Dendroid: A text mining approach to analyzing and classifying code structures in android malware families G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco Expert Systems with Applications 41 (4), 1104-1117, 2014 | 312 | 2014 |
A survey of wearable biometric recognition systems J Blasco, TM Chen, J Tapiador, P Peris-Lopez ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016 | 167 | 2016 |
A tunable proof of ownership scheme for deduplication using bloom filters J Blasco, R Di Pietro, A Orfila, A Sorniotti 2014 IEEE Conference on Communications and Network Security, 481-489, 2014 | 87 | 2014 |
How private is your period?: A systematic analysis of menstrual app privacy policies L Shipp, J Blasco Proceedings on Privacy Enhancing Technologies, 2020 | 75 | 2020 |
On the feasibility of low-cost wearable sensors for multi-modal biometric verification J Blasco, P Peris-Lopez Sensors 18 (9), 2782, 2018 | 50 | 2018 |
A multi-agent scanner to detect stored-XSS vulnerabilities E Galán, A Alcaide, A Orfila, J Blasco International Conference for Internet Technology and Secured Transactions …, 2010 | 50 | 2010 |
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape P Sivakumaran, J Blasco 28th USENIX Security Symposium (USENIX Security 19), 2019 | 49 | 2019 |
Interactive activities: the key to learning programming with MOOCs C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ... Proceedings of the European Stakeholder Summit on experiences and best …, 2016 | 43 | 2016 |
Mesh messaging in large-scale protests: Breaking Bridgefy MR Albrecht, J Blasco, RB Jensen, L Mareková Cryptographers’ track at the RSA conference, 375-398, 2021 | 39 | 2021 |
Security models in vehicular ad-hoc networks: A survey JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco IETE Technical Review 31 (1), 47-64, 2014 | 38 | 2014 |
Intrusion Detection TM Chen, J Blasco, J Alzubi, O Alzubi IET Engineering & Technology Reference, 1-9, 2014 | 38 | 2014 |
Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong MR Albrecht, J Blasco, RB Jensen, L Mareková 30th USENIX security symposium (USENIX Security 21), 3363-3380, 2021 | 37 | 2021 |
Analysis of update delays in signature-based network intrusion detection systems H Gascon, A Orfila, J Blasco Computers & Security 30 (8), 613-624, 2011 | 36 | 2011 |
Automated generation of colluding apps for experimental research J Blasco, TM Chen Journal of Computer Virology and Hacking Techniques 14, 127-138, 2018 | 29 | 2018 |
A framework for avoiding steganography usage over HTTP J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos Journal of Network and Computer Applications 35 (1), 491-501, 2012 | 28 | 2012 |
Improving network intrusion detection by means of domain-aware genetic programming J Blasco, A Orfila, A Ribagorda International Conference on Availability, Reliability, and Security (ARES …, 2010 | 28 | 2010 |
Automatic rule generation based on genetic programming for event correlation G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda Computational Intelligence in Security for Information Systems, 127-134, 2009 | 24 | 2009 |
Towards Automated Android App Collusion Detection IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ... Innovations in Mobile Privacy and Security 1575, 29-37, 2016 | 23 | 2016 |
Applying information hiding in VANETs to covertly report misbehaving vehicles JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano International Journal of Distributed Sensor Networks 10 (2), 120626, 2014 | 23 | 2014 |
Bypassing information leakage protection with trusted applications J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda Computers & Security 31 (4), 557–568, 2012 | 22 | 2012 |