Follow
Félix Gómez Mármol
Title
Cited by
Cited by
Year
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
FG Mármol, GM Pérez
Journal of network and computer applications 35 (3), 934-941, 2012
3152012
Security threats scenarios in trust and reputation models for distributed systems
F Gómez Mármol, G Martínez Pérez
Computers & Security 28 (7), 545-556, 2009
2822009
Providing trust in wireless sensor networks using a bio-inspired technique
F Gómez Mármol, G Martínez Pérez
Telecommunication Systems 46 (2), 163-180, 2011
2132011
Do not snoop my habits: preserving privacy in the smart grid
F Gómez Mármol, C Sorge, O Ugus, G Martínez Pérez
Communications Magazine, IEEE 50 (5), 166-172, 2012
210*2012
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
FG Mármol, GM Pérez
Computer Standards & Interfaces 32 (4), 185-196, 2010
1842010
Introducing deep learning self-adaptive misuse network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Access 7, 13546-13560, 2019
1712019
TRMSim-WSN, trust and reputation models simulator for wireless sensor networks
F Gómez Mármol, G Martínez Pérez
Communications, 2009. ICC'09. IEEE International Conference on, 1-5, 2009
163*2009
The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends
J Pastor-Galindo, P Nespoli, FG Mármol, GM Pérez
IEEE Access 8, 10282-10304, 2020
1522020
Dendron: Genetic trees driven rule induction for network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
Future Generation Computer Systems 79, 558-574, 2018
1452018
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017
1402017
RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT
A Sforzin, M Conti, FG Mármol, JM Bohli
13th IEEE International Conference on Advanced and Trusted Computing (ATC …, 2016
1322016
Shielding IoT against cyber-attacks: An event-based approach using SIEM
D Diaz Lopez, M Blanco Uribe, C Santiago Cely, A Vega Torres, ...
Wireless Communications and Mobile Computing 2018, 2018
732018
Graph-based XACML evaluation
S Pina Ros, M Lischka, F Gómez Mármol
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
712012
Spotting political social bots in Twitter: A use case of the 2019 Spanish general election
J Pastor-Galindo, M Zago, P Nespoli, SL Bernal, AH Celdrán, MG Pérez, ...
IEEE Transactions on Network and Service Management 17 (4), 2156-2170, 2020
662020
TRIMS, a privacy-aware trust and reputation model for identity management systems
F Gómez Mármol, J Girao, G Martínez Pérez
Computer Networks 54 (16), 2899-2912, 2010
662010
TACS, a Trust Model for P2P Networks
F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta
Wireless Personal Communications 51 (1), 153-164, 2009
662009
Trust and Reputation Models Comparison
F Gómez Mármol, G Martínez Pérez
Internet Research 21 (2), 138-153, 2011
542011
RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms
M Gil Pérez, F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta
Journal of Network and Systems Management 21 (1), 128-167, 2013
492013
Dynamic counter-measures for risk-based access control systems: An evolutive approach
D Díaz López, G Dólera Tormo, F Gómez Mármol, G Martínez Pérez
Future Generation Computer Systems, 2016
432016
Privacy-enhanced architecture for smart metering
F Gómez Mármol, C Sorge, R Petrlic, O Ugus, D Westhoff, ...
International Journal of Information Security 12 (2), 67-82, 2013
382013
The system can't perform the operation now. Try again later.
Articles 1–20