TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks FG Mármol, GM Pérez Journal of network and computer applications 35 (3), 934-941, 2012 | 322 | 2012 |
Security threats scenarios in trust and reputation models for distributed systems F Gómez Mármol, G Martínez Pérez Computers & Security 28 (7), 545-556, 2009 | 284 | 2009 |
Providing trust in wireless sensor networks using a bio-inspired technique F Gómez Mármol, G Martínez Pérez Telecommunication Systems 46 (2), 163-180, 2011 | 213 | 2011 |
Do not snoop my habits: preserving privacy in the smart grid F Gómez Mármol, C Sorge, O Ugus, G Martínez Pérez Communications Magazine, IEEE 50 (5), 166-172, 2012 | 210* | 2012 |
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems FG Mármol, GM Pérez Computer Standards & Interfaces 32 (4), 185-196, 2010 | 186 | 2010 |
Introducing deep learning self-adaptive misuse network intrusion detection systems D Papamartzivanos, FG Mármol, G Kambourakis IEEE Access 7, 13546-13560, 2019 | 177 | 2019 |
The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends J Pastor-Galindo, P Nespoli, FG Mármol, GM Pérez IEEE Access 8, 10282-10304, 2020 | 169 | 2020 |
TRMSim-WSN, trust and reputation models simulator for wireless sensor networks F Gómez Mármol, G Martínez Pérez Communications, 2009. ICC'09. IEEE International Conference on, 1-5, 2009 | 163* | 2009 |
Dendron: Genetic trees driven rule induction for network intrusion detection systems D Papamartzivanos, FG Mármol, G Kambourakis Future Generation Computer Systems 79, 558-574, 2018 | 149 | 2018 |
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017 | 146 | 2017 |
RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT A Sforzin, M Conti, FG Mármol, JM Bohli 13th IEEE International Conference on Advanced and Trusted Computing (ATC …, 2016 | 137 | 2016 |
Shielding IoT against cyber‐attacks: an event‐based approach using SIEM D Diaz Lopez, M Blanco Uribe, C Santiago Cely, A Vega Torres, ... Wireless Communications and Mobile Computing 2018 (1), 3029638, 2018 | 76 | 2018 |
Spotting political social bots in Twitter: A use case of the 2019 Spanish general election J Pastor-Galindo, M Zago, P Nespoli, SL Bernal, AH Celdrán, MG Pérez, ... IEEE Transactions on Network and Service Management 17 (4), 2156-2170, 2020 | 75 | 2020 |
Graph-based XACML evaluation S Pina Ros, M Lischka, F Gómez Mármol Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 71 | 2012 |
TRIMS, a privacy-aware trust and reputation model for identity management systems F Gómez Mármol, J Girao, G Martínez Pérez Computer Networks 54 (16), 2899-2912, 2010 | 66 | 2010 |
TACS, a Trust Model for P2P Networks F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta Wireless Personal Communications 51 (1), 153-164, 2009 | 66 | 2009 |
Trust and Reputation Models Comparison F Gómez Mármol, G Martínez Pérez Internet Research 21 (2), 138-153, 2011 | 54 | 2011 |
RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms M Gil Pérez, F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta Journal of Network and Systems Management 21 (1), 128-167, 2013 | 49 | 2013 |
Studies on cholera carriers JJ Dizon, H Fukumi, D Barua, J Valera, F Jayme, F Gomez, SI Yamamoto, ... Bulletin of the World Health Organization 37 (5), 737, 1967 | 49 | 1967 |
Dynamic counter-measures for risk-based access control systems: An evolutive approach D Díaz López, G Dólera Tormo, F Gómez Mármol, G Martínez Pérez Future Generation Computer Systems, 2016 | 43 | 2016 |