Jorge Blasco Alís
Cited by
Cited by
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
A multi-agent scanner to detect stored-XSS vulnerabilities
E Galán, A Alcaide, A Orfila, J Blasco
International Conference for Internet Technology and Secured Transactions …, 2010
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape
P Sivakumaran, J Blasco
28th USENIX Security Symposium (USENIX Security 19), 2019
Interactive activities: the key to learning programming with MOOCs
C Alario-Hoyos, C Delgado Kloos, I Estevez-Ayres, ...
Proceedings of the European Stakeholder Summit on experiences and best …, 2016
On the feasibility of low-cost wearable sensors for multi-modal biometric verification
J Blasco, P Peris-Lopez
Sensors 18 (9), 2782, 2018
Security models in vehicular ad-hoc networks: A survey
JM De Fuentes, L González-Manzano, AI González-Tablas, J Blasco
IETE Technical Review 31 (1), 47-64, 2014
How private is your period?: A systematic analysis of menstrual app privacy policies.
L Shipp, J Blasco
Proc. Priv. Enhancing Technol. 2020 (4), 491-510, 2020
Analysis of update delays in signature-based network intrusion detection systems
H Gascon, A Orfila, J Blasco
Computers & Security 30 (8), 613-624, 2011
Intrusion Detection
TM Chen, J Blasco, J Alzubi, O Alzubi
IET Engineering & Technology Reference, 1-9, 2014
A framework for avoiding steganography usage over HTTP
J Blasco, J Cesar Hernandez-Castro, J María de Fuentes, B Ramos
Journal of Network and Computer Applications 35 (1), 491-501, 2012
Automated generation of colluding apps for experimental research
J Blasco, TM Chen
Journal of Computer Virology and Hacking Techniques 14, 127-138, 2018
Improving network intrusion detection by means of domain-aware genetic programming
J Blasco, A Orfila, A Ribagorda
International Conference on Availability, Reliability, and Security (ARES …, 2010
Towards Automated Android App Collusion Detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Innovations in Mobile Privacy and Security 1575, 29-37, 2016
Mesh messaging in large-scale protests: Breaking Bridgefy
MR Albrecht, J Blasco, RB Jensen, L Mareková
Topics in Cryptology–CT-RSA 2021: Cryptographers’ Track at the RSA …, 2021
Automatic rule generation based on genetic programming for event correlation
G Suarez-Tangil, E Palomar, JM de Fuentes, J Blasco, A Ribagorda
Computational Intelligence in Security for Information Systems, 127-134, 2009
Applying information hiding in VANETs to covertly report misbehaving vehicles
JM de Fuentes, J Blasco, AI González-Tablas, L González-Manzano
International Journal of Distributed Sensor Networks 10 (2), 120626, 2014
Bypassing information leakage protection with trusted applications
J Blasco, JC Hernandez-Castro, JE Tapiador, A Ribagorda
Computers & Security 31 (4), 557–568, 2012
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
MR Albrecht, J Blasco, RB Jensen, L Mareková
USENIX Security Symposium, 3363-3380, 2021
The system can't perform the operation now. Try again later.
Articles 1–20