Characterizing Linux-based malware: Findings and recent trends J Carrillo-Mondéjar, JL Martínez, G Suarez-Tangil Future Generation Computer Systems 110, 267-281, 2020 | 20 | 2020 |
Developing an IoT forensic methodology. A concept proposal JMC Gómez, JC Mondéjar, JR Gómez, JM Martínez Forensic Science International: Digital Investigation 36, 301114, 2021 | 17 | 2021 |
Security Analysis of the MQTT-SN Protocol for the Internet of Things J Roldán-Gómez, J Carrillo-Mondéjar, JM Castelo Gómez, ... Applied Sciences 12 (21), 10991, 2022 | 16 | 2022 |
A context-centered methodology for IoT forensic investigations JM Castelo Gómez, J Carrillo Mondéjar, J Roldán Gómez, ... International Journal of Information Security 20, 647-673, 2021 | 12 | 2021 |
Forensic analysis of the Xiaomi Mi smart sensor set JMC Gómez, J Carrillo-Mondéjar, JLM Martínez, JN García Forensic Science International: Digital Investigation 42, 301451, 2022 | 9 | 2022 |
Security Assessment of the MQTT-SN Protocol for the Internet of Things J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, JLM Martínez Journal of Physics: Conference Series 2224 (1), 012079, 2022 | 8 | 2022 |
Automatic Analysis Architecture of IoT Malware Samples J Carrillo-Mondejar, JM Castelo Gomez, C Núñez-Gómez, ... Security and Communication Networks 2020, 1-12, 2020 | 8 | 2020 |
Non-volatile memory forensic analysis in windows 10 iot core JM Castelo Gómez, J Roldán Gómez, J Carrillo Mondéjar, ... Entropy 21 (12), 1141, 2019 | 8 | 2019 |
On how VoIP attacks foster the malicious call ecosystem J Carrillo-Mondéjar, JL Martinez, G Suarez-Tangil Computers & Security 119, 102758, 2022 | 7 | 2022 |
Attack pattern recognition in the internet of things using complex event processing and machine learning J Roldán-Gómez, J Boubeta-Puig, JMC Gómez, J Carrillo-Mondéjar, ... 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021 | 7 | 2021 |
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms S Ruiz-Villafranca, J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, ... Computer Networks 233, 109868, 2023 | 5 | 2023 |
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats S Ruiz-Villafranca, J Carrillo-Mondéjar, JM Castelo Gómez, ... The Journal of Supercomputing 79 (11), 11895-11933, 2023 | 4 | 2023 |
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns J Roldán-Gómez, J Boubeta-Puig, J Carrillo-Mondéjar, JMC Gómez, ... Engineering Applications of Artificial Intelligence 123, 106344, 2023 | 3 | 2023 |
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants J Carrillo-Mondéjar, H Turtiainen, A Costin, JL Martínez, G Suarez-Tangil IEEE Internet of Things Journal, 2022 | 3 | 2022 |
A concept forensic methodology for the investigation of IoT cyberincidents JM Castelo Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ... The Computer Journal 67 (4), 1324-1345, 2024 | 2 | 2024 |
Forensic Science International: Digital Investigation JMC Gómez, JC Mondéjar, J Roldán, JMM Gómez Forensic Science International 36, 301114, 2021 | 1 | 2021 |
An instrumentation based algorithm for stack overflow detection J Carrillo-Mondéjar, JM Castelo-Gómez, J Roldán-Gómez, JL Martínez Journal of Computer Virology and Hacking Techniques 16, 245-256, 2020 | 1 | 2020 |
Stories from a Customized Honeypot for the IoT J Carrillo-Mondéjar, J Roldán-Gómez, JMC Gómez, SR Villafranca, ... Journal of Internet Technology 25 (1), 117-127, 2024 | | 2024 |
24 Integrando el Edge Computing en el Desarrollo de una Metodología Forense Dedicada a Entornos IoT JM Castelo Gómez, J Roldán-Gómez, J Carrillo-Mondéjar, ... Ediciones de la Universidad de Castilla-La Mancha, 2021 | | 2021 |
Detección de vulnerabilidades basadas en Stack Overflow mediante DBI JC Mondéjar, JLM Martínez Actas de las Cuartas Jornadas Nacionales de Investigación en Ciberseguridad …, 2018 | | 2018 |