Publications

Journals

2017
  1. L. González-Manzano, P. Peris, J. M de Fuentes, C. Camara. Encryption by Heart (EbH) – Using ECG for time-invariant symmetric key generation“. Future Generation Computer Systems, 77:136-148 (2017) [doi]
  2. Pedro Peris-Lopez, Honorio Martín. Hardware Trojans against virtual keyboards on e-banking plat- forms–A proof of concept“. AEU – International Journal of Electronics and Communications, 76:146-151 (2017) [doi]
  3. Carmen Camara, Pedro Peris-Lopez, Lorena Gonzalez-Manzano, Juan Tapiador. Real-time Electrocardiogram Streams for Continuous Authentication“. Applied Soft Computing. In press. [doi]
  4. de Fuentes, J.M; González-Manzano, L.; Serna-Olvera, J.; Veseli, F. “.Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities“. Personal and Ubiquitous Computing, 21(5):869-891 (2017) [doi]
  5. de Fuentes, J.M; González-Manzano, L.; Peris, P.; Tapiador, J.E PRACIS: Privacy-preserving and Aggregatable Cybersecurity Information Sharing“. International Journal of Computers & Security, 69:127-141 (2017) [doi]
  6. Antonio González-Pardo, David Camacho. Solving Strategy Board Games using a CSP-based ACO Approach“. International Journal of Bio-Inspired Computation (IJBIC), 10(2):136-144 (2017) [doi]
  7. Antonio González-Pardo, David Camacho. Solving Strategy Board Games using a CSP-based ACO Approach“. International Journal of Bio-Inspired Computation (IJBIC), 10(2):136-144 (2017) [doi]
  8. S. D. Cardell, A. Fúster-Sabater. Discrete linear models for the generalized self-shrunken sequences“. Finite Fields and Their Applications, 47:222-241 (2017) [doi]
  9. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, M.A. Álvarez Mariño, D. Arroyo Guardeño A comparative study of three Spanish eGoverment smart cards“. Logic Journal of the IGPL, 25(1):42-53 (2017) [doi]
  10. M. Mojica López, J.L. Luis Rodrigo Oliva, V. Gayoso Martínez, L. Hernández Encinas y A. Martín Muñoz Análisis de la Privacidad de WhatsApp Messenger“. Revista Iberoamericana de Sistemas, Cibernética e Informática, RISCI, 14(23):73-78 (2017) [doi]
  11. Hector D. Menendez, Fernando E. B. Otero, David Camacho. Extending the SACOC algorithm through the Nyström method for Big Data Analysis“. International Journal of Bio-Inspired Computation (JBIC), Ed. By InderScience, 10(2):127-135 (2017) [doi]
  12. Antonio González-Pardo, Javier Del Ser, David Camacho Comparative study of pheromone control heuristics in ACO algorithms for solving RCPSP problems“. Applied Soft Computing, 60:241-255 (2017) [doi]
  13. Víctor Rodríguez-Fernández, Antonio González-Pardo, David Camacho Modelling Behaviour in UAV Operations Using Higher Order Double Chain Markov Models“. IEEE Computational Intelligence Magazine, 12(4):28-37 (2017) [doi]
  14. Víctor Rodríguez-Fernández, Héctor D. Menéndez, David Camacho Analysing temporal performance profiles of UAV operators using time series clustering“. Expert Systems with Applications, 70:103-117 (2017) [doi]
  15. Gema Bello Orgaz, Julio C. Hernandez-Castro, David Camacho Detecting discussion communities on vaccination in twitter“. Future Generation Computer Systems, 66:125-136 (2017) [doi]
  16. Antonio González-Pardo, Jason J. Jung, David Camacho ACO-based clustering for Ego Network analysis“. Future Generation Computer Systems, 66:160-170 (2017) [doi]
  17. Antonio González-Pardo, Javier Del Ser, David Camacho Solving strategy board games using a CSP-based ACO approach“. International Journal of Bio-Inspired Computation, 10(2):136-144 (2017) [doi]
