Roger Piqueras Jover

Orcid: 0000-0002-1420-2987

According to our database1, Roger Piqueras Jover authored at least 30 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security and Privacy Product Inclusion.
CoRR, 2024

ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Fixing Insecure Cellular System Information Broadcasts For Good.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2020
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust.
IEEE Wirel. Commun., 2020

Biometric Identity Based on Intra-Body Communication Channel Characteristics and Machine Learning.
Sensors, 2020

Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.
ACM Queue, 2020

Special issue on Advancements in 5G Networks Security.
Future Gener. Comput. Syst., 2020

Security analysis of SMS as a second factor of authentication.
Commun. ACM, 2020

CSAI: Open-Source Cellular Radio Access Network Security Analysis Instrument.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

2019
The current state of affairs in 5G security and the main remaining security challenges.
CoRR, 2019

Security and Protocol Exploit Analysis of the 5G Specifications.
IEEE Access, 2019

Dynamic 5G Network Slicing for First Responders.
Proceedings of the 2019 Principles, Systems and Applications of IP Telecommunications, 2019

2018
5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2016
LTE security, protocol exploits and location tracking experimentation with low-cost software radio.
CoRR, 2016

LTE/LTE-a jamming, spoofing, and sniffing: threat assessment and mitigation.
IEEE Commun. Mag., 2016

dHSS - distributed Peer-to-Peer implementation of the LTE HSS based on the bitcoin/namecoin architecture.
Proceedings of the IEEE International Conference on Communication, 2016

2015
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Connection-less communication of IoT devices over LTE mobile networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Detecting Malicious Activity on Smartphones Using Sensor Measurements.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
Enhancing the security of LTE networks against jamming attacks.
EURASIP J. Inf. Secur., 2014

Analysis and detection of SIMbox fraud in mobility networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Firecycle: A scalable test bed for large-scale LTE security research.
Proceedings of the IEEE International Conference on Communications, 2014

Is it really you?: user identification via adaptive behavior fingerprinting.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Security attacks against the availability of LTE mobility networks: Overview and research directions.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Anomaly detection in cellular Machine-to-Machine communications.
Proceedings of IEEE International Conference on Communications, 2013

2012
Uplink Interference Mitigation for OFDMA Femtocell Networks.
IEEE Trans. Wirel. Commun., 2012

Crime scene investigation: SMS spam data analysis.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

How an SMS-based malware infection will get throttled by the wireless link.
Proceedings of IEEE International Conference on Communications, 2012

2006
Dynamic Pricing for Decentralised Rat Selection in Heterogeneous Scenarios.
Proceedings of the IEEE 17th International Symposium on Personal, 2006


  Loading...