st International Conference on 6G Networking, 2022
2021
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
Sensors, 2021
Sensors, 2021
Copy-move forgery detection technique based on discrete cosine transform blocks features.
Neural Comput. Appl., 2021
Compression effects and scene details on the source camera identification of digital videos.
Expert Syst. Appl., 2021
Comput. Commun., 2021
2020
Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
Sensors, 2020
Future Internet, 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Authentication and integrity of smartphone videos through multimedia container structure analysis.
Future Gener. Comput. Syst., 2020
Entropy, 2020
Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.
IEEE Access, 2020
IEEE Access, 2020
2019
Sensors, 2019
Sensors, 2019
Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation.
Sensors, 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019
Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.
IEEE Access, 2019
Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019
Set of Usability Heuristics for Quality Assessment of Mobile Applications on Smartphones.
IEEE Access, 2019
Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019
2018
J. Supercomput., 2018
J. Supercomput., 2018
Swarm Evol. Comput., 2018
Sensors, 2018
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018
Sensors, 2018
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018
A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences.
Knowl. Based Syst., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017
Sensors, 2017
Sensors, 2017
Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.
Sensors, 2017
Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Netw. Comput. Appl., 2017
ISPRS Int. J. Geo Inf., 2017
Int. J. Ad Hoc Ubiquitous Comput., 2017
Future Internet, 2017
Key Technologies in the Context of Future Networks: Operational and Management Requirements.
Future Internet, 2017
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017
Comput. Stand. Interfaces, 2017
2016
Wirel. Pers. Commun., 2016
J. Supercomput., 2016
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016
Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016
Int. J. Distributed Sens. Networks, 2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
Trans. Emerg. Telecommun. Technol., 2016
Expert Syst. Appl., 2016
2015
Proceedings of the Handbook on Data Centers, 2015
Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015
Proceedings of the Handbook on Data Centers, 2015
Proceedings of the Handbook on Data Centers, 2015
Multim. Tools Appl., 2015
Trends on virtualisation with software defined networking and network function virtualisation.
IET Networks, 2015
IET Comput. Vis., 2015
Comput. Networks, 2015
ACM Commun. Comput. Algebra, 2015
2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Design and evaluation of a decentralised information service architecture for IEEE 802.21 networks.
Int. J. Ad Hoc Ubiquitous Comput., 2014
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Ad Hoc Ubiquitous Comput., 2013
Data model extension for security event notification with dynamic risk assessment purpose.
Sci. China Inf. Sci., 2013
Proceedings of the IEEE SDN for Future Networks and Services, 2013
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
2012
Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Commun. Lett., 2012
Intelligent system for time series classification using support vector machines applied to supply-chain.
Expert Syst. Appl., 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012
2011
Sensors, 2011
J. Ubiquitous Syst. Pervasive Networks, 2011
J. Ubiquitous Syst. Pervasive Networks, 2011
IET Commun., 2011
IEEE Commun. Lett., 2011
Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011
Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
2010
IEEE Trans. Inf. Theory, 2010
Dynamic multi-objective routing algorithm: a multi-objective routing algorithm for the simple hybrid routing protocol on wireless sensor networks.
IET Commun., 2010
IEEE Commun. Lett., 2010
2009
2008
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
2007
Proceedings of the Computational Science and Its Applications, 2007
2006
Evaluation of the Dynamic Reconfiguration of Mobile IPv4 Agents in MANET.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the High Performance Computing and Communications, 2006
Performance Evaluation of Mobile IP Agents' Auto-reconfiguration Mechanisms in MANET.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
2005
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
Proceedings of the Security in Information Systems, 2005
SisBrAV - Brazilian Vulnerability Alert System.
Proceedings of the Security in Information Systems, 2005
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network.
Proceedings of the Security in Information Systems, 2005
2004
Hiding Data in Games.
J. Int. Comput. Games Assoc., 2004
Security in the Management of Networks with SNMPv3.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004
A Simulation-Based Performance Analysis of Dynamic Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
2003
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science and Its Applications, 2003
2001
Theor. Comput. Sci., 2001
Appl. Math. Lett., 2001
Proceedings of the Progress in Artificial Intelligence, 2001
2000
Inf. Process. Lett., 2000
1999
Inf. Process. Lett., 1999