Jorge Blasco Alís
Cited by
Cited by
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
A multi-agent scanner to detect stored-XSS vulnerabilities
E Galán, A Alcaide, A Orfila, J Blasco
International Conference for Internet Technology and Secured Transactions …, 2010
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
Automated generation of colluding apps for experimental research
J Blasco, TM Chen
Journal of Computer Virology and Hacking Techniques 14 (2), 127-138, 2018
Improving network intrusion detection by means of domain-aware genetic programming
J Blasco, A Orfila, A Ribagorda
International Conference on Availability, Reliability, and Security (ARES …, 2010
A framework for avoiding steganography usage over HTTP
J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
On the feasibility of low-cost wearable sensors for multi-modal biometric verification
J Blasco, P Peris-Lopez
Sensors 18 (9), 2782, 2018
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape
P Sivakumaran, J Blasco
28th USENIX Security Symposium (USENIX Security 19), 2019
Towards Automated Android App Collusion Detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Innovations in Mobile Privacy and Security 1575, 29-37, 2016
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
Intrusion Detection
TM Chen, J Blasco, J Alzubi, O Alzubi
IET Engineering & Technology Reference, 1-9, 2014
Bypassing information leakage protection with trusted applications
J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda
Computers & Security 31 (4), 557–568, 2012
A review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
J Qadri, TM Chen, J Blasco
International Journal on Cyber Situational Awareness 1 (1), 2016
Hindering data theft with encrypted data trees
J Blasco, JE Tapiador, P Peris-Lopez, G Suarez-Tangil
Journal of Systems and Software 101, 147-158, 2015
A low energy profile: Analysing characteristic security on ble peripherals
P Sivakumaran, J Blasco Alis
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20