Esteu aquí

Resultats

  • GARCIA, V; GARRIGUES, C; RIFÀ, H. (2018). "Difficulties and challenges of anomaly detection in smart cities: a laboratory analysis". Sensors. 18 (10), pàg. 1 - 21. ISSN: 1424-8220. DOI. 10.3390/s18103198
  • ROMERO, C; MEGÍAS, D. (2018). "Protecting privacy in trajectories with a user-centric approach". ACM Transactions on Knowledge Discovery from Data. 12 (6), pàg. 1 - 27. ISSN: 1556-4681. DOI. 10.1145/3233185
  • PÉREZ, C; HERRERA, J; RIFÀ, H. (2018). "On improving automated self-assessment with moodle quizzes: Experiences from a cryptography course". Communications in Computer and Information Science. 829 pàg. 176 - 189. ISSN: 1865-0929. DOI. 10.1007/978-3-319-97807-9_14
  • SALAS, J; MEGÍAS, D; TORRA, V. (2018). "SwapMob: Swapping trajectories for mobility anonymization". Lecture Notes in Computer Science. 11126 pàg. 331 - 346. ISSN: 0302-9743. DOI. 10.1007/978-3-319-99771-1_22
  • TORRA, V; JONSSON, A; NAVARRO-ARRIBAS, G; SALAS, J. (2018). "Synthetic generation of spatial graphs". International Journal of Intelligent Systems. 33 (12), pàg. 2364 - 2378. ISSN: 0884-8173. DOI. 10.1002/int.22034
  • SALAS, J; TORRA, V. (2018). "A General Algorithm for k-anonymity on Dynamic Databases". Lecture Notes in Computer Science. 11025 pàg. 407 - 414. ISSN: 0302-9743. DOI. 10.1007/978-3-030-00305-0_28
  • SABILLON, R; SERRA-RUIZ, J; CAVALLER, V; CANO, J. (2018). "A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)". Proceedings of International Conference on Information Systems and Computer Science (INCISCOS). QUITO: IEEE Computer Society, ISBN: 978-1-5386-2644-3.
  • MEGÍAS, D; DOMINGO, J. (2018). "Co-utile privacy-aware P2P content distribution". A: DOMINGO, J; SÁNCHEZ, D. Co-utility. Theory and Applications. Springer, pàg. 87 - 116. ISBN: 978-3-319-60233-2.
  • GARCIA, V; RIFÀ, H. (2018). "Uso y retos de blockchain en plataformas de votación electrónica". A: BARRAGÁN, R; FUENTES, N.M; GARCÍA, P. Actas XV Reunión Española sobre Criptología y Seguridad de la Información (RECSI). Granada, 3, 4, y 5 de octubre de 2018. GRANADA: Universidad de Granada, pàg. 257 - 262. ISBN: 978-84-09-02463-6.
  • SABILLON, R; SERRA-RUIZ, J; CAVALLER, V; CANO, J.J. (2018). "Digital Forensic Analysis of Cyber crimes: Best Practices and Methodologies". A: KHOSROW-POUR, M. Digital Multimedia: Concepts, Methodologies, Tools, and Applications. IGI Global, pàg. 588 - 600. ISBN: 9781522538226.