Name
Papers
Collaborators
JOSÉ M. FERNANDEZ
51
94
Citations 
PageRank 
Referers 
222
25.79
649
Referees 
References 
982
440
Search Limit
100982
Title
Citations
PageRank
Year
Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers00.342021
Risk Assessment Of Cyber-Attacks On Telemetry-Enabled Cardiac Implantable Electronic Devices (Cied)00.342021
Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm00.342021
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings00.342020
Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input00.342020
Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED).00.342019
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings.00.342018
A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks.00.342018
Fast selection of the sea clutter preferential distribution with neural networks.00.342018
Survey of publicly available reports on advanced persistent threat actors.70.552018
Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings10.342018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.10.362018
POISED: Spotting Twitter Spam Off the Beaten Paths.70.452017
An Empirical Analysis Of Risk Aversion In Malware Infections00.342017
Age and gender as independent risk factors for malware victimisation.10.362017
A Modbus Command And Control Channel40.512016
A Practical flow white list approach for SCADA systems.00.342016
Improved Shape Parameter Estimation In Pareto Distributed Clutter With Neural Networks00.342016
Providing SCADA Network Data Sets for Intrusion Detection Research.50.442016
Improved Shape Parameter Estimation In K Clutter With Neural Networks And Deep Learning00.342016
Follow the traffic: Stopping click fraud by disrupting the value chain.00.342016
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions170.622015
Measuring the health of antivirus ecosystems.00.342015
Modelling physical impact of cyber attacks00.342014
Computer security clinical trials: lessons learned from a 4-month pilot study10.382014
Risk prediction of malware victimization based on user behavior00.342014
Scalable Security Verification of Software at Compile Time00.342014
Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape10.752014
A comprehensive study of queue management as a DoS counter-measure40.442013
Confidentiality-Preserving query execution of fragmented outsourced data30.392013
A clinical study of risk factors related to malware infections261.332013
An isolated virtual cluster for SCADA network security research70.792013
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.00.342013
Semantic-Based Context-Aware Alert Fusion For Distributed Intrusion Detection Systems50.442013
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework100.482013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.00.342013
Ethical and secure data sharing across borders10.382012
Aligot: cryptographic function identification in obfuscated binary programs251.172012
Methodology for a field study of anti-malware software30.482012
Finite element method based design and optimisation methodology for piezoelectric ultrasonic motors00.342010
Isolated virtualised clusters: testbeds for high-risk security experimentation and training70.602010
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet90.722010
Evaluating security products with clinical trials50.902009
Optimising sybil attacks against P2P-based botnets60.482009
Alambic: a privacy-preserving recommender system for electronic commerce160.752008
Sybil attacks as a mitigation strategy against the Storm botnet241.182008
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?161.642008
Optimising Networks Against Malware20.432007
Queue management as a DoS counter-measure?70.572007
Optimising malware10.412006
  • 1
  • 2