  18. Víctor Rodríguez-Fernández, Héctor D. Menéndez, David Camacho A study on performance metrics and clustering methods for analyzing behavior in UAV operations“. Journal of Intelligent and Fuzzy Systems, 32(2):1307-1319 (2017) [doi]
  19. Cristian Ramírez-Atencia, María Dolores Rodríguez-Moreno, David Camacho Handling swarm of UAVs based on evolutionary multi-objective optimization“. Progress in Artificial Intelligence, 6(3):263-274 (2017) [doi]
  20. Cristian Ramírez-Atencia, Gema Bello Orgaz, María D. R.-Moreno, David Camacho Solving complex multi-UAV mission planning problems using multi-objective genetic algorithms“. Soft Computing, 21(17):4883-4900 (2017) [doi]
  21. Alejandro Martín, Héctor D. Menéndez, David Camacho MOCDroid: multi-objective evolutionary classifier for Android malware detection“. Soft Computing, 21(24):7405-7415 (2017) [doi]
2016
  1. Ana I. González-Tablas, J.E. Tapiador. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs“. Sensors 16.5, 674, 16(5):674 (2016) [doi]
  2. de Fuentes, J. M.; González-Manzano, L. ; Mirzaei, O. Privacy models in Wireless Sensor Networks – A survey“. Journal of Sensors, 2016:18 (2016) [doi]
  3. H. Martin, P. Peris-Lopez, J. E. Tapiador, E. San Millan. A New TRNG based on Coherent Sampling with Self-timed Rings“. IEEE Transactions on Industrial Informatics, 12(1):91-100 (2016) [doi]
  4. L. González-Manzano, J. M de Fuentes, S. Pastrana, P. Peris, L. Hernandez. PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things“. Journal of Network and Computer Applications, 71:59-71 (2016) [doi]
  5. S. D. Cardell, A. Fúster-Sabater. Modelling the shrinking generator in terms of linear CA“. Advances in Mathematics of Communications, 10(4):797-809 (2016) [doi]
  6. S. D. Cardell, A. Fúster-Sabater. Linear Models for the Self-Shrinking Generator Based on CA“. Journal of Cellular Automata, 11(2/3):195-211 (2016) [doi]
  7. R. Durán Díaz, L. Hernández Encinas, A. Martín Muñoz, J. Muñoz Masqué, Seok-Zun Song. A characterization of non-prime powers“. Turkish Journal of Mathematics, 41:1248-1259 (2017) [doi]
  8. G. Pastor, M. Romera, M.-F. Danca, A. Martin, A.B. Orue, F. Montoya, L. Hernández Encinas Hidden and non-standard bifurcation diagram of an alternate quadratic system“. International Journal of Bifurcation and Chaos, 26, 1650036 (2016) [14 pages] [doi]
  9. Hector D. Menéndez, Fernando E. B. Otero, and David Camacho Medoid-based clustering using ant colony optimization“. Swarm Intelligence, 10(2):123-145 (2016) [doi]
2015
  1. C. Camara, P. Peris-Lopez, J.E. Tapiador, G. Suarez-Tangil. A Non-invasive Multi-modal Human Identification System combining ECG, GSR and Airflow Biosignals“. Journal of Medical and Biological Engineering, 35(6):735-748 (2015) [doi]
  2. C. Camara, P. Peris-Lopez, J.E. Tapiador. Human Identification Using Compressed ECG Signals“. Journal of Medical Systems, 39(11):148 (2015) [doi]
  3. C. Camara, P. Peris-Lopez, J.E. Tapiador. Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey“. Journal of Biomedical Informatics, 55:272-289 (2015) [doi]
  4. Sergio Pastrana, Agustín Orfila, Juan E. Tapiador and Pedro Peris-Lopez. DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks”. Computer Networks, 80:66-88 (2015) [doi]
  5. S. D. Cardell, A. Fúster-Sabater. Cryptanalysing the shrinking generator“. Procedia Computer Science, 51:2893-2897 (2015) [doi]
