Applications of distributed ledger technologies to the internet of things: A survey Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang ACM computing surveys (CSUR) 52 (6), 1-34, 2019 | 161 | 2019 |
Attack trees with sequential conjunction R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua IFIP International Information Security and Privacy Conference, 339-353, 2015 | 124 | 2015 |
Microaggregation-and permutation-based anonymization of movement data J Domingo-Ferrer, R Trujillo-Rasua Information Sciences 208, 55-80, 2012 | 122 | 2012 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 87 | 2018 |
The Poulidor distance-bounding protocol R Trujillo-Rasua, B Martin, G Avoine Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 81 | 2010 |
Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016 | 67 | 2016 |
Distance-bounding protocols: Verification without time and location S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua 2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018 | 65 | 2018 |
On the privacy offered by (k, δ)-anonymity R Trujillo-Rasua, J Domingo-Ferrer Information Systems 38 (4), 491-494, 2013 | 62 | 2013 |
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0 O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua International Conference on Quantitative Evaluation of Systems, 159-162, 2016 | 61 | 2016 |
k-metric antidimension: A privacy measure for social graphs R Trujillo-Rasua, IG Yero Information Sciences 328, 403-417, 2016 | 53 | 2016 |
Privacy-preserving publication of trajectories using microaggregation J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010 | 46 | 2010 |
Traceability in supply chains: A Cyber security analysis NF Syed, SW Shah, R Trujillo-Rasua, R Doss Computers & Security 112, 102536, 2022 | 39 | 2022 |
Attribute Evaluation on Attack Trees with Incomplete Information A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua Computers & Security, 101630, 2019 | 37 | 2019 |
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 36 | 2012 |
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland 2019 29th International Telecommunication Networks and Applications …, 2019 | 34 | 2019 |
Secure attribute-based search in RFID-based inventory control systems R Doss, R Trujillo-Rasua, S Piramuthu Decision Support Systems 132, 113270, 2020 | 33 | 2020 |
Refinement-aware generation of attack trees O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, TAC Willemse Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 31 | 2017 |
APT attacks on industrial control systems: A tale of three incidents R Kumar, R Kela, S Singh, R Trujillo-Rasua International Journal of Critical Infrastructure Protection 37, 100521, 2022 | 27 | 2022 |
Distance bounding facing both mafia and distance frauds R Trujillo-Rasua, B Martin, G Avoine IEEE Transactions on Wireless Communications 13 (10), 5690-5698, 2014 | 24 | 2014 |
Analysis of centrality measures under differential privacy models J Laeuchli, Y Ramírez-Cruz, R Trujillo-Rasua Applied Mathematics and Computation 412, 126546, 2022 | 22 | 2022 |