Formal security assessment of Modbus protocol R Nardone, RJ Rodríguez, S Marrone 2016 11th International Conference for Internet Technology and Secured …, 2016 | 47 | 2016 |
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems S Marrone, RJ Rodríguez, R Nardone, F Flammini, V Vittorini Computers & Electrical Engineering 47, 275-285, 2015 | 47 | 2015 |
Detection of algorithmically generated malicious domain names using masked N-grams J Selvi, RJ Rodríguez, E Soria-Olivas Expert Systems with Applications 124, 156-163, 2019 | 41 | 2019 |
Practical Experiences on NFC Relay Attacks with Android J Vila, RJ Rodríguez Radio Frequency Identification. Security and Privacy Issues, 87-103, 2015 | 38 | 2015 |
Modelling security of critical infrastructures: a survivability assessment RJ Rodríguez, J Merseguer, S Bernardi The Computer Journal 58 (10), 2313-2327, 2015 | 34 | 2015 |
Model-based sensitivity analysis of IaaS cloud availability B Liu, X Chang, Z Han, K Trivedi, RJ Rodríguez Future Generation Computer Systems 83, 1-13, 2018 | 28 | 2018 |
Modelling and analysing resilience as a security issue within UML RJ Rodríguez, J Merseguer, S Bernardi Proceedings of the 2nd International Workshop on Software Engineering for …, 2010 | 27 | 2010 |
On the performance estimation and resource optimization in process Petri nets RJ Rodríguez, J Júlvez, J Merseguer IEEE Transactions on Systems, Man, and Cybernetics: Systems 43 (6), 1385-1398, 2013 | 24 | 2013 |
Di-aa: An interpretable white-box attack for fooling deep neural networks Y Wang, J Liu, X Chang, RJ Rodríguez, J Wang Information Sciences 610, 14-32, 2022 | 23 | 2022 |
Evolution and characterization of point-of-sale RAM scraping malware RJ Rodríguez Journal of Computer Virology and Hacking Techniques, 1-14, 2016 | 22 | 2016 |
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms M Martín-Pérez, RJ Rodríguez, F Breitinger Forensic Science International: Digital Investigation 36, 301120, 2021 | 19 | 2021 |
An Evaluation Framework for Comparative Analysis of Generalized Stochastic Petri Net Simulation Techniques RJ Rodríguez, S Bernardi, A Zimmermann IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018 | 18 | 2018 |
Characteristics and detectability of Windows auto-start extensibility points in memory forensics D Uroz, RJ Rodríguez Digital Investigation 28, S95-S104, 2019 | 17 | 2019 |
Modeling and analysis of high availability techniques in a virtualized system X Chang, T Wang, RJ Rodríguez, Z Zhang The Computer Journal 61 (2), 180-198, 2018 | 17 | 2018 |
Towards the Detection of Isolation-Aware Malware RJ Rodriguez, IR Gaston, J Alonso IEEE Latin America Transactions 14 (2), 1024-1036, 2016 | 17 | 2016 |
Accurate performance estimation for stochastic marked graphs by bottleneck regrowing RJ Rodríguez, J Júlvez Computer Performance Engineering: 7th European Performance Engineering …, 2010 | 17 | 2010 |
On Challenges in Verifying Trusted Executable Files in Memory Forensics D Uroz, RJ Rodríguez Forensic Science International: Digital Investigation 32, 300917, 2020 | 16 | 2020 |
Fault-tolerant techniques and security mechanisms for model-based performance prediction of critical systems RJ Rodríguez, C Trubiani, J Merseguer Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting …, 2012 | 16 | 2012 |
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application P Fernández-Álvarez, RJ Rodríguez Forensic Science International: Digital Investigation 40, 301342, 2022 | 15 | 2022 |
A Peek under the Hood of iOS Malware L García, RJ Rodríguez 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 15 | 2016 |