  6. O. Delgado, A. Fúster-Sabater. Software Implementation of Cryptographic Sequence Generators over Extended Fields“. Logic Journal of the IGPL, 23(1):73-87 (2015) [doi]
  7. A. Peinado, J. Munilla, A. Fúster-Sabater. Revision of J3Gen and Validity of the Attacks by Peinado et al.“. Sensors, 15:11988-11992 (2015) [doi]
  8. A. Fuentes Rodríguez, L. Hernández Encinas, A. Martín Muñoz, and B. Alarcos Alcázar. Design and Optimization of the Input Modules of a DPA Toolbox“. Logic Journal of the IGPL, 24(1):16-28 (2016) [doi]
  9. A. Fuentes, L. Hernández, A. Martín and B. Alarcos. Design of a Set of Software Tools for Side-Channel Attacks“. IEEE Latin America Transactions, 13(6):1548-1978 (2015) [doi]
  10. J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil, A. Fúster-Sabater. Software Implementation of the SNOW 3G Generator on iOS and Android Platforms“. Logic Journal of the IGPL, 24(1):29-41 (2016) [doi]
  11. V. Gayoso Martínez, L. Hernández Encinas, A. Queiruga Dios. Security and practical considerations when implementing the elliptic curve integrated encryption scheme“. Cryptologia, 39(3):244-269 (2015) [doi]
  12. Sara D. Cardell and Amparo Fúster-Sabater. Recovering the MSS-sequence via CA“. Procedia Computer Science, 80:599-606 (2016) [doi]
  13. Sara D. Cardell and Amparo Fúster-Sabater. Cryptographic Properties of Equivalent Ciphers“. Procedia Computer Science, 80:2236-2240 (2016) [doi]

Conferences

2017
  1. Mirzaei, O.; Tapiador, J.E; Tangil, G.; de Fuentes, J.M. Triaging Android Applications using Speculative Information Flows. Asia CCS, 640:651 (2017) [pdf] [doi]
  2. L. González-Manzano, M. Slaymaker, J. M de Fuentes, D. Vayenas. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance. SecureComm 2017 [pdf]
  3. S. D. Cardell, A. Fúster-Sabater, Li Bin. A New Simple Attack on a Wide Class of Cryptographic Sequence Generators“. Proceedings of the International Joint Conference SOCO’17-CISIS’17-ICEUTE’17, León, Spain, September 6–8, 2017, 649:533-543 (2017) [doi]
  4. S. D. Cardell, A. Fúster-Sabater. Linear Models for High-Complexity Sequences“. Proceedings of the 17th International Conference on Computational Science and Its Applications, ICCSA 2017, Trieste, Italy, July 3-6, 2017, LNCS 10404:314-324 (2017) [doi]
  5. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, and R. Durán Díaz. A Proposal for Using a Cryptographic National Identity Card in Social Networks“. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’17), Advances in Intelligent Systems and Computing, 649:651-660 (2017) [doi]
  6. A. Beatriz Orúe, L. Hernández Encinas, V. Fernández, F. Montoya. A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT“. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’17), Advances in Intelligent Systems and Computing, 649:672-682 (2017) [doi]
  7. M. Mójica López, J. L. Rodrigo Oliva, V. Gayoso Martínez, L. Hernández Encinas y A. Martín Muñoz. Análisis de la privacidad de WhatsApp Messenger“. Décima sexta Conferencia Iberoamericana en Sistemas, Cibernética e Informática (CISCI 2017), Actas 109-114
  8. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz and J. Zhang. Breaking a Hitga2 Protocol with Low Cost Technology“. 3rd International Conference on Information Systems Security and Privacy (ICISSP’2017) Proceedings, 579-584 (2017)
  9. S. D. Cardell, A. Fúster-Sabater. Linear models for the modified self-shrinking generator“. Extended Abstracts of the 16th International Conference on Computer Aided Systems Theory, EUROCAST 2017, Las Palmas de Gran Canaria, Canary Islands, Spain, February 19-24, 2017, EUROCAST 2017, pp. 9-11, 2017
