Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

Guillermo Suarez-Tangil , Juan E. Tapiador , Pedro Peris-Lopez , Jorge Blasco
Expert Systems With Applications 41 ( 4) 1104 -1117

156
2014
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"

Nasour Bagheri , Masoumeh Safkhani , Pedro Peris-Lopez , Juan E. Tapiador
IEEE Communications Letters 17 ( 4) 805 -807

4
2013
Thwarting Obfuscated Malware via Differential Fault Analysis

Guillermo Suarez-Tangil , Juan E. Tapiador , Flavio Lombardi , Roberto Di Pietro
IEEE Computer 47 ( 6) 24 -31

15
2014
Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP

Nasour Bagheri , Masoumeh Safkhani , Pedro Peris-Lopez , Juan E. Tapiador
Security and Communication Networks 7 ( 6) 945 -949

28
2014
A Multi-objective Optimisation Approach to IDS Sensor Placement

Hao Chen , John A. Clark , Juan E. Tapiador , Siraj A. Shaikh
CISIS 101 -108

6
2009
Learning Autonomic Security Reconfiguration Policies

Juan E. Tapiador , John A. Clark
computer and information technology 902 -909

5
2010
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps

Guillermo Suarez-Tangil , Juan E. Tapiador , Pedro Peris-Lopez
international conference on information security and cryptology 496 -515

18
2014
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models

Guillermo Suarez-Tangil , Mauro Conti , Juan E. Tapiador , Pedro Peris-Lopez
european symposium on research in computer security 8712 183 -201

31
2014
Two RFID Standard-based Security Protocols for Healthcare Environments

Pablo Picazo-Sanchez , Nasour Bagheri , Pedro Peris-Lopez , Juan E. Tapiador
Journal of Medical Systems 37 ( 5) 1 -12

16
2013
Human Identification Using Compressed ECG Signals

Carmen Camara , Pedro Peris-Lopez , Juan E. Tapiador
Journal of Medical Systems 39 ( 11) 1 -10

24
2015
Effects of Cooperation--Based Peer-to-Peer Authentication on System Performance

Esther Palomar , Arturo Ribagorda , Juan E. Tapiador , Julio Hernandez-Castro
international conference on multimedia information networking and security 1 444 -448

1
2009
The placement-configuration problem for intrusion detection nodes in wireless sensor networks

Juan E. Tapiador , John A. Clark
Computers & Electrical Engineering 39 ( 7) 2306 -2317

5
2013
Hindering data theft with encrypted data trees

Jorge Blasco , Juan E. Tapiador , Pedro Peris-Lopez , Guillermo Suarez-Tangil
Journal of Systems and Software 101 147 -158

7
2015
An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms

Honorio Martin , Pedro Peris-Lopez , Juan E. Tapiador , Enrique San Millan
IEEE Transactions on Industrial Informatics 10 ( 2) 1216 -1225

10
2014
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol

Julio C. Hernandez-Castro , Juan E. Tapiador , Pedro Peris-Lopez , John A. Clark
international parallel and distributed processing symposium 1 -5

7
2009
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation

Guillermo Suarez-Tangil , Juan E. Tapiador , Pedro Peris-Lopez , Sergio Pastrana
Pervasive and Mobile Computing 18 137 -151

19
2015
Evolution, Detection and Analysis of Malware for Smart Devices

Guillermo Suarez-Tangil , Juan E. Tapiador , Pedro Peris-Lopez , Arturo Ribagorda
IEEE Communications Surveys and Tutorials 16 ( 2) 961 -987

324
2014
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks

Sergio Pastrana , Juan E. Tapiador , Agustin Orfila , Pedro Peris-Lopez
Computer Networks 80 66 -88

8
2015
Probabilistic yoking proofs for large scale IoT systems

José M. de Fuentes , Pedro Peris-Lopez , Juan E. Tapiador , Sergio Pastrana
ad hoc networks 32 43 -52

12
2015
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices

Sergio Pastrana , Juan E. Tapiador , Guillermo Suarez-Tangil , Peris-Lopez
international conference on detection of intrusions and malware and vulnerability assessment 58 -77

10
2016