The data shown for the Universidad Carlos III de Madrid are partial, as they are intended to answer 2 questions:

  • Who is researching a specific topic?
  • What is an expert, group or particular department researching?

The search results will adhere to the following limits: active Researchers at Carlos III University of Madrid, Projects since 2006 and Publications, Theses, Patents and Software since 2008.

Fuentes Garcia Romero De Tejada, Jose Maria De jfuentes@inf.uc3m.es

Publications

Authentication and Privacy in Vehicular Networks

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ribagorda Garnacho, Arturo

Upgrade (p. 72-78) - 2/2010

  • ISSN 1684-5285
Open Access

Characterizing poisoning attacks on generalistic multi-modal AI models

  • Ibañez Lissen, Luis
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Garcia Alfaro, Joaquin

Information Fusion (p. 1-15) - 1/2024

  • EISSN 1872-6305
  • ISSN 1566-2535

CooPeD: Co-owned Personal Data management

  • Gonzalez Manzano, Lorena
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Ribagorda Garnacho, Arturo

COMPUTERS & SECURITY (p. 41-65) - 11/2014

10.1016/j.cose.2014.06.003 View at source

  • EISSN 1872-6208
  • ISSN 0167-4048
Open Access

Design recommendations for online cybersecurity courses

  • Gonzalez Manzano, Lorena
  • Fuentes Garcia Romero De Tejada, Jose Maria De

COMPUTERS & SECURITY (p. 238-256) - 1/2019

https://doi.org/10.1016/j.cose.2018.09.009 View at source

  • EISSN 1872-6208
  • ISSN 0167-4048
Open Access

Editorial: Security and Privacy in Internet of Things

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Lopez, Javier
  • Peris Lopez, Pedro
  • Choo, Kim Kwang Raymond

MOBILE NETWORKS & APPLICATIONS (p. 878-880) - 6/2019

10.1007/s11036-018-1150-8 View at source

  • EISSN 1572-8153
  • ISSN 1383-469X
Open Access

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

  • Peris Lopez, Pedro
  • Gonzalez Manzano, Lorena
  • Camara Nuñez, Maria Carmen
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Future Generation Computer Systems-The International Journal of eScience (p. 67-77) - 4/2018

https://doi.org/10.1016/j.future.2017.11.037 View at source

  • EISSN 1872-7115
  • ISSN 0167-739X
Open Access

Encryption by Heart (EbH)-Using ECG for time-invariant symmetric key generation

  • Gonzalez Manzano, Lorena
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Peris Lopez, Pedro
  • Camara Nuñez, Maria Carmen

Future Generation Computer Systems-The International Journal of eScience (p. 136-148) - 12/2017

https://doi.org/10.1016/j.future.2017.07.018 View at source

  • EISSN 1872-7115
  • ISSN 0167-739X
Open Access

Extended U plus F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks

  • Gonzalez Manzano, Lorena
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Ribagorda Garnacho, Arturo

JOURNAL OF SYSTEMS AND SOFTWARE (p. 50-71) - 8/2014

https://doi.org/10.1016/j.jss.2014.04.044 View at source

  • EISSN 1873-1228
  • ISSN 0164-1212
Open Access

External Monitoring Changes in Vehicle Hardware Profiles: Enhancing Automotive Cyber-Security

  • Patsakis, Constantinos
  • Dellios, Kleanthis
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Casino, Fran
  • Solanas, Agusti

Journal of Hardware and Systems Security (p. 289-303) - 8/2019

https://doi.org/10.1007/s41635-019-00076-8 View at source

Open Access

Guest Editorial: Special Section: Advances in Information Technology

  • Yu, Fei
  • Chang, Chin Chen
  • Sun, Depang
  • Ahmad, Iftikhar
  • Zang, Jun
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Computer Science and Information Systems - 9/2017

  • EISSN 2406-1018
  • ISSN 1820-0214

This researcher has no books.

