Miguel Vargas Martin
Orcid: 0000-0001-8169-6836
According to our database1,
Miguel Vargas Martin
authored at least 80 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review.
Int. J. Inf. Sec., February, 2025
2024
Proceedings of the Natural Language Processing and Information Systems, 2024
2023
Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
2022
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases.
CoRR, 2021
SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 16th International Conference on Document Analysis and Recognition, 2021
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
2020
Proceedings of the Wireless Mobile Communication and Healthcare, 2020
2019
J. Inf. Secur. Appl., 2019
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to.
Int. J. Inf. Sec., 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019
2018
3D-RadVis Antenna: Visualization and performance measure for many-objective optimization.
Swarm Evol. Comput., 2018
Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition.
Comput. Entertain., 2018
Enhanced Correlation Matrix Based Visualization for Multi- and Many-objective optimization.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the 9th International Conference on Information, 2018
(WKSP) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018
Classification of EEG Signals Using Neural Networks to Predict Password Memorability.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
Can an Evidence-Based Blended Learning Model Serve Healthcare Patients and Adult Education Students?
Proceedings of the Blended Learning. Enhancing Learning Success, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
A brain-computer interface to examine the effects of sound on a haptic-based virtual drilling task.
Proceedings of the 8th International Conference on Information, 2017
Use of Machine Learning for Detection of Unaware Facial Recognition Without Individual Training.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Excuse Me, Do I Know You From Somewhere? Unaware Facial Recognition Using Brain-Computer Interfaces.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Evolutionary Multi-Criterion Optimization, 2017
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017
2016
Detection of Subconscious Face Recognition Using Consumer-Grade Brain-Computer Interfaces.
ACM Trans. Appl. Percept., 2016
Validating Design Patterns for Mobile Groupware Applications by Expert Users: a USAER Case.
Computación y Sistemas, 2016
Evaluating a sound-enhanced intrusion detection system to identify network congestion.
Proceedings of the 24th Mediterranean Conference on Control and Automation, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2016
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs.
Proceedings of the 7th International Conference on Ambient Systems, 2016
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks.
Proceedings of the 7th International Conference on Ambient Systems, 2016
2015
Proceedings of the 2015 IEEE World Congress on Services, 2015
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015
Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the 2014 IEEE Symposium on Differential Evolution, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 5th Mexican Conference on Human-Computer Interaction, 2014
Proceedings of the Hybrid Learning. Theory and Practice - 7th International Conference, 2014
Detection of side-channel communication in ad hoc networks using request to send (RTS) messages.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of the Hybrid Learning and Continuing Education - 6th International Conference, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2011
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Evidence-Based Educational Practices and a Theoretical Framework for Hybrid Learning.
Proceedings of the Hybrid Learning - 4th International Conference, 2011
2010
Proceedings of the Hybrid Learning, Third International Conference, 2010
A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websites.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010
Unconscious mind: Authenticating with something you don't know? Or just an infallible liveness test?
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
2009
J. Comput., 2009
A methodology for designing information security feedback based on User Interface Patterns.
Adv. Eng. Softw., 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009
2008
Int. J. Emerg. Technol. Learn., 2008
A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria.
Proceedings of the Computer-Aided Design of User Interfaces VI, 2008
2007
Assigning Bookmarks in Perfect Binary Trees.
Ars Comb., 2007
Statiscal-based skin classifier for omni-directional images.
Proceedings of the VISAPP 2007: Proceedings of the Second International Conference on Computer Vision Theory and Applications, Barcelona, Spain, March 8-11, 2007, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Monitoreo del Desempeño de los Factores de Seguridad de una Transacción Web a través de la Interfaz de Usuario.
Proceedings of the VI Jornadas Iberoamericanas de Ingeniería del Software e Ingeniería del Conocimiento-JIISIC'07, 2007
Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
A monitoring system for detecting repeated packets with applications to computer worms.
Int. J. Inf. Sec., 2006
A classification of security patterns for the transactions between a requester, an intermediary, and a web-service.
Proceedings of the Third IASTED International Conference on Communication, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2003
Optimizing Web Server's Data Transfer with Hotlinks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
2002
The Hotlink Optimizer.
Proceedings of the International Conference on Internet Computing, 2002
2000
Proceedings of the Algorithms and Computation, 11th International Conference, 2000