Cross-site scripting (XSS) attacks and mitigation: A survey GE Rodríguez, JG Torres, P Flores, DE Benavides Computer Networks 166, 106960, 2020 | 205 | 2020 |
A survey on identity management for the future network J Torres, M Nogueira, G Pujolle IEEE Communications Surveys & Tutorials 15 (2), 787-802, 2012 | 99 | 2012 |
RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages F Meneses, W Fuertes, J Sancho, S Salvador, D Flores, H Aules, F Castro, ... International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 52 | 2016 |
Real-Time Air Pollution Monitoring Systems Using Wireless Sensor Networks Connected in a Cloud-Computing, Wrapped up Web Services B Guanochanga, R Cachipuendo, W Fuertes, S Salvador, DS Benítez, ... Proceedings of the Future Technologies Conference, 171-184, 2018 | 45 | 2018 |
Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach P Zambrano, J Torres, L Tello-Oquendo, R Jácome, ME Benalcazar, ... IEEE Access 7, 142129-142146, 2019 | 40 | 2019 |
Hardware: ecosistemas de innovación y producción basados en hardware libre A Lazalde, J Torres, D Vila-Viñas Buen Conocer-FLOK Society. Modelos sostenibles y políticas públicas para una …, 2015 | 29 | 2015 |
Towards a Real-Time Air Pollution Monitoring Systems Implemented using Wireless Sensor Networks: Preliminary Results B Guanochanga, R Cachipuendo, W Fuertes, DS Benítez, T Toulkeridis, ... 2018 IEEE Colombian Conference on Communications and Computing (COLCOM), 1-4, 2018 | 23 | 2018 |
Conectividad: Accesibilidad, soberanía y autogestión de las infraestructuras de comunicación V Betancourt, R Zabala Buen Conocer-FLOK Society. Modelos sostenibles y políticas públicas para una …, 2015 | 20 | 2015 |
Conectividad: Accesibilidad, soberanía y autogestión de las infraestructuras de comunicación V Betancourt, R Zabala Buen Conocer-FLOK Society. Modelos sostenibles y políticas públicas para una …, 2015 | 20 | 2015 |
Cognitive Security for Incident Management Process R Andrade, J Torres, S Cadena International Conference on Information Technology & Systems, 612-621, 2019 | 18 | 2019 |
Cookie Scout: An Analytic Model for Prevention of Cross-Site Scripting (XSS) Using a Cookie Classifier GE Rodríguez, DE Benavides, J Torres, P Flores, W Fuertes International Conference on Information Theoretic Security, 497-507, 2018 | 18 | 2018 |
3bi-ecc: a decentralized identity framework based on blockchain technology and elliptic curve cryptography D Maldonado-Ruiz, J Torres, N El Madhoun 2020 2nd Conference on Blockchain Research & Applications for Innovative …, 2020 | 16 | 2020 |
An Innovative and Decentralized Identity Framework Based on Blockchain Technology D Maldonado-Ruiz, J Torres, N El Madhoun, M Badra The 11th IFIP International Conference on New Technologies, Mobility and …, 2021 | 15 | 2021 |
Management of information security indicators under a cognitive security model R Andrade, J Torres, P Flores 2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018 | 13 | 2018 |
Current trends in blockchain implementations on the paradigm of public key infrastructure: a survey D Maldonado-Ruiz, J Torres, N El Madhoun, M Badra IEEE Access 10, 17641-17655, 2022 | 12 | 2022 |
FraudFind: Financial fraud detection by analyzing human behavior M Sánchez, J Torres, P Zambrano, P Flores 2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018 | 12 | 2018 |
On the modeling of cyber-attacks associated with social engineering: A parental control prototype P Zambrano, J Torres, L Tello-Oquendo, Á Yánez, L Velásquez Journal of Information Security and Applications 75, 103501, 2023 | 11 | 2023 |
Understanding cyberbullying as an information security attack—life cycle modeling P Zambrano, J Torres, Á Yánez, A Macas, L Tello-Oquendo Annals of Telecommunications, 1-19, 2020 | 11 | 2020 |
BotHook: An option against Cyberpedophilia P Zambrano, M Sanchez, J Torres, W Fuertes 2017 1st Cyber Security in Networking Conference (CSNet), 1-3, 2017 | 11 | 2017 |
Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study A Cadena, F Gualoto, W Fuertes, L Tello-Oquendo, R Andrade, F Tapia, ... Developments and Advances in Defense and Security, 507-519, 2020 | 10 | 2020 |