  10. Alejandro Martín, Félix Fuentes-Hurtado, Valery Naranjo, David Camacho Evolving Deep Neural Networks architectures for Android malware classification“. CEC 2017, San Sebastian, Spain, 1659-1666 (2017) [doi]
  11. Cristian Ramírez-Atencia, Víctor Rodríguez-Fernández, Antonio González-Pardo, David Camacho New Artificial Intelligence approaches for future UAV Ground Control Stations“. CEC 2017, San Sebastian, Spain, 2775-2782 (2017) [doi]
  12. Cristian Ramírez-Atencia, Sanaz Mostaghim, David Camacho A knee point based evolutionary multi-objective optimization for mission planning problems“. GECCO 2017, Berlin, Germany, 1216-1223 (2017) [doi]
2016
  1. L. González-Manzano, J. M de Fuentes, K.-K. R. Choo. ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments“. SecureComm 2016 [pdf] [doi]
  2. R. Garrido-Pelaz, L. González-Manzano, S. Pastrana. Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing“. WISCS 2016 [pdf] [doi]
  3. A. Calleja, J.E. Tapiador, J. Caballero. A Look into 30 Years of Malware Development from a Software Metrics Perspective“. RAID 2016 [pdf] [doi]
  4. S. Pastrana, J. Rodriguez-Canseco, A. Calleja. ArduWorm: A Functional Malware Targeting Arduino Devices“. JNIC 2016, 116:124 (2016) [pdf]
  5. Ana I. González-Tablas. Analysis of the alignment of Spanish Master’s programs to US National Cybersecurity Workforce Framework“. JNIC 2016, 185:191 (2016) [pdf] [doi]
  6. R. Durán Díaz, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz. A study on the performance of secure elliptic curves for cryptographic purposes“. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’16). International Joint Conference SOCO’16-CISIS’16-ICEUTE’16, Advances in Intelligent Systems and Computing, 527:658-667 (2016) [doi]
  7. S. D. Cardell, A. Fúster-Sabater. Modelling the MSSG in Terms of Cellular Automata“. Proceedings of the 16th International Conference on Computational Science and Its Applications, ICCSA 2016, Beijing, China, July 4-7, 2016, ICCSA 2016, Part I, LNCS 9786, pp. 514-520, 2016 [doi]
  8. S. D. Cardell, A. Fúster-Sabater. The modified self-shrinking generator via the generalized self-shrinking generator“. Proceedings of the 16th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE 2016, Costa Ballena (Rota), Cadiz, Spain, July 4-8, 2016, CMMSE 2016, pp. 326-328, 2016 [doi]
  9. Sara D. Cardell, Amparo Fúster-Sabater. The modified self-shrinking generator via the generalized self-shrinking generator“. Proceedings of the 16th International Conference on Computational and Mathematical Methods in Science and Engineering, CMMSE 2016, 4-8 Julio, 2016, pp. 326-328, 2016
  10. Sara D. Cardell, Amparo Fúster-Sabater. O gerador self-shrinking modificado via o gerador self-shrinking generalizado“. Anais da V Jornada da Informação, 13-14 de octubre de 2016, São José do Rio Preto-SP, 2 pp
  11. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, O. Martínez-Graullera, J. Villazón-Terrazas. A comparison of computer-based technologies suitable for cryptographic attacks“. International Workshop on Computational Intelligence in Security for Information Systems (CISIS’16). International Joint Conference SOCO’16-CISIS’16-ICEUTE’16, Advances in Intelligent Systems and Computing 527, 622-630 (2016) [doi]
  12. S. D. Cardell, A. Fúster Sabater. Modelos lineales basados en CA para las secuencias auto-shrinking“. XIV Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2016), 30-35 (2016) [pdf]
