Key management systems for sensor networks in the context of the Internet of Things R Roman, C Alcaraz, J Lopez, N Sklavos Computers & Electrical Engineering 37 (2), 147-159, 2011 | 430 | 2011 |
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018 | 427 | 2018 |
Critical infrastructure protection: Requirements and challenges for the 21st century C Alcaraz, S Zeadally International journal of critical infrastructure protection 8, 53-66, 2015 | 418 | 2015 |
Wireless sensor networks and the internet of things: Do we need a complete integration? C Alcaraz, P Najera, J Lopez, R Roman 1st International Workshop on the Security of the Internet of Things (SecIoT …, 2010 | 241 | 2010 |
A security analysis for wireless sensor mesh networks in highly critical systems C Alcaraz, J Lopez IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 166 | 2010 |
Analysis of security threats, requirements, technologies and standards in wireless sensor networks J Lopez, R Roman, C Alcaraz International School on Foundations of Security Analysis and Design, 289-338, 2007 | 158 | 2007 |
Digital twin: A comprehensive survey of security threats C Alcaraz, J Lopez IEEE Communications Surveys & Tutorials 24 (3), 1475-1503, 2022 | 157 | 2022 |
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes R Roman, C Alcaraz, J Lopez Mobile Networks and Applications 12, 231-244, 2007 | 154 | 2007 |
OCPP protocol: Security threats and challenges C Alcaraz, J Lopez, S Wolthusen IEEE Transactions on Smart Grid 8 (5), 2452-2459, 2017 | 136 | 2017 |
Towards privacy protection in smart grid S Zeadally, ASK Pathan, C Alcaraz, M Badra Wireless personal communications 73, 23-50, 2013 | 122 | 2013 |
Current cyber-defense trends in industrial control systems JE Rubio, C Alcaraz, R Roman, J Lopez Computers & Security 87, 101561, 2019 | 116 | 2019 |
Cyber stealth attacks in critical information infrastructures L Cazorla, C Alcaraz, J Lopez IEEE Systems Journal 12 (2), 1778-1792, 2016 | 89 | 2016 |
Critical control system protection in the 21st century C Alcaraz, S Zeadally Computer 46 (10), 74-83, 2013 | 89 | 2013 |
Security aspects of SCADA and DCS environments C Alcaraz, G Fernandez, F Carvajal Critical Infrastructure Protection: Information Infrastructure Models …, 2012 | 84 | 2012 |
Wide-area situational awareness for critical infrastructure protection C Alcaraz, J Lopez Computer 46 (4), 30-37, 2013 | 82 | 2013 |
Security of industrial sensor network-based remote substations in the context of the internet of things C Alcaraz, R Roman, P Najera, J Lopez Ad Hoc Networks 11 (3), 1091-1104, 2013 | 77 | 2013 |
Analysis of requirements for critical control systems C Alcaraz, J Lopez International journal of critical infrastructure protection 5 (3-4), 137-145, 2012 | 66 | 2012 |
Selecting key management schemes for WSN applications C Alcaraz, J Lopez, R Roman, HH Chen Computers & Security 31 (8), 956-966, 2012 | 65 | 2012 |
Smart grid privacy: Issues and solutions F Siddiqui, S Zeadally, C Alcaraz, S Galvao 2012 21st International Conference on Computer Communications and Networks …, 2012 | 64 | 2012 |
The role of wireless sensor networks in the area of critical information infrastructure protection R Roman, C Alcaraz, J Lopez information security technical report 12 (1), 24-31, 2007 | 63 | 2007 |