On the features and challenges of security and privacy in distributed internet of things R Roman, J Zhou, J Lopez Computer Networks 57 (10), 2266-2279, 2013 | 1669 | 2013 |
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges R Roman, J Lopez, M Mambo Future Generation Computer Systems 78, 680-698, 2018 | 1448 | 2018 |
Securing the internet of things R Roman, P Najera, J Lopez Computer 44 (9), 51-58, 2011 | 1063 | 2011 |
Trust management systems for wireless sensor networks: Best practices J Lopez, R Roman, I Agudo, C Fernandez-Gago Computer Communications 33 (9), 1086-1093, 2010 | 440 | 2010 |
Key management systems for sensor networks in the context of the Internet of Things R Roman, C Alcaraz, J Lopez, N Sklavos Computers & Electrical Engineering 37 (2), 147-159, 2011 | 422 | 2011 |
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018 | 414 | 2018 |
Applying intrusion detection systems to wireless sensor networks R Roman, J Zhou, J Lopez IEEE Consumer Communications & Networking Conference (CCNC 2006), 2006 | 359 | 2006 |
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? C Alcaraz, P Najera, J Lopez, R Roman 1st International Workshop on the Security of the Internet of Things (SecIoT'10), 2010 | 237 | 2010 |
Evolving privacy: From sensors to the Internet of Things J Lopez, R Rios, F Bao, G Wang Future Generation Computer Systems 75, 46-57, 2017 | 196 | 2017 |
Integrating wireless sensor networks and the internet: a security analysis R Roman, J Lopez Internet Research 19 (2), 246-259, 2009 | 179 | 2009 |
A security analysis for wireless sensor mesh networks in highly critical systems C Alcaraz, J Lopez IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 165 | 2010 |
Analysis of security threats, requirements, technologies and standards in wireless sensor networks J Lopez, R Roman, C Alcaraz Foundations of Security Analysis and Design V, 289-338, 2009 | 157 | 2009 |
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes R Roman, C Alcaraz, J Lopez Mobile Networks and Applications 12 (4), 231-244, 2007 | 153 | 2007 |
Authentication and authorization infrastructures (AAIs): a comparative survey J Lopez, R Oppliger, G Pernul Computers & Security 23 (7), 578-590, 2004 | 153 | 2004 |
Overview of wireless sensor network security J Lopez, J Zhou Wireless sensor network security. IOS Press, incorporated, 1-21, 2008 | 150* | 2008 |
Digital Twin: A Comprehensive Survey of Security Threats C Alcaraz, J Lopez IEEE Communications Surveys & Tutorials, 2022 | 145 | 2022 |
Real-time location and inpatient care systems based on passive RFID P Najera, J Lopez, R Roman Journal of Network and Computer Applications 34 (3), 980-989, 2011 | 136 | 2011 |
Wireless Sensor Network Security J López, J Zhou Ios PressInc, 2008 | 134 | 2008 |
OCPP Protocol: Security Threats and Challenges C Alcaraz, J Lopez, S Wolthusen IEEE Transactions on Smart Grid, 2017 | 132 | 2017 |
Modelling trust dynamics in the Internet of Things C Fernandez-Gago, F Moyano, J Lopez Information Sciences 396, 72-82, 2017 | 129 | 2017 |