Follow
Félix Gómez Mármol
Title
Cited by
Cited by
Year
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
FG Mármol, GM Pérez
Journal of network and computer applications 35 (3), 934-941, 2012
3332012
Security threats scenarios in trust and reputation models for distributed systems
F Gómez Mármol, G Martínez Pérez
Computers & Security 28 (7), 545-556, 2009
2922009
Providing trust in wireless sensor networks using a bio-inspired technique
F Gómez Mármol, G Martínez Pérez
Telecommunication Systems 46 (2), 163-180, 2011
2152011
Do not snoop my habits: preserving privacy in the smart grid
F Gómez Mármol, C Sorge, O Ugus, G Martínez Pérez
Communications Magazine, IEEE 50 (5), 166-172, 2012
212*2012
The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends
J Pastor-Galindo, P Nespoli, FG Mármol, GM Pérez
IEEE access 8, 10282-10304, 2020
2112020
Introducing deep learning self-adaptive misuse network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Access 7, 13546-13560, 2019
1892019
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
FG Mármol, GM Pérez
Computer Standards & Interfaces 32 (4), 185-196, 2010
1892010
TRMSim-WSN, trust and reputation models simulator for wireless sensor networks
F Gómez Mármol, G Martínez Pérez
Communications, 2009. ICC'09. IEEE International Conference on, 1-5, 2009
164*2009
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos, FG Mármol, G Kambourakis
IEEE Communications Surveys & Tutorials 20 (2), 1361-1396, 2017
1582017
Dendron: Genetic trees driven rule induction for network intrusion detection systems
D Papamartzivanos, FG Mármol, G Kambourakis
Future Generation Computer Systems 79, 558-574, 2018
1522018
RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT
A Sforzin, M Conti, FG Mármol, JM Bohli
13th IEEE International Conference on Advanced and Trusted Computing (ATC …, 2016
1422016
Spotting political social bots in Twitter: A use case of the 2019 Spanish general election
J Pastor-Galindo, M Zago, P Nespoli, SL Bernal, AH Celdrán, MG Pérez, ...
IEEE Transactions on Network and Service Management 17 (4), 2156-2170, 2020
832020
Shielding IoT against cyber‐attacks: an event‐based approach using SIEM
D Diaz Lopez, M Blanco Uribe, C Santiago Cely, A Vega Torres, ...
Wireless Communications and Mobile Computing 2018 (1), 3029638, 2018
802018
Graph-based XACML evaluation
S Pina Ros, M Lischka, F Gómez Mármol
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
712012
TACS, a Trust Model for P2P Networks
F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta
Wireless Personal Communications 51 (1), 153-164, 2009
68*2009
TRIMS, a privacy-aware trust and reputation model for identity management systems
F Gómez Mármol, J Girao, G Martínez Pérez
Computer Networks 54 (16), 2899-2912, 2010
672010
Trust and Reputation Models Comparison
F Gómez Mármol, G Martínez Pérez
Internet Research 21 (2), 138-153, 2011
582011
RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms
M Gil Pérez, F Gómez Mármol, G Martínez Pérez, AF Gómez Skarmeta
Journal of Network and Systems Management 21 (1), 128-167, 2013
492013
Studies on cholera carriers
JJ Dizon, H Fukumi, D Barua, J Valera, F Jayme, F Gomez, SI Yamamoto, ...
Bulletin of the World Health Organization 37 (5), 737, 1967
491967
Dynamic counter-measures for risk-based access control systems: An evolutive approach
D Díaz López, G Dólera Tormo, F Gómez Mármol, G Martínez Pérez
Future Generation Computer Systems, 2016
452016
The system can't perform the operation now. Try again later.
Articles 1–20