Volgen
J. Carrillo-Mondejar
J. Carrillo-Mondejar
Geverifieerd e-mailadres voor unizar.es
Titel
Geciteerd door
Geciteerd door
Jaar
Characterizing Linux-based malware: Findings and recent trends
J Carrillo-Mondéjar, JL Martínez, G Suarez-Tangil
Future Generation Computer Systems 110, 267-281, 2020
202020
Developing an IoT forensic methodology. A concept proposal
JMC Gómez, JC Mondéjar, JR Gómez, JM Martínez
Forensic Science International: Digital Investigation 36, 301114, 2021
172021
Security Analysis of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JM Castelo Gómez, ...
Applied Sciences 12 (21), 10991, 2022
162022
A context-centered methodology for IoT forensic investigations
JM Castelo Gómez, J Carrillo Mondéjar, J Roldán Gómez, ...
International Journal of Information Security 20, 647-673, 2021
122021
Forensic analysis of the Xiaomi Mi smart sensor set
JMC Gómez, J Carrillo-Mondéjar, JLM Martínez, JN García
Forensic Science International: Digital Investigation 42, 301451, 2022
92022
Security Assessment of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, JLM Martínez
Journal of Physics: Conference Series 2224 (1), 012079, 2022
82022
Automatic Analysis Architecture of IoT Malware Samples
J Carrillo-Mondejar, JM Castelo Gomez, C Núñez-Gómez, ...
Security and Communication Networks 2020, 1-12, 2020
82020
Non-volatile memory forensic analysis in windows 10 iot core
JM Castelo Gómez, J Roldán Gómez, J Carrillo Mondéjar, ...
Entropy 21 (12), 1141, 2019
82019
On how VoIP attacks foster the malicious call ecosystem
J Carrillo-Mondéjar, JL Martinez, G Suarez-Tangil
Computers & Security 119, 102758, 2022
72022
Attack pattern recognition in the internet of things using complex event processing and machine learning
J Roldán-Gómez, J Boubeta-Puig, JMC Gómez, J Carrillo-Mondéjar, ...
2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021
72021
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms
S Ruiz-Villafranca, J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, ...
Computer Networks 233, 109868, 2023
52023
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns
J Roldán-Gómez, J Boubeta-Puig, J Carrillo-Mondéjar, JMC Gómez, ...
Engineering Applications of Artificial Intelligence 123, 106344, 2023
32023
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats
S Ruiz-Villafranca, J Carrillo-Mondéjar, JM Castelo Gómez, ...
The Journal of Supercomputing 79 (11), 11895-11933, 2023
32023
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
J Carrillo-Mondéjar, H Turtiainen, A Costin, JL Martínez, G Suarez-Tangil
IEEE Internet of Things Journal, 2022
32022
A concept forensic methodology for the investigation of IoT cyberincidents
JM Castelo Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ...
The Computer Journal, bxad062, 2023
22023
Forensic Science International: Digital Investigation
JMC Gómez, JC Mondéjar, J Roldán, JMM Gómez
Forensic Science International 36, 301114, 2021
12021
An instrumentation based algorithm for stack overflow detection
J Carrillo-Mondéjar, JM Castelo-Gómez, J Roldán-Gómez, JL Martínez
Journal of Computer Virology and Hacking Techniques 16, 245-256, 2020
12020
Stories from a Customized Honeypot for the IoT
J Carrillo-Mondejar, J Roldán-Gómez, JMC Gómez, SR Villafranca, ...
Journal of Internet Technology 25 (1), 117-127, 2024
2024
24 Integrando el Edge Computing en el Desarrollo de una Metodología Forense Dedicada a Entornos IoT
JM Castelo Gómez, J Roldán-Gómez, J Carrillo-Mondéjar, ...
Ediciones de la Universidad de Castilla-La Mancha, 2021
2021
Detección de vulnerabilidades basadas en Stack Overflow mediante DBI
JC Mondéjar, JLM Martínez
Actas de las Cuartas Jornadas Nacionales de Investigación en Ciberseguridad …, 2018
2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20