Jorge Blasco Alís
Title
Cited by
Cited by
Year
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
1902014
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
622016
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
452014
A multi-agent scanner to detect stored-XSS vulnerabilities
E Galán, A Alcaide, A Orfila, J Blasco
International Conference for Internet Technology and Secured Transactions …, 2010
412010
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
262014
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
252016
Improving network intrusion detection by means of domain-aware genetic programming
J Blasco, A Orfila, A Ribagorda
International Conference on Availability, Reliability, and Security (ARES …, 2010
242010
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
232011
A framework for avoiding steganography usage over HTTP
J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
192012
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
182009
Automated generation of colluding apps for experimental research
J Blasco, TM Chen
Journal of Computer Virology and Hacking Techniques 14 (2), 127-138, 2018
152018
Towards Automated Android App Collusion Detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Innovations in Mobile Privacy and Security 1575, 29-37, 2016
142016
Bypassing information leakage protection with trusted applications
J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda
Computers & Security 31 (4), 557–568, 2012
142012
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
132014
Intrusion Detection
TM Chen, J Blasco, J Alzubi, O Alzubi
IET Engineering & Technology Reference, 1-9, 2014
112014
WEVAN–A mechanism for evidence creation and verification in VANETs
JM de Fuentes, L González-Manzano, AI González-Tablas, J Blasco
Journal of Systems Architecture 59 (10), 985-995, 2013
112013
Hindering data theft with encrypted data trees
J Blasco, JE Tapiador, P Peris-Lopez, G Suarez-Tangil
Journal of Systems and Software 101, 147-158, 2015
102015
A review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
J Qadri, TM Chen, J Blasco
International Journal on Cyber Situational Awareness 1 (1), 2016
82016
On the feasibility of low-cost wearable sensors for multi-modal biometric verification
J Blasco, P Peris-Lopez
Sensors 18 (9), 2782, 2018
72018
Wild Android Collusions
J Blasco, I Muttik, M Roggenbach, TM Chen
VirusBulletin 2016, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20