- Chaos-based Image/Signal Encryption
- Chaos control and synchronization
- Cellular Automata and Applications
- Mathematical Dynamics and Fractals
- Quantum chaos and dynamical systems
- Network Security and Intrusion Detection
- Nonlinear Dynamics and Pattern Formation
- Fractal and DNA sequence analysis
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- Spam and Phishing Detection
- Network Packet Processing and Optimization
- Cryptographic Implementations and Security
- Internet Traffic Analysis and Secure E-voting
- Neural and Behavioral Psychology Studies
- Anomaly Detection Techniques and Applications
- Visual perception and processing mechanisms
- Complex Network Analysis Techniques
- Advanced Differential Equations and Dynamical Systems
- Quasicrystal Structures and Properties
- Nonlinear Waves and Solitons
- Coding theory and cryptography
- Web Application Security Vulnerabilities
- Text and Document Classification Technologies
- Face and Expression Recognition
Instituto de Tecnologías Físicas y de la Información “Leonardo Torres Quevedo”
2015
Consejo Superior de Investigaciones Científicas
2004-2013
Harvard University
2005-2013
Instituto Nacional de Seguridad y Salud en el Trabajo
2012-2013
Instituto de Física Fundamental
2003-2012
Unidades Centrales Científico-Técnicas
2009
Vrije Universiteit Brussel
2008
University of the Basque Country
2001-2002
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many the proposed schemes fail to explain or do not possess number features that are fundamentally important all kind cryptosystems. As result, systems difficult implement in practice with reasonable degree security. Likewise, they seldom accompanied by thorough security analysis. Consequently, it is for other researchers and end users evaluate their performance. This intended provide common...
This paper reports a detailed cryptanalysis of recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning key space definition and implementation cryptosystem using floating-point operations. It is also shown how it possible to reduce considerably through ciphertext-only attack. Moreover, timing attack allows for estimation part due existent relationship between this encryption/decryption time. As...
In the last few years, complex networks have become an increasingly relevant research topic due to large number of fields application. Particularly, are especially significant in area modern online social (OSNs). OSNs actually a challenge for network analysis, as they present some characteristics that hinder topology processing. Concretely, networks’ volume is exceedingly big, high nodes and links. One most popular influential Twitter. this paper, we model describe growth scale-free...
The performance of new cryptosystems based on chaotic dynamical systems properties is examined. We cover the latest advances in cryptography and discuss their practical uses security levels.
This paper describes the security weakness of two generalized nonlinear state-space observers-based approaches for both chaos synchronization and secure communication, using chaotic masking modulation a Lorenz system. We show that is compromised without any knowledge system parameter values even knowing transmitter structure.
Abstract In the detection of web attacks, it is necessary that Web Application Firewalls (WAFs) are effective, at same time than efficient. this paper, we propose a new methodology for attack enhances these two aspects WAFs. It involves both feature construction and selection. For phase, many professionals rely on their expert knowledge to define set important features, what normally leads high reliable rates. Nevertheless, manual process not quickly adaptive changing network environments....