| Design, modeling and implementation of digital twins M Segovia, J Garcia-Alfaro Sensors 22 (14), 5396, 2022 | 389 | 2022 |
| Complete analysis of configuration rules to guarantee reliable network security policies JG Alfaro, N Boulahia-Cuppens, F Cuppens International Journal of Information Security 7 (2), 103-122, 2008 | 186 | 2008 |
| On the difficulty of hiding the balance of lightning network channels J Herrera-Joancomartí, G Navarro-Arribas, A Ranchal-Pedrosa, ... Proceedings of the 2019 ACM asia conference on computer and communications …, 2019 | 117 | 2019 |
| Dynamic risk management response system to handle cyber threats G Gonzalez-Granadillo, S Dubus, A Motzek, J Garcia-Alfaro, E Alvarez, ... Future Generation Computer Systems 83, 535-552, 2018 | 97 | 2018 |
| CACEV: a cost and carbon emission-efficient virtual machine placement method for green distributed clouds E Ahvar, S Ahvar, ZÁ Mann, N Crespi, J Garcia-Alfaro, R Glitho 2016 IEEE International Conference on Services Computing (SCC), 275-282, 2016 | 90* | 2016 |
| Detection and removal of firewall misconfiguration F Cuppens, NB Cuppens, J Garcia‐alfaro 2005 IASTED International Conference on Communication, Network and …, 2005 | 88 | 2005 |
| Lockdown: Balance availability attack against lightning network channels C Pérez-Sola, A Ranchal-Pedrosa, J Herrera-Joancomartí, ... International conference on financial cryptography and data security, 245-263, 2020 | 75 | 2020 |
| Data Privacy Management (LNCS series) J Garcia-Alfaro, G Navarro-Arribas Springer International Publishing, 2009 | 67* | 2009 |
| Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti International Conference on Financial Cryptography and Data Security, 34-46, 2010 | 63 | 2010 |
| J3Gen: A PRNG for low-cost passive RFID J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí Sensors 13 (3), 3816-3830, 2013 | 60 | 2013 |
| Analysis of policy anomalies on distributed network security setups JG Alfaro, F Cuppens, N Cuppens-Boulahia Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 60 | 2006 |
| Adaptive control‐theoretic detection of integrity attacks against cyber‐physical industrial systems J Rubio‐Hernan, L De Cicco, J Garcia‐Alfaro Transactions on emerging telecommunications technologies 29 (7), e3209, 2018 | 55* | 2018 |
| MIRAGE: a management tool for the analysis and deployment of network security policies J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Preda International Workshop on Data Privacy Management, 203-215, 2010 | 55 | 2010 |
| Aggregating and deploying network access control policies JG Alfaro, F Cuppens, N Cuppens-Boulahia The Second International Conference on Availability, Reliability and …, 2007 | 55* | 2007 |
| A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs G Cervera, M Barbeau, J Garcia-Alfaro, E Kranakis Journal of Network and Computer Applications 36 (2), 744-755, 2013 | 52 | 2013 |
| Evaluation of two privacy-preserving protocols for the DNS S Castillo-Perez, J Garcia-Alfaro 2009 Sixth International Conference on Information Technology: New …, 2009 | 52* | 2009 |
| Analysis of Threats to the Security of EPC Networks J Garcia-Alfaro, M Barbeau, E Kranakis Communication Networks and Services Research Conference, 2008. CNSR 2008 …, 2008 | 51* | 2008 |
| Management of stateful firewall misconfiguration J Garcia-Alfaro, F Cuppens, N Cuppens-Boulahia, S Martinez, J Cabot Computers & Security 39, 64-85, 2013 | 49 | 2013 |
| Secure localization of nodes in wireless sensor networks with limited number of truth tellers JG Alfaro, M Barbeau, E Kranakis 2009 Seventh annual communication networks and services research conference …, 2009 | 47 | 2009 |
| Integration of an adaptive trust‐based e‐assessment system into virtual learning environments—The TeSLA project experience X Baró‐Solé, AE Guerrero‐Roldan, J Prieto‐Blázquez, A Rozeva, ... Internet Technology Letters 1 (4), e56, 2018 | 46* | 2018 |