关注
J. Carrillo-Mondejar
J. Carrillo-Mondejar
在 unizar.es 的电子邮件经过验证
标题
引用次数
引用次数
年份
Characterizing Linux-based malware: Findings and recent trends
J Carrillo-Mondéjar, JL Martínez, G Suarez-Tangil
Future Generation Computer Systems 110, 267-281, 2020
232020
Security Analysis of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JM Castelo Gómez, ...
Applied Sciences 12 (21), 10991, 2022
182022
Developing an IoT forensic methodology. A concept proposal
JMC Gómez, JC Mondéjar, JR Gómez, JM Martínez
Forensic Science International: Digital Investigation 36, 301114, 2021
182021
A context-centered methodology for IoT forensic investigations
JM Castelo Gómez, J Carrillo Mondéjar, J Roldán Gómez, ...
International Journal of Information Security 20, 647-673, 2021
122021
Forensic analysis of the Xiaomi Mi smart sensor set
JMC Gómez, J Carrillo-Mondéjar, JLM Martínez, JN García
Forensic Science International: Digital Investigation 42, 301451, 2022
92022
Security Assessment of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, JLM Martínez
Journal of Physics: Conference Series 2224 (1), 012079, 2022
92022
Automatic Analysis Architecture of IoT Malware Samples
J Carrillo-Mondejar, JM Castelo Gomez, C Núñez-Gómez, ...
Security and Communication Networks 2020, 1-12, 2020
92020
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns
J Roldán-Gómez, J Boubeta-Puig, J Carrillo-Mondéjar, JMC Gómez, ...
Engineering Applications of Artificial Intelligence 123, 106344, 2023
82023
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants
J Carrillo-Mondéjar, H Turtiainen, A Costin, JL Martínez, G Suarez-Tangil
IEEE Internet of Things Journal 10 (10), 8371-8394, 2022
82022
Non-volatile memory forensic analysis in windows 10 iot core
JM Castelo Gómez, J Roldán Gómez, J Carrillo Mondéjar, ...
Entropy 21 (12), 1141, 2019
82019
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms
S Ruiz-Villafranca, J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, ...
Computer Networks 233, 109868, 2023
72023
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats
S Ruiz-Villafranca, J Carrillo-Mondéjar, JM Castelo Gómez, ...
The Journal of Supercomputing 79 (11), 11895-11933, 2023
72023
On how VoIP attacks foster the malicious call ecosystem
J Carrillo-Mondéjar, JL Martinez, G Suarez-Tangil
Computers & Security 119, 102758, 2022
72022
Attack pattern recognition in the internet of things using complex event processing and machine learning
J Roldán-Gómez, J Boubeta-Puig, JMC Gómez, J Carrillo-Mondéjar, ...
2021 IEEE international conference on systems, man, and cybernetics (SMC …, 2021
72021
An instrumentation based algorithm for stack overflow detection
J Carrillo-Mondéjar, JM Castelo-Gómez, J Roldán-Gómez, JL Martínez
Journal of Computer Virology and Hacking Techniques 16, 245-256, 2020
22020
A concept forensic methodology for the investigation of IoT cyberincidents
JM Castelo Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ...
The Computer Journal 67 (4), 1324-1345, 2024
12024
Forensic Science International: Digital Investigation
JMC Gómez, JC Mondéjar, J Roldán, JMM Gómez
Forensic Science International 36, 301114, 2021
12021
Exploring Shifting Patterns in Recent IoT Malware
J Carrillo-Mondejar, G Suarez-Tangil, A Costin, RJ Rodríguez
European Conference on Cyber Warfare and Security 23 (1), 2024
2024
A TabPFN-based intrusion detection system for the industrial internet of things
S Ruiz-Villafranca, J Roldán-Gómez, JMC Gómez, J Carrillo-Mondéjar, ...
The Journal of Supercomputing, 1-38, 2024
2024
Framework de Seguridad Reforzado por Blockchain para Federated Learning en Entornos MEC-IoT
LM García Sáez, S Ruiz Villafranca, J Carrillo Mondéjar, J Roldán Gómez, ...
Jornadas Nacionales de Investigación en Ciberseguridad (JNIC)(9ª. 2024 …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20