  13. Raúl Durán Díaz, Víctor Gayoso Martínez, Luis Hernández Encinas. Generación de primos demostrables: implementación y resultados“. XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016), Actas 58-63-46 (2016)
  14. A.B. Orúe, A. Fúster, V. Fernández, F. Montoya, L.Hernández, A. Martín. Herramientas visuales usadas en criptografía caótica útiles para el análisis de secuencias pseudoaleatorias“. XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016), Actas 180-185 (2016)
  15. V. Gayoso Martínez, L. Hernández Encinas, A. Martín del Rey and R. Durán Díaz. Análisis de los métodos de generación de curvas elípticas seguras“. Segundas Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2016), Actas 87-93 (2016)
2015
  1. Ana Maria Nogareda and David Camacho. Optimizing satisfaction in a multi-courses allocation problem“. 9th International Symposium on Intelligent Distributed Computing – IDC’2015, 7th-9th October 2015, Guimarães, Portugal [doi]
  2. Gema Bello-Orgaz, Cristian Ramirez-Atencia, Jaime Fradera-Gil and David Camacho. GAMPP: Genetic Algorithm for UAV Mission Planning Problems“. 9th International Symposium on Intelligent Distributed Computing – IDC’2015, 7th-9th October 2015, Guimarães, Portugal [doi]
  3. Rodríguez-Fernández, Víctor; Menéndez, Héctor D; Camacho, David User Profile Analysis for UAV operators in a Simulation Environment“. International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2014). Madrid, Spain. September 21-23, 2015 [doi]
  4. Rodriguez-Fernandez, Victor; D.Menendez, Hector; Camacho, David. Design and Development of a Lightweight Multi-UAV Simulator“. Proceedings of 2015 IEEE International Conference on Cybernetics (CYBCONF 2015). Gdynia Poland, June 24-26, 2015 [doi]
  5. David Arroyo, Jesús Díaz, Francisco B. Rodríguez. Non-conventional digital signatures and their implementations – A Review“. 8 th International Conference on Computational Intelligence in Security for Information Systems (CISIS’15). 15th-17th Burgos, Spain [doi]
  6. David Arroyo, Jesús Díaz, Francisco B. Rodríguez. On the difficult tradeoff between security and privacy: challenges for the management of digital identities“. 8 th International Conference on Computational Intelligence in Security for Information Systems (CISIS’15). 15th-17th Burgos, Spain [doi]
  7. S. D. Cardell, A. Fúster-Sabater. Performance of the cryptanalysis over the shrinking generator“. 8th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2015, 15-17 June, 2015, Burgos, Spain [doi]
  8. V. Gayoso Martínez, L. Hernández Encinas, and Seok-Zun Song. Group signatures in practice“. 8th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2015, 15-17 June, 2015, Burgos, Spain [doi]
  9. D. Arroyo Guardeño, V. Gayoso Martínez, L. Hernández Encinas, and A. Martín Muñoz. Using smart cards for authenticating in public services: A comparative study“. 8th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2015, 15-17 June, 2015, Burgos, Spain [doi]
  10. Hector Menendez and David Camacho GANY: A Genetic Spectral-based Clustering Algorithm for Large Data Analysis“. IEEE Congress on Evolutionary Computation (CEC). IEEE Press. Sendai, Japan. May 25-28, 2015 [doi]
  11. Rodriguez-Fernandez, Victor; Ramirez-Atencia, Cristian; Camacho, David. A Multi-UAV Mission Planning Videogame-based Framework for Player Analysis“. IEEE Congress on Evolutionary Computation (CEC). IEEE Press. Sendai, Japan. May 25-28, 2015 [doi]
