Jose Maria de Fuentes
Jose Maria de Fuentes
Associate Professor, Universidad Carlos III de Madrid (Spain)
Verified email at inf.uc3m.es - Homepage
Title
Cited by
Cited by
Year
Overview of security issues in vehicular ad-hoc networks
JM De Fuentes, AI González-Tablas, A Ribagorda
Handbook of research on mobility and computing: Evolving technologies and …, 2011
1942011
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
JM de Fuentes, L González-Manzano, J Tapiador, P Peris-Lopez
computers & security 69, 127-141, 2017
422017
Appcaulk: Data leak prevention by injecting targeted taint tracking into android apps
J Schutte, D Titze, JM De Fuentes
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
402014
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
332014
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
292016
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
282012
AndrODet: An adaptive Android obfuscation detector
O Mirzaei, JM de Fuentes, J Tapiador, L Gonzalez-Manzano
Future Generation Computer Systems 90, 240-261, 2019
272019
A taxonomy and survey of attacks on digital signatures
JL Hernandez-Ardieta, AI Gonzalez-Tablas, JM De Fuentes, B Ramos
Computers & security 34, 67-112, 2013
252013
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
P Peris-Lopez, L González-Manzano, C Camara, JM de Fuentes
Future Generation Computer Systems 81, 67-77, 2018
232018
A framework for avoiding steganography usage over HTTP
J Blasco, JC Hernandez-Castro, JM de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
222012
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
222009
Leveraging user-related internet of things for continuous authentication: A survey
L Gonzalez-Manzano, JMD Fuentes, A Ribagorda
ACM Computing Surveys (CSUR) 52 (3), 1-38, 2019
182019
Triflow: Triaging android applications using speculative information flows
O Mirzaei, G Suarez-Tangil, J Tapiador, JM de Fuentes
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
172017
Probabilistic yoking proofs for large scale IoT systems
JM de Fuentes, P Peris-Lopez, JE Tapiador, S Pastrana
Ad Hoc Networks 32, 43-52, 2015
162015
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
162014
Design recommendations for online cybersecurity courses
L González-Manzano, JM de Fuentes
Computers & Security 80, 238-256, 2019
152019
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
JM de Fuentes, L González-Manzano, J Serna-Olvera, F Veseli
Personal and Ubiquitous Computing 21 (5), 869-891, 2017
152017
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
AI González-Tablas, A Alcaide, JM de Fuentes, J Montero
Ad hoc networks 11 (8), 2693-2709, 2013
152013
Andrensemble: Leveraging api ensembles to characterize android malware families
O Mirzaei, G Suarez-Tangil, JM de Fuentes, J Tapiador, G Stringhini
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
142019
Attribute-based credentials for privacy-aware smart health services in IoT-based smart cities
JM de Fuentes, L Gonzalez-Manzano, A Solanas, F Veseli
Computer 51 (7), 44-53, 2018
142018
The system can't perform the operation now. Try again later.
Articles 1–20