José M. Vázquez-Naya

ORCID: 0000-0002-6194-5329
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biomedical Text Mining and Ontologies
  • Semantic Web and Ontologies
  • Service-Oriented Architecture and Web Services
  • Advanced Malware Detection Techniques
  • Computational Drug Discovery Methods
  • IPv6, Mobility, Handover, Networks, Security
  • Network Security and Intrusion Detection
  • Electronic Health Records Systems
  • Digital and Cyber Forensics
  • Evolutionary Algorithms and Applications
  • Metaheuristic Optimization Algorithms Research
  • Bluetooth and Wireless Communication Technologies
  • User Authentication and Security Systems
  • Advanced Multi-Objective Optimization Algorithms
  • Machine Learning in Bioinformatics
  • Bioinformatics and Genomic Networks
  • Web Application Security Vulnerabilities
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection
  • vaccines and immunoinformatics approaches
  • Genetics, Bioinformatics, and Biomedical Research
  • Access Control and Trust
  • Healthcare Technology and Patient Monitoring
  • Digital Media Forensic Detection
  • AI in Service Interactions

Universidade da Coruña
2012-2024

University of the Basque Country
2023

Universal Display Corporation
2021

Instituto de Investigación Biomédica de A Coruña
2019-2021

Complexo Hospitalario Universitario A Coruña
2019

Fundación Centro Tecnológico de la Información y la Comunicación
2019

Abstract Breast cancer (BC) is a heterogeneous disease where genomic alterations, protein expression deregulation, signaling pathway hormone disruption, ethnicity and environmental determinants are involved. Due to the complexity of BC, prediction proteins involved in this trending topic drug design. This work proposing accurate classifier for BC using six sets sequence descriptors 13 machine-learning methods. After univariate feature selection mix five descriptor families, best was obtained...

10.1038/s41598-020-65584-y article EN cc-by Scientific Reports 2020-05-22

Operating System (OS) fingerprinting is essential for network management and cybersecurity, enabling accurate device identification based on traffic analysis. Traditional rule-based tools such as Nmap p0f face challenges in dynamic environments due to frequent OS updates obfuscation techniques. While Machine Learning (ML) approaches have been explored, Deep (DL) models, particularly Transformer architectures, remain unexploited this domain. This study investigates the application of Tabular...

10.48550/arxiv.2502.09084 preprint EN arXiv (Cornell University) 2025-02-13

The study of selective toxicity carbon nanotubes (CNTs) on mitochondria (CNT-mitotoxicity) is major interest for future biomedical applications. In the current work, mitochondrial oxygen consumption (E3) measured under three experimental conditions by exposure to pristine and oxidized CNTs (hydroxylated carboxylated). Respiratory functional assays showed that information CNT Raman spectroscopy could be useful predict structural parameters mitotoxicity induced CNTs. in vitro show oxidative...

10.1021/acs.jcim.6b00458 article EN Journal of Chemical Information and Modeling 2017-04-17

Physicians in the Intensive Care Unit (ICU) are specially trained to deal constantly with very large and complex quantities of clinical data make quick decisions as they face complications. However, amount information generated way presented may overload cognitive skills even experienced professionals lead inaccurate or erroneous actions that put patients’ lives at risk. In this paper, we present design, development, validation iOSC3, an ontology-based system for intelligent supervision...

10.1155/2013/650671 article EN Computational and Mathematical Methods in Medicine 2013-01-01

FIDO2 authentication is starting to be applied in numerous web services, aiming replace passwords and their known vulnerabilities. However, this new method has not been integrated yet with network systems. In paper, we introduce FIDO2CAP: Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal using Authenticators as security keys passkeys. For validating our proposal, have developed prototype of FIDO2CAP mock scenario. Using prototype, performed...

10.3390/app14093610 article EN cc-by Applied Sciences 2024-04-24

Among the last new developments in field of teleradiology, a system telediagnostic which allows remote transmission digital images via Internet is prevailing. These communications have to be made through mechanisms that guarantee confidentiality and integrity clinical data, as well authenticity transmitter. This is, many cases, only way diagnose patient pathology emergency rooms with no radiologist on call. Access medical data from any computer possible implantation picture archiving...

10.1109/iembs.2001.1019646 article EN 2005-08-25

During the last few years, some of most relevant IT companies have started to develop new authentication solutions which are not vulnerable attacks like phishing. WebAuthn and FIDO standards were designed replace or complement de facto ubiquitous method: username password. This paper performs an analysis current implementations these while testing comparing in a high-level analysis, drawing context adoption their integration with existing systems, from web applications services different use...

10.3390/engproc2021007056 article EN cc-by 2021-10-27

FIDO2 authentication is starting to be applied in numerous web services, aiming replace passwords and their known vulnerabilities. However, this new method has not been integrated yet with network systems. In paper, we introduce FIDO2CAP: Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal using authenticators, as security keys passkeys. For validating our proposal, have developed prototype of FIDO2CAP mock scenario. Using prototype, performed...

10.3390/app14093610 preprint EN arXiv (Cornell University) 2024-02-20

The adoption of FIDO2 authentication by major tech companies in web applications has grown significantly recent years. However, we argue broader potential applications. In this paper, introduce EAP-FIDO, a novel Extensible Authentication Protocol (EAP) method for use IEEE 802.1X-protected networks. This allows organisations with WPA2/3-Enterprise wireless networks or MACSec-enabled wired to leverage FIDO2's passwordless compliance existing standards. Additionally, provide comprehensive...

10.48550/arxiv.2412.03277 preprint EN arXiv (Cornell University) 2024-12-04

While modern Wi-Fi security protocols such as WPA2-PSK and WPA3-PSK enhance encryption to protect against password cracking packet sniffing, they may still be vulnerable certain attacks. Specifically, under conditions, an attacker could spoof a legitimate access point (AP) establish man-in-the-middle (MitM) attack. This study investigates whether different devices are able distinguish between spoofed APs, examines how respond impersonation attempts. By analyzing device behavior in these...

10.17979/spudc.9788497498913.61 article EN 2024-11-01

ABSTRACT Background Breast cancer (BC) is a heterogeneous disease characterized by an intricate interplay between different biological aspects such as ethnicity, genomic alterations, gene expression deregulation, hormone disruption, signaling pathway alterations and environmental determinants. Due to the complexity of BC, prediction proteins involved in this trending topic drug design. Methods This work proposing accurate classifier for BC using six sets protein sequence descriptors 13...

10.1101/840108 preprint EN bioRxiv (Cold Spring Harbor Laboratory) 2019-11-13

When a patient enters an intensive care unit (ICU), either after surgery or due to serious clinical condition, his vital signs are continually changing, forcing the medical experts make rapid and complex decisions, which frequently imply modific

10.3233/kes-130254 article EN International Journal of Knowledge-based and Intelligent Engineering Systems 2013-04-27
Coming Soon ...