- Biomedical Text Mining and Ontologies
- Semantic Web and Ontologies
- Service-Oriented Architecture and Web Services
- Advanced Malware Detection Techniques
- Computational Drug Discovery Methods
- IPv6, Mobility, Handover, Networks, Security
- Network Security and Intrusion Detection
- Electronic Health Records Systems
- Digital and Cyber Forensics
- Evolutionary Algorithms and Applications
- Metaheuristic Optimization Algorithms Research
- Bluetooth and Wireless Communication Technologies
- User Authentication and Security Systems
- Advanced Multi-Objective Optimization Algorithms
- Machine Learning in Bioinformatics
- Bioinformatics and Genomic Networks
- Web Application Security Vulnerabilities
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- vaccines and immunoinformatics approaches
- Genetics, Bioinformatics, and Biomedical Research
- Access Control and Trust
- Healthcare Technology and Patient Monitoring
- Digital Media Forensic Detection
- AI in Service Interactions
Universidade da Coruña
2012-2024
University of the Basque Country
2023
Universal Display Corporation
2021
Instituto de Investigación Biomédica de A Coruña
2019-2021
Complexo Hospitalario Universitario A Coruña
2019
Fundación Centro Tecnológico de la Información y la Comunicación
2019
Abstract Breast cancer (BC) is a heterogeneous disease where genomic alterations, protein expression deregulation, signaling pathway hormone disruption, ethnicity and environmental determinants are involved. Due to the complexity of BC, prediction proteins involved in this trending topic drug design. This work proposing accurate classifier for BC using six sets sequence descriptors 13 machine-learning methods. After univariate feature selection mix five descriptor families, best was obtained...
Operating System (OS) fingerprinting is essential for network management and cybersecurity, enabling accurate device identification based on traffic analysis. Traditional rule-based tools such as Nmap p0f face challenges in dynamic environments due to frequent OS updates obfuscation techniques. While Machine Learning (ML) approaches have been explored, Deep (DL) models, particularly Transformer architectures, remain unexploited this domain. This study investigates the application of Tabular...
The study of selective toxicity carbon nanotubes (CNTs) on mitochondria (CNT-mitotoxicity) is major interest for future biomedical applications. In the current work, mitochondrial oxygen consumption (E3) measured under three experimental conditions by exposure to pristine and oxidized CNTs (hydroxylated carboxylated). Respiratory functional assays showed that information CNT Raman spectroscopy could be useful predict structural parameters mitotoxicity induced CNTs. in vitro show oxidative...
Physicians in the Intensive Care Unit (ICU) are specially trained to deal constantly with very large and complex quantities of clinical data make quick decisions as they face complications. However, amount information generated way presented may overload cognitive skills even experienced professionals lead inaccurate or erroneous actions that put patients’ lives at risk. In this paper, we present design, development, validation iOSC3, an ontology-based system for intelligent supervision...
FIDO2 authentication is starting to be applied in numerous web services, aiming replace passwords and their known vulnerabilities. However, this new method has not been integrated yet with network systems. In paper, we introduce FIDO2CAP: Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal using Authenticators as security keys passkeys. For validating our proposal, have developed prototype of FIDO2CAP mock scenario. Using prototype, performed...
Among the last new developments in field of teleradiology, a system telediagnostic which allows remote transmission digital images via Internet is prevailing. These communications have to be made through mechanisms that guarantee confidentiality and integrity clinical data, as well authenticity transmitter. This is, many cases, only way diagnose patient pathology emergency rooms with no radiologist on call. Access medical data from any computer possible implantation picture archiving...
During the last few years, some of most relevant IT companies have started to develop new authentication solutions which are not vulnerable attacks like phishing. WebAuthn and FIDO standards were designed replace or complement de facto ubiquitous method: username password. This paper performs an analysis current implementations these while testing comparing in a high-level analysis, drawing context adoption their integration with existing systems, from web applications services different use...
FIDO2 authentication is starting to be applied in numerous web services, aiming replace passwords and their known vulnerabilities. However, this new method has not been integrated yet with network systems. In paper, we introduce FIDO2CAP: Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal using authenticators, as security keys passkeys. For validating our proposal, have developed prototype of FIDO2CAP mock scenario. Using prototype, performed...
The adoption of FIDO2 authentication by major tech companies in web applications has grown significantly recent years. However, we argue broader potential applications. In this paper, introduce EAP-FIDO, a novel Extensible Authentication Protocol (EAP) method for use IEEE 802.1X-protected networks. This allows organisations with WPA2/3-Enterprise wireless networks or MACSec-enabled wired to leverage FIDO2's passwordless compliance existing standards. Additionally, provide comprehensive...
While modern Wi-Fi security protocols such as WPA2-PSK and WPA3-PSK enhance encryption to protect against password cracking packet sniffing, they may still be vulnerable certain attacks. Specifically, under conditions, an attacker could spoof a legitimate access point (AP) establish man-in-the-middle (MitM) attack. This study investigates whether different devices are able distinguish between spoofed APs, examines how respond impersonation attempts. By analyzing device behavior in these...
ABSTRACT Background Breast cancer (BC) is a heterogeneous disease characterized by an intricate interplay between different biological aspects such as ethnicity, genomic alterations, gene expression deregulation, hormone disruption, signaling pathway alterations and environmental determinants. Due to the complexity of BC, prediction proteins involved in this trending topic drug design. Methods This work proposing accurate classifier for BC using six sets protein sequence descriptors 13...
When a patient enters an intensive care unit (ICU), either after surgery or due to serious clinical condition, his vital signs are continually changing, forcing the medical experts make rapid and complex decisions, which frequently imply modific