Jorge Blasco Alís
Citeras av
Citeras av
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
How private is your period?: A systematic analysis of menstrual app privacy policies
L Shipp, J Blasco
Proceedings on Privacy Enhancing Technologies, 2020
On the feasibility of low-cost wearable sensors for multi-modal biometric verification
J Blasco, P Peris-Lopez
Sensors 18 (9), 2782, 2018
A multi-agent scanner to detect stored-XSS vulnerabilities
E Galán, A Alcaide, A Orfila, J Blasco
International Conference for Internet Technology and Secured Transactions …, 2010
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape
P Sivakumaran, J Blasco
28th USENIX Security Symposium (USENIX Security 19), 2019
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
Mesh messaging in large-scale protests: Breaking Bridgefy
MR Albrecht, J Blasco, RB Jensen, L Mareková
Cryptographers’ track at the RSA conference, 375-398, 2021
Intrusion Detection
TM Chen, J Blasco, J Alzubi, O Alzubi
IET Engineering & Technology Reference, 1-9, 2014
Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong
MR Albrecht, J Blasco, RB Jensen, L Mareková
30th USENIX security symposium (USENIX Security 21), 3363-3380, 2021
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
Automated generation of colluding apps for experimental research
J Blasco, TM Chen
Journal of Computer Virology and Hacking Techniques 14, 127-138, 2018
A framework for avoiding steganography usage over HTTP
J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
Improving network intrusion detection by means of domain-aware genetic programming
J Blasco, A Orfila, A Ribagorda
International Conference on Availability, Reliability, and Security (ARES …, 2010
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
Towards Automated Android App Collusion Detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Innovations in Mobile Privacy and Security 1575, 29-37, 2016
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
Bypassing information leakage protection with trusted applications
J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda
Computers & Security 31 (4), 557–568, 2012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20