Handling security threats to the RFID system of EPC networks J Garcia-Alfaro, M Barbeau, E Kranakis Security of Self-Organizing Networks: MANET, WSN, WMN, VANET 3, 45-64, 2010 | 397* | 2010 |
Complete analysis of configuration rules to guarantee reliable network security policies JG Alfaro, N Boulahia-Cuppens, F Cuppens International Journal of Information Security 7 (2), 103-122, 2008 | 190 | 2008 |
Design, modeling and implementation of digital twins M Segovia, J Garcia-Alfaro Sensors 22 (14), 5396, 2022 | 184 | 2022 |
On the difficulty of hiding the balance of lightning network channels J Herrera-Joancomartí, G Navarro-Arribas, A Ranchal-Pedrosa, ... Proceedings of the 2019 ACM asia conference on computer and communications …, 2019 | 86 | 2019 |
Detection and removal of firewall misconfiguration F Cuppens, NB Cuppens, J Garcia‐alfaro 2005 IASTED International Conference on Communication, Network and …, 2005 | 85 | 2005 |
Dynamic risk management response system to handle cyber threats G Gonzalez-Granadillo, S Dubus, A Motzek, J Garcia-Alfaro, E Alvarez, ... Future Generation Computer Systems 83, 535-552, 2018 | 69 | 2018 |
J3Gen: A PRNG for low-cost passive RFID J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí Sensors 13 (3), 3816-3830, 2013 | 63 | 2013 |
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti International Conference on Financial Cryptography and Data Security, 34-46, 2010 | 60 | 2010 |
Analysis of policy anomalies on distributed network security setups JG Alfaro, F Cuppens, N Cuppens-Boulahia Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 60 | 2006 |
Lockdown: Balance availability attack against lightning network channels C Pérez-Sola, A Ranchal-Pedrosa, J Herrera-Joancomartí, ... Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 54 | 2020 |
Data Privacy Management (LNCS series) J Garcia-Alfaro, G Navarro-Arribas Springer International Publishing, 2009 | 53* | 2009 |
MIRAGE: a management tool for the analysis and deployment of network security policies J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Preda International Workshop on Data Privacy Management, 203-215, 2010 | 51 | 2010 |
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs G Cervera, M Barbeau, J Garcia-Alfaro, E Kranakis Journal of Network and Computer Applications 36 (2), 744-755, 2013 | 49 | 2013 |
Analysis of Threats to the Security of EPC Networks J Garcia-Alfaro, M Barbeau, E Kranakis Communication Networks and Services Research Conference, 2008. CNSR 2008 …, 2008 | 48* | 2008 |
Secure localization of nodes in wireless sensor networks with limited number of truth tellers JG Alfaro, M Barbeau, E Kranakis 2009 Seventh annual communication networks and services research conference …, 2009 | 47 | 2009 |
CACEV: a cost and carbon emission-efficient virtual machine placement method for green distributed clouds E Ahvar, S Ahvar, ZÁ Mann, N Crespi, J Garcia-Alfaro, R Glitho 2016 IEEE International Conference on Services Computing (SCC), 275-282, 2016 | 46* | 2016 |
On the use of watermark-based schemes to detect cyber-physical attacks J Rubio-Hernan, L De Cicco, J Garcia-Alfaro EURASIP Journal on Information Security 2017, 1-25, 2017 | 43 | 2017 |
Management of stateful firewall misconfiguration J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Martinez, J Cabot Computers & Security 39, 64-85, 2013 | 43 | 2013 |
Real-time malicious fast-flux detection using DNS and bot related features S Martinez-Bea, S Castillo-Perez, J Garcia-Alfaro 2013 Eleventh Annual Conference on Privacy, Security and Trust, 369-372, 2013 | 43 | 2013 |
Handling stateful firewall anomalies F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson IFIP International Information Security Conference, 174-186, 2012 | 43 | 2012 |