sample of publications
-
articles
- Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration. IEEE Access. 12:68624-6863. 2024
- The Art of Cybercrime Community Research. ACM COMPUTING SURVEYS. 56:1-26. 2024
- Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming. EXPERT SYSTEMS WITH APPLICATIONS. 229, Part A:1-12. 2023
- HEFactory: A symbolic execution compiler for privacy-preserving Deep Learning with Homomorphic Encryption. SoftwareX. 22. 2023
- Towards realistic privacy-preserving deep learning over encrypted medical data. Frontiers in Cardiovascular Medicine. 10:1-22. 2023
- An analysis of fake social media engagement services. Computers and Security. 124. 2023
- A Methodology For Large-Scale Identification of Related Accounts in Underground Forums. COMPUTERS & SECURITY. 111:1-15. 2021
- Avaddon ransomware: An in-depth analysis and decryption of infected systems. COMPUTERS & SECURITY. 109:1-20. 2021
- Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting. IEEE Transactions on Network and Service Management. 18:1334-1349. 2021
- Automatically identifying the function and intent of posts in underground forums. Crime Science. 1-14. 2018
- PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 71:59-71. 2016
- Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks. 32:43-52. 2015
- DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Computer Networks. 80:66-88. 2015
- Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing. 18:137-151. 2015
- Randomized anagram revisited. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 41:182-196. 2014
- Evaluation of classification algorithms for intrusion detection in MANETs. KNOWLEDGE-BASED SYSTEMS. 36:217-225. 2012
-
book chapters
- Displacing big data: How criminals cheat the system. In: The Human Factor of Cybercrime. Routledge. 1-18. 2019
- Evading IDSs and Firewalls as Fundamental Sources of Information in SIEMs. In: Advances in Security Information Management: Perceptions and Outcomes. NOVA SCIENCE PUBLISHERS INC. 157-180. 2013
-
conference contributions
- A nested decision tree for event detection in smart grids. 353-358. 2022
- Examining the trends and operations of modern Dark-Web marketplaces. 163-172. 2022
- Trouble over-the-air: An analysis of FOTA apps in the android ecosystem. 1606-1622. 2021
- A tight scrape: Methodological approaches to cybercrime research data collection in adversarial environments. 428-437. 2020
- Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 427-427. 2020
- Retos en materia de ciberseguridad en smart grids. 207-211. 2020
- A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth. 73-86. 2019
- Measuring ewhoring. 463-477. 2019
- Understanding eWhoring. 201-214. 2019
-
Aggressive language
in an online hacking forum. 66-74. 2018 - Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. 207-227. 2018
- CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale. 1845-1854. 2018
- Ethical issues in research using datasets of illicit origin. 445-462. 2017
- ArduWorm: A Functional Malware Targeting Arduino Devices. 117-124. 2016
- Interactive activities: the key to learning programming with MOOCs. 319-328. 2016
- Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing. 15-24. 2016
- Anomalous Web Payload Detection: Evaluating the Resilience of 1-gram Based Classifiers. 195-201. 2015
- Diseñando un MOOC en edX: introducción a la programación con Java: parte 1. 391-398. 2015
- A Functional Framework to Evade Network IDS. 1-10. 2011
- Artificial Immunity-based Correlation System. 422-425. 2011
-
theses