Hugo Gonzalez

ORCID: 0000-0002-7322-4019
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Software Testing and Debugging Techniques
  • Information and Cyber Security
  • Digital and Cyber Forensics
  • Software Engineering Research
  • Education and Digital Technologies
  • E-Learning and Knowledge Management
  • Gallbladder and Bile Duct Disorders
  • User Authentication and Security Systems
  • Media and Communication Studies
  • Innovation in Digital Healthcare Systems
  • Semantic Web and Ontologies
  • Cardiac, Anesthesia and Surgical Outcomes
  • Open Education and E-Learning
  • Food Supply Chain Traceability
  • Cholangiocarcinoma and Gallbladder Cancer Studies
  • Caching and Content Delivery
  • Chaos-based Image/Signal Encryption
  • Pharmaceutical Quality and Counterfeiting
  • Cloud Data Security Solutions
  • Data Quality and Management
  • Digital Media Forensic Detection

Ahlia University
2023

Nottingham University Hospitals NHS Trust
2019-2023

Nottingham City Hospital
2019-2023

Polytechnic University of San Luis Potosí
2008-2022

University of New Brunswick
2014-2019

European Organization for Nuclear Research
2019

COMSATS University Islamabad
2019

Mobile malware is so pernicious and on the rise, accordingly having a fast reliable detection system necessary for users. In this research, new characterization detecting meaningful deviations in network behavior of smart-phone application proposed. The main goal proposed to protect mobile device users cellular infrastructure companies from malicious applications with just 9 traffic feature measurements. not only able detect or masquerading apps, but can also identify them as general...

10.1109/pst.2017.00035 article EN 2017-08-01

The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly plagiarize applications (e.g., through code reuse repackaging) boosting amount on infection rate. In this study, we present AndroidSOO, lightweight approach for detection repackaging symptoms apps. work, introduce explore novel easily extractable attribute called...

10.1145/2751323.2751330 article EN 2015-04-13

The recent escalation of application-layer denial service (DoS) attacks has attracted a significant interest the security research community. Since DoS usually do not manifest themselves at network level, they avoid traditional network-layer-based detection. Therefore, community focused on specialised detection and mitigation mechanisms. However, deployment reliable efficient defence mechanisms against these requires comprehensive understanding existing supported by unified terminology....

10.1504/ijics.2015.073028 article EN International Journal of Information and Computer Security 2015-01-01

E-wallets have started to grow in popularity, reaching a tipping point some countries. This can be attributed the worldwide use of payment-enabled devices and ubiquity e-wallet acceptance by larger smaller retailers. As more customers adopt e-wallets they may also become big target cybercrime. facilitates financial transactions via smartphones which is lucrative opportunity for cybercriminals. paper presents security assessment Android apps provided Canada's leading banks.

10.1109/compsac.2018.10282 article EN 2018-06-22

The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly employ suite widely available tools to facilitate development. Analysis individual apps for detection often requires understanding functionality complex, time-consuming analysis behavior. Since tend leave traces program structure, we can potentially use visual...

10.1145/2843859.2843866 article EN 2015-12-08

Since the first computer virus hit Advanced Research Projects Agency Network (ARPANET) in early 1970s, security community interest revolved around ways to expose identities of malware writers. Knowledge adversarial promised additional leverage experts their ongoing battle against those perpetrators. At dawn computing era, when writers and malicious software were characterized by lack experience relative simplicity, task uncovering was more or less straightforward. Manual analysis source code...

10.1145/3176258.3176322 article EN 2018-03-13

The appearance of a new Android platform and its popularity has resulted in sharp rise the number reported vulnerabilities consequently mobile threats.Mobile malware, dominant threat for modern devices, was almost non-existent before official release 2008.The rapid development apps app markets coupled with open nature triggered an explosive growth specialized malware subsequent search effective defence mechanisms.In spite considerable research efforts this area, majority proposed solutions...

10.13052/jcsm2245-1439.321 article EN Journal of Cyber Security and Mobility 2014-01-01

Web server attacks are increasingly in short time for different purposes, one of the principal vectors this RFI and even automatic way to do this. We suppose that a botnet involved attacks, attackers (host launch attack) web servers compromised since natural format attack tool (remote file include). So we go deeper identified type host is attacker through remote analysis based on domain name, content, dynamic ip addresses.A large was tracked by almost year figure out behavior kind hosters....

