Rodrigo Roman

Orcid: 0000-0002-4099-1422

According to our database1, Rodrigo Roman authored at least 71 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A survey on IoT trust model frameworks.
J. Supercomput., April, 2024

Trust interoperability in the Internet of Things.
Internet Things, 2024

CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024

Evading IoT Intrusion Detection Systems with GAN.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
A survey on the (in)security of trusted execution environments.
Comput. Secur., June, 2023

Current Perspectives on Securing Critical Infrastructures' Supply Chains.
IEEE Secur. Priv., 2023

2022
Personal IoT Privacy Control at the Edge.
IEEE Secur. Priv., 2022

2021
Guest Editorial Introduction of the Special Issue on Edge Intelligence for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Sensors Cybersecurity.
Sensors, 2021

2020
Integration of a Threat Traceability Solution in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Message from the guest editors.
Int. J. Inf. Sec., 2020

Distributed Detection of APTs: Consensus vs. Clustering.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Tracking APTs in industrial ecosystems: A proof of concept.
J. Comput. Secur., 2019

Immune System for the Internet of Things Using Edge Technologies.
IEEE Internet Things J., 2019

Edge-Assisted Vehicular Networks Security.
IEEE Internet Things J., 2019

Current cyber-defense trends in industrial control systems.
Comput. Secur., 2019

2018
Feasibility of Societal Model for Securing Internet of Things.
KSII Trans. Internet Inf. Syst., 2018

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges.
Future Gener. Comput. Syst., 2018

Evolution and Trends in IoT Security.
Computer, 2018

Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics.
Proceedings of the Computer Security, 2018

2017
Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

From SMOG to Fog: A security perspective.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices.
IEEE Netw., 2016

Complying with Security Requirements in Cloud Storage Systems.
J. Comput., 2016

Digital Witness: Digital Evidence Management Framework for the Internet of Things.
ERCIM News, 2016

2014
Security in a completely interconnected world.
Secur. Commun. Networks, 2014

Protecting the internet of things.
Secur. Commun. Networks, 2014

2013
User-centric secure integration of personal RFID tags and sensor networks.
Secur. Commun. Networks, 2013

Advanced processing technologies and applications for mobile communication systems.
Int. J. Commun. Syst., 2013

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2013

Smart control of operational threats in control substations.
Comput. Secur., 2013

On the features and challenges of security and privacy in distributed internet of things.
Comput. Networks, 2013

Security of industrial sensor network-based remote substations in the context of the Internet of Things.
Ad Hoc Networks, 2013

2012
On the energy cost of authenticated key agreement in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

Advanced secure multimedia services for digital homes.
Inf. Syst. Frontiers, 2012

Selecting key management schemes for WSN applications.
Comput. Secur., 2012

Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Security in the Distributed Internet of Things.
Proceedings of the Trusted Systems, 4th International Conference, 2012

A Novel Key Update Protocol in Mobile Sensor Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Wirel. Commun. Mob. Comput., 2011

Real-time location and inpatient care systems based on passive RFID.
J. Netw. Comput. Appl., 2011

Secure SCADA framework for the protection of energy control systems.
Concurr. Comput. Pract. Exp., 2011

Securing the Internet of Things.
Computer, 2011

Key management systems for sensor networks in the context of the Internet of Things.
Comput. Electr. Eng., 2011

Secure Architecure for the Integration of RFID and Sensors in Personal Networks.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Trust management systems for wireless sensor networks: Best practices.
Comput. Commun., 2010

2009
Integrating wireless sensor networks and the internet: a security analysis.
Internet Res., 2009

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.
Proceedings of the Trust, 2009

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Proceedings of the Foundations of Security Analysis and Design V, 2009

2008
Situation awareness mechanisms for wireless sensor networks.
IEEE Commun. Mag., 2008

KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommun. Syst., 2007

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
Mob. Networks Appl., 2007

An effective multi-layered defense framework against spam.
Inf. Secur. Tech. Rep., 2007

The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection.
Inf. Secur. Tech. Rep., 2007

A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007

On the Protection and Technologies of Critical Information Infrastructures.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Applicability of Public Key Infrastructures in Wireless Sensor Networks.
Proceedings of the Public Key Infrastructure, 2007

Featuring trust and reputation management systems for constrained hardware devices.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

2006
An anti-spam scheme using pre-challenges.
Comput. Commun., 2006

Service-Oriented Security Architecture for CII based on Sensor Networks.
Proceedings of the Second International Workshop on Security, 2006

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.
Proceedings of the Critical Information Infrastructures Security, 2006

Applying intrusion detection systems to wireless sensor networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Casual virtual private network.
Comput. Syst. Sci. Eng., 2005

Protection Against Spam Using Pre-Challenges.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

On the Security of Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

2002
Design of a VPN Software Solution Integrating TCP and UDP Services.
Proceedings of the Infrastructure Security, International Conference, 2002


  Loading...