Follow
Jose Maria de Fuentes
Jose Maria de Fuentes
Associate Professor, Universidad Carlos III de Madrid (Spain)
Verified email at inf.uc3m.es - Homepage
Title
Cited by
Cited by
Year
Overview of security issues in vehicular ad-hoc networks
JM De Fuentes, AI González-Tablas, A Ribagorda
Handbook of research on mobility and computing: Evolving technologies and …, 2011
2362011
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
JM de Fuentes, L González-Manzano, J Tapiador, P Peris-Lopez
computers & security 69, 127-141, 2017
712017
AndrODet: An adaptive Android obfuscation detector
O Mirzaei, JM de Fuentes, J Tapiador, L Gonzalez-Manzano
Future Generation Computer Systems 90, 240-261, 2019
652019
Achieving cybersecurity in blockchain-based systems: A survey
M Gimenez-Aguilar, JM De Fuentes, L Gonzalez-Manzano, D Arroyo
Future Generation Computer Systems 124, 91-118, 2021
622021
Leveraging user-related internet of things for continuous authentication: A survey
L Gonzalez-Manzano, JMD Fuentes, A Ribagorda
ACM Computing Surveys (CSUR) 52 (3), 1-38, 2019
582019
Appcaulk: Data leak prevention by injecting targeted taint tracking into android apps
J Schutte, D Titze, JM De Fuentes
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
492014
Privacy-preserving sensor-based continuous authentication and user profiling: a review
L Hernández-Álvarez, JM de Fuentes, L González-Manzano, ...
Sensors 21 (1), 92, 2020
422020
Design recommendations for online cybersecurity courses
L González-Manzano, JM de Fuentes
Computers & Security 80, 238-256, 2019
422019
Attribute-based credentials for privacy-aware smart health services in IoT-based smart cities
JM de Fuentes, L Gonzalez-Manzano, A Solanas, F Veseli
Computer 51 (7), 44-53, 2018
422018
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
P Peris-Lopez, L González-Manzano, C Camara, JM de Fuentes
Future Generation Computer Systems 81, 67-77, 2018
422018
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
382014
PAgIoT–Privacy-preserving aggregation protocol for Internet of Things
L González-Manzano, JM de Fuentes, S Pastrana, P Peris-Lopez, ...
Journal of Network and Computer Applications 71, 59-71, 2016
362016
Andrensemble: Leveraging api ensembles to characterize android malware families
O Mirzaei, G Suarez-Tangil, JM de Fuentes, J Tapiador, G Stringhini
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
352019
A taxonomy and survey of attacks on digital signatures
JL Hernandez-Ardieta, AI Gonzalez-Tablas, JM De Fuentes, B Ramos
Computers & security 34, 67-112, 2013
342013
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
JM de Fuentes, L González-Manzano, J Serna-Olvera, F Veseli
Personal and Ubiquitous Computing 21, 869-891, 2017
332017
Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation
L González-Manzano, JM de Fuentes, P Peris-Lopez, C Camara
Future Generation Computer Systems 77, 136-148, 2017
302017
Hindering false event dissemination in VANETs with proof-of-work mechanisms
E Palomar, JM de Fuentes, AI González-Tablas, A Alcaide
Transportation Research Part C: Emerging Technologies 23, 85-97, 2012
302012
A framework for avoiding steganography usage over HTTP
J Blasco, JC Hernandez-Castro, JM de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
272012
SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation
L Hernández-Álvarez, JM De Fuentes, L González-Manzano, LH Encinas
Pattern Recognition Letters 147, 189-196, 2021
252021
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009
242009
The system can't perform the operation now. Try again later.
Articles 1–20