[go: up one dir, main page]

Follow
Ricardo J. Rodríguez
Title
Cited by
Cited by
Year
Formal security assessment of Modbus protocol
R Nardone, RJ Rodríguez, S Marrone
2016 11th International Conference for Internet Technology and Secured …, 2016
612016
Detection of algorithmically generated malicious domain names using masked N-grams
J Selvi, RJ Rodríguez, E Soria-Olivas
Expert Systems with Applications 124, 156-163, 2019
602019
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems
S Marrone, RJ Rodríguez, R Nardone, F Flammini, V Vittorini
Computers & Electrical Engineering 47, 275-285, 2015
512015
Di-aa: An interpretable white-box attack for fooling deep neural networks
Y Wang, J Liu, X Chang, RJ Rodríguez, J Wang
Information Sciences 610, 14-32, 2022
482022
Practical Experiences on NFC Relay Attacks with Android
J Vila, RJ Rodríguez
Radio Frequency Identification. Security and Privacy Issues, 87-103, 2015
432015
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
P Fernández-Álvarez, RJ Rodríguez
Forensic Science International: Digital Investigation 40, 301342, 2022
342022
Modelling security of critical infrastructures: a survivability assessment
RJ Rodríguez, J Merseguer, S Bernardi
The Computer Journal 58 (10), 2313-2327, 2015
332015
Modelling and analysing resilience as a security issue within UML
RJ Rodríguez, J Merseguer, S Bernardi
Proceedings of the 2nd International Workshop on Software Engineering for …, 2010
322010
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples
Y Wang, J Liu, X Chang, J Wang, RJ Rodríguez
Journal of Information Security and Applications 68, 103227, 2022
312022
Model-based sensitivity analysis of IaaS cloud availability
B Liu, X Chang, Z Han, K Trivedi, RJ Rodríguez
Future Generation Computer Systems 83, 1-13, 2018
312018
LSGAN-AT: enhancing malware detector robustness against adversarial examples
J Wang, X Chang, Y Wang, RJ Rodríguez, J Zhang
Cybersecurity 4, 1-15, 2021
302021
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms
M Martín-Pérez, RJ Rodríguez, F Breitinger
Forensic Science International: Digital Investigation 36, 301120, 2021
292021
Evolution and characterization of point-of-sale RAM scraping malware
RJ Rodríguez
Journal of Computer Virology and Hacking Techniques, 1-14, 2016
292016
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning
J Wang, X Chang, RJ Rodrìguez, Y Wang
2022 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2022
282022
On Challenges in Verifying Trusted Executable Files in Memory Forensics
D Uroz, RJ Rodríguez
Forensic Science International: Digital Investigation 32, 300917, 2020
272020
An Evaluation Framework for Comparative Analysis of Generalized Stochastic Petri Net Simulation Techniques
RJ Rodríguez, S Bernardi, A Zimmermann
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018
272018
On the performance estimation and resource optimization in process Petri nets
RJ Rodríguez, J Júlvez, J Merseguer
IEEE Transactions on Systems, Man, and Cybernetics: Systems 43 (6), 1385-1398, 2013
252013
Characteristics and detectability of Windows auto-start extensibility points in memory forensics
D Uroz, RJ Rodríguez
Digital Investigation 28, S95-S104, 2019
212019
Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks
AS Filho, RJ Rodríguez, EL Feitosa
Digital Threats: Research and Practice (DTRAP) 3 (2), 1-28, 2022
202022
Towards uav-based mec service chain resilience evaluation: A quantitative modeling approach
J Bai, X Chang, RJ Rodríguez, KS Trivedi, S Li
IEEE Transactions on Vehicular Technology 72 (4), 5181-5194, 2023
192023
The system can't perform the operation now. Try again later.
Articles 1–20