Open Access

Dynamic Risk Assessment in IT Environments: A Decision Guide. In: Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

  • Mirzaei, Omid
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution (p. 234-263) - 6/2018

Editor: IGI GLOBAL

10.4018/978-1-5225-4763-1.ch009 View at source

  • ISBN 9781522547631

Overview of Security Issues in Vehicular Ad-hoc Networks. In: Handbook of Research on Mobility and Computing: Envolving Technologies and Ubiquitous Impacts

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ribagorda Garnacho, Arturo

Handbook of Research on Mobility and Computing: Envolving Technologies and Ubiquitous Impacts (p. 894-911) - 4/2011

Editor: IGI GLOBAL

  • ISBN 978-1-609-60042-6
Open Access

Security Protocols for Networks and Internet: A Global Vision. In: Computer and Network Security Essentials

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Hernández Encinas, Luis
  • Ribagorda Garnacho, Arturo

Computer and Network Security Essentials (p. 135-151) - 12/2018

Editor: SPRINGER

https://doi.org/10.1007/978-3-319-58424-9_8 View at source

  • ISBN 978-3-319-58423-2

User-Managed Access Control in Web Based Social Networks. In: Security and Privacy Preserving in Social Networks

  • Gonzalez Manzano, Lorena
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Ribagorda Garnacho, Arturo

Security and Privacy Preserving in Social Networks (p. 97-137) - 8/2013

Editor: SPRINGER

https://doi.org/10.1007/978-3-7091-0894-9_4 View at source

  • ISBN 978-3-7091-0893-2

A Framework for Acquiring and Analyzing Traces from Cryptographic Devices

  • Blanco Blanco, Alfonso
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Hernández Encinas, Luis
  • Martin Muñoz, Agustin
  • Rodrigo Oliva, Jose Luis
  • Sanchez Garcia, J. Ignacio
... View more Collapse

13th EAI International Conference on Security and Privacy in Communication Networks 2017 (SecureComm). SePrIoT workshop (p. 283-300) - 2017

Editor: SPRINGER

https://doi.org/10.1007/978-3-319-78816-6_20 View at source

  • ISBN 978-3-319-78815-9

Access control for the Cloud based on multi-device authentication

  • Gonzalez Manzano, Lorena
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Orfila Diaz-pabon, Agustin

14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15) (p. 856-863) - 2015

Editor: IEEE Publishing Services

https://doi.org/10.1109/trustcom.2015.457 View at source

  • ISBN 978-1-4673-7952-6/15

Analysis of the INCOSE Rules for Writing Good Requirement in Industry: A Tool Based Study

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Fuentes Torres, Jose Miguel
  • Fraga Vazquez, Anabel
  • Genova Fuster, Gonzalo
  • Alvarez Rodriguez, Jose Maria
  • Llorens Morillo, Juan Bautista

Sixth International Conference on Complex Systems Design & Management, CSD&M 2015 (p. 283-283) - 2016

Editor: SPRINGER

https://doi.org/10.1007/978-3-319-26109-6_21 View at source

  • ISBN 978-3-319-26107-2

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families

  • Mirzaei, Omid
  • Suarez De Tangil Rotaeche, Guillermo Nicolas
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Estevez Tapiador, Juan Manuel
  • Stringhini, Gianluca

2019 ACM Asia Conference on Computer and Communications Security (p. 307-314) - 2019

Editor: Association for Computing Machinery (ACM)

10.1145/3321705.3329854 View at source

  • ISBN 978-1-4503-6752-3

Applying INCOSE Rules for writing high-quality requirements in Industry

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Fuentes Torres, Jose Miguel
  • Fraga Vazquez, Anabel
  • Genova Fuster, Gonzalo
  • Parra Corredor, Eugenio
  • Alvarez Rodriguez, Jose Maria
  • Llorens Morillo, Juan Bautista
... View more Collapse

