Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Screening Out Social Bots Interference: Are There Any Silver Bullets?, , , , , , and . IEEE Communications Magazine, 57 (8): 98-104 (2019)Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems., and . Comput. Stand. Interfaces, 32 (4): 185-196 (2010)Dynamic counter-measures for risk-based access control systems: An evolutive approach., , , and . Future Gener. Comput. Syst., (2016)Dendron : Genetic trees driven rule induction for network intrusion detection systems., , and . Future Gener. Comput. Syst., (2018)Editorial: special issue on advances in security and privacy for future mobile communications., , and . Electron. Commer. Res., 15 (1): 73-74 (2015)Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach., , and . IEEE Internet Comput., 18 (2): 32-40 (2014)Resolving privacy-preserving relationships over outsourced encrypted data storages., , , , and . Int. J. Inf. Sec., 15 (2): 195-209 (2016)Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm., , and . Intell. Autom. Soft Comput., 17 (1): 41-59 (2011)A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection., , and . IEEE Access, (2021)Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election., , , , , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (4): 2156-2170 (2020)