  12. S. D. Cardell, A. Fúster-Sabater. Linealización del generador auto-shrinking a través de autómatas celulares“. Libro de resúmenes de Conferencias y Pósteres del Congreso bienal RSME, 2015. Sesión S16, Matemáticas de la teoría de la información Granada, 2-6 Febrero 2015, pp. 107-108 [pdf]
  13. S. D. Cardell, A. Fúster-Sabater. A simple linearization of the self-shrinking generator“. A. Quesada-Arencibia et al. (Eds.): EUROCAST 2015, Extended Abstracts, pp. 3-5, 2015 [doi]
  14. A. Peinado, J. Munilla, A. Fúster-Sabater. Stream Ciphers Based on DLFSR: A Classification“. A. Quesada-Arencibia et al. (Eds.): EUROCAST 2015, Extended Abstracts, pp. 25-27, 2015 [pdf]
  15. Hector Menendez and David Camacho. MOGCLA: A Multi-Objective Genetic Clustering Algorithm for Large Data Analysis“. Genetic and Evolutionary Computation Congress, 2015 [doi]
  16. Ramirez-Atencia, Cristian; Bello-Orgaz, Gema; R-Moreno, María D., and Camacho, David. A Hybrid MOGA-CSP for Multi-UAV Mission Planning“. Genetic and Evolutionary Computation Conference (GECCO 2015) Student Workshop [doi]
  17. Ramirez-Atencia, Cristian; Bello-Orgaz, Gema; R-Moreno, María D., and Camacho, David. Performance Evaluation of Multi-UAV Cooperative Mission Planning Models“. 7th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2015) [doi]
  18. S. D. Cardell, A. Fúster-Sabater. Cryptanalysing the shrinking generator“. Proceedings of the 15th International Conference on Computational Science, ICCS 2015, Computational Science at the Gates of Nature, Reykjavík, Iceland, 1-3 June, 2015, 2293-2897
  19. S. D. Cardell, A. Fúster-Sabater. Modelización lineal de generadores basados en decimación“. Memorias del VIII Congreso Iberoamericano de Seguridad Informática CIBSI 2015, pp. 102-107. Sesión 4: Criptografía. Sangolqui, Quito, Ecuador, 10–12 Noviembre, 2015
  20. Sara D. Cardell and Amparo Fúster-Sabater. A Simple Linearisation of the Self-shrinking Generator“. Computer Aided Systems Theory (EUROCAST 2015), Lecture Notes in Computer Science 9520, 10-17 (2015) [doi]
  21. V. Gayoso Martínez, F. Hernández Álvarez, L. Hernández Encinas, C. Sánchez Ávila. A new edit distance for fuzzy hashing applications“. The 2015 International Conference on Security and Management (SAM’15), Worldcomp 2015, 326–332 (2015) [pdf]
  22. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, M. A. Álvarez Mariño. A Java implementation of a multisignature scheme“. The 2015 International Conference on Security and Management (SAM’15), Worldcomp 2015, 333–339 (2015) [pdf]
  23. S. D. Cardell, A. Fúster Sabater. Linealización del generador auto-shrinking a través de autómatas celulares“. Libro de resúmenes de Conferencias y Pósteres del Congreso bienal RSME, 2015. Sesión S16 Matemáticas de la Teoría de la Información, 107-108 (2015) [pdf]
  24. Lorena González Manzano, José María de Fuentes, V. Gayoso Martínez. Aplicación del cifrado con preservación del formato para eventos de ciberseguridad“. Primeras Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2015), Actas 88-89 (2015) [pdf]
  25. V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz, J.M. de Fuentes, L. González Manzano. Cifrado de datos con preservación del formato“. Primeras Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2015), Actas 110–115 (2015) [pdf]
2014
  1. Héctor D. Menéndez, Fernando B. Otero and David Camacho MACOC: A Medoi-based ACO Clustering Algorithm“. Ninth International Conference on Swarm Intelligence, Brussels, Belgium, 10th-12th September, 2014