Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Juan A. Sicilia Montalvo"'
Autor:
Rafael González Arias, Javier Bermejo Higuera, J. Javier Rainer Granados, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
Publikováno v:
Applied Sciences, Vol 14, Iss 12, p 5302 (2024)
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are
Externí odkaz:
https://doaj.org/article/940ed4dc329c42aaab4acea8f16ac321
Autor:
Santiago Ibarra-Fiallos, Javier Bermejo Higuera, Monserrate Intriago-Pazmino, Juan Ramon Bermejo Higuera, Juan Antonio Sicilia Montalvo, Javier Cubo
Publikováno v:
IEEE Access, Vol 9, Pp 10378-10391 (2021)
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effec
Externí odkaz:
https://doaj.org/article/62d362566d4443efb10496c067d42264
Autor:
Carlos Diaz Motero, Juan Ramon Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, Nadia Gamez Gomez
Publikováno v:
IEEE Access, Vol 9, Pp 109289-109319 (2021)
Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of attacks it can suffer, the be
Externí odkaz:
https://doaj.org/article/bda3b4a72eff422b83b5628fcfb882d0
Autor:
Cristina Vilchez Moya, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5552 (2023)
The problem of digital identity acquires more relevance every day in the eyes of a society that spends more and more time connected to the Internet. It has evolved throughout its history to reach a decentralized model known as Self-Sovereign Identity
Externí odkaz:
https://doaj.org/article/da42dbf195b9447b96633ac4ec9eaa21
Autor:
Ander Granado Masid, Javier Bermejo Higuera, Juan-Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 19:165-198
Autor:
Hilary Piedrahita-Valdés, Diego Piedrahita-Castillo, Javier Bermejo-Higuera, Patricia Guillem-Saiz, Juan Ramón Bermejo-Higuera, Javier Guillem-Saiz, Juan Antonio Sicilia-Montalvo, Francisco Machío-Regidor
Publikováno v:
Vaccines, Vol 9, Iss 1, p 28 (2021)
Vaccine hesitancy was one of the ten major threats to global health in 2019, according to the World Health Organisation. Nowadays, social media has an important role in the spread of information, misinformation, and disinformation about vaccines. Mon
Externí odkaz:
https://doaj.org/article/6f526bf88d5343e2957f474acb78b029
Autor:
Francesc Mateo Tudela, Juan-Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan-Antonio Sicilia Montalvo, Michael I. Argyros
Publikováno v:
Applied Sciences, Vol 10, Iss 24, p 9119 (2020)
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition,
Externí odkaz:
https://doaj.org/article/04e68d57379d4a85b6e7127fa072373d
Autor:
Ioannis K. Argyros, Ángel Alberto Magreñán, Alejandro Moysi, Íñigo Sarría, Juan Antonio Sicilia Montalvo
Publikováno v:
Mathematics, Vol 8, Iss 7, p 1062 (2020)
In this paper, we present the local results of the convergence of the two-step King-like method to approximate the solution of nonlinear equations. In this study, we only apply conditions to the first derivative, because we only need this condition t
Externí odkaz:
https://doaj.org/article/de426c5130df4f2ca5ddd3d39f3fafd2
Autor:
Javier Bermejo Higuera, Carlos Abad Aramburu, Juan-Ramón Bermejo Higuera, Miguel Angel Sicilia Urban, Juan Antonio Sicilia Montalvo
Publikováno v:
Applied Sciences, Vol 10, Iss 4, p 1360 (2020)
Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find commonalities between them.
Externí odkaz:
https://doaj.org/article/0e9a97a0b82248c891020635cac6253c
Autor:
Tom醩 Sureda Riera, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo, Jos�Javier Mart韓ez Herr醝z
Publikováno v:
Computer Modeling in Engineering & Sciences. 133:579-599