26th Annual INCOSE International Symposium (IS 2016) (p. 1875-1889) - 2016

Editor: WILEY

https://doi.org/10.1002/j.2334-5837.2016.00267.x View at source

Open Access

Ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments

  • Gonzalez Manzano, Lorena
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Choo, K. Raymond

12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) (p. 412-428) - 2017

Editor: SPRINGER

https://doi.org/10.1007/978-3-319-59608-2 View at source

  • ISBN 978-3-319-59608-2

CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ribagorda Garnacho, Arturo

Third International Conference on Availability, Reliability and Security (ARES '08) - 2008

  • ISBN 978-0-7695-3102-1

Characterizing the MasterPrint threat on Android devices with capacitive sensors

  • Peidro Paredes, Miguel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Velasco Gomez, Miguel

ACM International Conference Proceeding Series - 2023

https://doi.org/10.1145/3600160.3600177 View at source

Open Access

Control de acceso en redes sociales web

  • Gonzalez Manzano, Lorena
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Ramos Alvarez, Benjamin

XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012) - 2012

Diseño de un protocolo para el envío de notificaciones de tráficoal vehículo a través de tecnologías ITS

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Gonzalez Manzano, Lorena
  • Ribagorda Garnacho, Arturo

XII Congreso Español sobre Sistemas Inteligentes de Transporte - 2012

This researcher has no working papers.

This researcher has no technical reports.

TIN2009-13461 - Arquitectura de seguridad y generación de pruebas electrónicas forenses en entornos vehiculares

  • Ribagorda Garnacho, Arturo
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ramos Alvarez, Benjamin
  • Alcaide Raya, Almudena
  • Palomar Gonzalez, Esther
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Period: 01-01-2010 - 31-12-2013

Type of funding: National

Funding entity: MINISTERIO DE CIENCIA E INNOVACION

Asesoramiento para realización de Informe Pericial "Análisis de las cuestiones sobre seguridad involucradas en la avería sufrida por operador móvil"

  • Ribagorda Garnacho, Arturo
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

Period: 10-12-2014 - 09-12-2015

Type of funding: Regional

Funding entity: JAZZ TELECOM S.A.U.

Auditoria de Seguridad y Optimización del Sistema Informático del Grupo Eurotabaco.

  • Ribagorda Garnacho, Arturo
  • Blasco Alis, Jorge
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Period: 01-08-2009 - 01-09-2009

Funding entity: BUSINESS INTELLIGENCE TECHNOLOGY S.L.L.

Auditoría de Calidad de Componentes Software y Servicios de Firma Electrónica basados en el DNI-E

  • Ribagorda Garnacho, Arturo
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Hernandez Castro, Julio Cesar
  • Estevez Tapiador, Juan Manuel
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Period: 30-06-2007 - 30-12-2007

Funding entity: MINISTERIO DE ENERGIA, TURISMO Y AGENDA DIGITAL

S2013/ICE-3095 - CIBERDINE-CM. Ciberseguridad:Datos, información, riesgos

  • Ribagorda Garnacho, Arturo
  • Estevez Tapiador, Juan Manuel
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ramos Alvarez, Benjamin
  • Peris Lopez, Pedro
  • Diaz Orfila ., Agustin
  • Blasco Alis, Jorge
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Suarez De Tangil Rotaeche, Guillermo Nicolas
  • Pastrana Portillo, Sergio
  • Gonzalez Manzano, Lorena
  • Camara Nuñez, Maria Carmen
  • Garrido Pelaz, Roberto
  • Mirzaei, Omid
... View more Collapse

Period: 01-10-2014 - 31-12-2018

Type of funding: Regional

Funding entity: CAM. CONSEJERÍA DE EDUCACIÓN E INVESTIGACION

CAVTIONS-CM-UC3M - Ciberamenazas Avanzadas: analítica de mecanismos y vínculos sociopolíticos

  • Quispe Remon, Florabel
  • Gonzalez Manzano, Lorena
  • Sanchez Sanchez, Angel
  • Fernandez Liesa, Carlos Ramon
  • Manero Salvador, Ana Maria
  • Estevez Tapiador, Juan Manuel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Ramos Ibañez, Cristina
... View more Collapse