10.1109/cerma.2008.60 article EN Electronics, Robotics and Automotive Mechanics Conference 2008-09-01

IP reputation lookup is one of the traditional methods for recognition blacklisted IPs, i.e., addresses known to be sources spam and malware-related threats. Its use however has been rapidly increasing beyond its domain reaching various filtering tasks. One solutions able provide a necessary scalability Bloom filter. Efficient in memory consumption, filters fast membership check, allowing confirm presence set elements data structure with constant false positive probability. With increased...

10.1109/ares.2015.101 article EN 2015-08-01

In this paper, we addressed the problem of dataset scarcity for task network intrusion detection. Our main contribution was to develop a framework that provides complete process generating traffic datasets based on aggregation real traces. addition, proposed set tools attribute extraction and labeling sessions. A new with botnet generated by assess our method machine learning algorithms suitable unbalanced data. The performance classifiers evaluated in terms macro-averages F1-score (0.97)...

10.3390/s22051847 article EN cc-by Sensors 2022-02-26

The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly plagiarize applications through code reuse, boosting amount on infection rate. In last few years studies focused detection reuse drastically increased. Ranging from lightweight suspicious signs to more sophisticated computationally expensive methods assessing apps'...

10.1109/pst.2016.7906925 article EN 2016-12-01

Android has become one of the most popular mo-bile device operating systems. Indeed, its security issues have attracted a lot attention. One major concerns is use obfuscation strategies to evade anti-malware solutions. malware authors are increasingly using code tools and techniques hide malicious code. In this work, we in- troduce novel fingerprinting approach for based on spatial analysis. We investigate first-order second-order statistical features analyze distribution pixels representing...

10.1109/pst.2018.8514207 article EN 2018-08-01

SWAN (Service for Web-based ANalysis) is a CERN service that allows users to perform interactive data analysis in the cloud, “software as service” model. It built upon widely-used Jupyter notebooks, allowing write - and run their using only web browser. By connecting SWAN, have immediate access storage, software computing resources provides they need do analyses. Besides providing an easier way of producing scientific code results, also great tool create shareable content. From results be...

10.1051/epjconf/201921407022 article EN cc-by EPJ Web of Conferences 2019-01-01

The research focused on the analysis of banking malware such as Zeus, Citadel, Carberp, SpeEye and Soraya, which infected personal computers between 2006–2014. This work described briefly each malware, compared major features ranked by impact. An experiment was performed running samples then analyzing network traffic for machine.

10.1109/concapan.2014.7000412 article EN 2014-11-01

The evolution of phishing methods has resulted in a plethora new tools and techniques to coerce users into providing credentials, generally for nefarious purposes. This paper discusses the relatively recent emergence an evolutionary technique called by form that relies on abuse online forms elicit information from target population. We evaluate corpus emails over year's worth URLs investigate methodology, history, spread, origins, life cycle as well identifying directions future research...

10.1109/malware.2011.6112332 article EN 2011-10-01

This paper presents an analysis of some characteristics from malicious PDFs files. where examined on a testbed 11,104 and 8,668 non files, the samples includes 0days files used wild for focused attacks. The PDF format is showed very quickly only to help understand attack vectors. attacks are almost three years, recently this kind incrementing, techniques hide anti-virus software growing in complex, so why important now work how formed

10.1109/tla.2012.6222583 article EN IEEE Latin America Transactions 2012-04-01

Software Engineering is a foundation on modern computer systems development. This discipline offered by the large branch of related university degrees these days around world, among with other science courses. As we all know, cybersecurity problems are mostly software, for example bad implementations, poor quality achieved, lack testing. Overall bigger problem security planification since inception and designing project. Cybersecurity had gained lot attention in recent years. From everyday...

10.1109/conisoft.2019.00017 article EN 2019-10-01

This article presents an exploratory research based on the virtual ethnography from environment of and learning including new technologies. The is a method qualitative social sciences that mainly used in socio-cultural Anthropology, where it has its theoretical basis. target was to explore web 2.0 tools. process participant observation by means blog, other tools communities. result descriptive model Personal Learning Environment which developed ethnographic experience.

10.1344/der.2011.20.37-49 article EN public-domain 2011-12-15

10.5281/zenodo.2648029 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2019-04-12

Software Engineering is a foundation of modern computer systems development. The process involves several steps, including Analysis and Design, which are the fundamentals for building software systems. This discipline offered by university degrees these days around world, included among other science courses.Nowadays, cybersecurity problems very related with weakness or bad designs, as an example one can mention implementations, projects poor quality, lack testing, others issues. Overall...

10.1109/conisoft52520.2021.00037 article EN 2021-10-01
Coming Soon ...