Period: 01-01-2020 - 31-03-2022

Type of funding: Regional

Funding entity: CAM. CONSEJERÍA DE EDUCACIÓN E INVESTIGACION

Componentes de inteligencia predictiva para Centros de Operaciones de Seguridad

  • Estevez Tapiador, Juan Manuel
  • Orfila Diaz-pabon, Agustin
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ribagorda Garnacho, Arturo
  • Ramos Alvarez, Benjamin
  • Peris Lopez, Pedro
  • Blasco Alis, Jorge
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Suarez De Tangil Rotaeche, Guillermo Nicolas
  • Pastrana Portillo, Sergio
  • Gonzalez Manzano, Lorena
... View more Collapse

Period: 30-01-2014 - 29-07-2014

Type of funding: Regional

Funding entity: INDRA SISTEMAS, S.A.

Consultancy Agreement about activities concerning cybersecurity research and innovation

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Peris Lopez, Pedro
  • Gonzalez Manzano, Lorena
  • Camara Nuñez, Maria Carmen

Period: 01-07-2018 - 01-07-2019

Type of funding: International

Funding entity: STRATHMORE UNIVERSITY

Contrato de asesoramiento para realización de informe pericial en el marco del proceso judicial existente entre Playthe.net y Deloitte Consulting S.L.U.

  • Gonzalez Manzano, Lorena
  • Ribagorda Garnacho, Arturo
  • Fuentes Garcia Romero De Tejada, Jose Maria De

Period: 10-05-2019 - 30-04-2022

Type of funding: Regional

Funding entity: DELOITTE CONSULTING, S.L.

Contrato de asesoramiento para realización de informe pericial sobre el procedimiento arbitral existente entre Cuñado S.A. y Kourtel S.L.

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

Period: 12-01-2015 - 06-04-2015

Type of funding: Regional

Funding entity: WORLD-ENG XXI S.L.

Improvements On The Enforcement Process Based On Intelligent Transportation

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez-tablas Ferreres, Ana Isabel
  • Ribagorda Garnacho, Arturo

Reading date: 05-07-2012

Techniques for Advanced Android Malware Triage

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Mirzaei, Omid
  • Estevez Tapiador, Juan Manuel

Reading date: 06-02-2019

Answer2Pass Pro, multiplatform evaluation game

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

14/7/2015

Date filed: 14-07-2015

Plug-in de MONOCLE para extraer rastros del uso del almacenamiento en BOX

  • Rodriguez Canseco, Jorge
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Peris Lopez, Pedro

17/12/2015

Date filed: 17-12-2015

Plug-in de MONOCLE para extraer rastros del uso del almacenamiento en iCloud

  • Rodriguez Canseco, Jorge
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena
  • Peris Lopez, Pedro

17/12/2015

Date filed: 17-12-2015

Procedimiento y sistema de acreditación de autorizaciones para vehículos en circulación

  • Gonzalez-tablas Ferreres, Ana Isabel
  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

4/4/2016

Date filed: 20-06-2013

Date issued: 04-04-2016

Software de aprendizaje interactivo PAB

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

21/11/2012

Date filed: 21-11-2012

e-RETO: e-mail usage pattern analyzer

  • Fuentes Garcia Romero De Tejada, Jose Maria De
  • Gonzalez Manzano, Lorena

3/10/2014

Date filed: 03-10-2014

eStorePass: Gestor de contraseñas basado en el DNI electrónico

  • Gonzalez Manzano, Lorena
  • Fuentes Garcia Romero De Tejada, Jose Maria De

23/5/2012

Date filed: 23-05-2012

iPhone Shopping Assistant

  • Fuentes Garcia Romero De Tejada, Jose Maria De

23/2/2011

Date filed: 23-02-2011

Last data update: 4/24/24 1:17 PM