- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Network Security and Intrusion Detection
- Organ Donation and Transplantation
- IoT and Edge/Fog Computing
- Organ Transplantation Techniques and Outcomes
- Information and Cyber Security
- Digital Media Forensic Detection
- Grief, Bereavement, and Mental Health
- Software System Performance and Reliability
- Context-Aware Activity Recognition Systems
- Liver Disease and Transplantation
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Cybercrime and Law Enforcement Studies
- IPv6, Mobility, Handover, Networks, Security
- Palliative Care and End-of-Life Issues
- Privacy, Security, and Data Protection
- Regional Development and Innovation
- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Rural development and sustainability
- Cloud Computing and Resource Management
- Security in Wireless Sensor Networks
Unidades Centrales Científico-Técnicas
2021
Centro de Investigaciones Energéticas, Medioambientales y Tecnológicas
2021
Universidad de Málaga
2012-2020
Universidad de Extremadura
2009-2020
Tampere University
2016
Universidad de Guanajuato
2010-2012
Hospital de León
2012
Hospital Regional de Alta Especialidad del Bajío
2010
Ericsson (Sweden)
2006
IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation conditioned by peculiarities Internet Things (IoT) context. As branch computer forensics, this discipline respects most basic forensic principles preservation, traceability, documentation, and authorization. The digital witness approach also promotes such in context IoT while allowing personal devices to cooperate investigations voluntarily providing authorities. However, solution highly dependent on...
Personal devices contain electronic evidence associated with the behavior of their owners and other in environment, which can help clarify facts a cyber-crime scene. These are usually analyzed as containers proof. However, it is possible to harness boom personal define concept digital witnesses, where able actively acquire, store, transmit an authorized entity reliably securely. This article introduces this novel concept, providing preliminary analysis on management technologies that be used...
The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity devices in such scenarios, it bring extremely difficult carry out investigations without cooperation individuals. Even if they are not directly involved offense, their can yield evidence that might provide useful clarification an investigation. However, when providing may leak sensitive personal information. This paper proposes PRoFIT; a model for IoT-forensics takes privacy into...
The digital witness approach defines the collaboration between IoT devices - from wearables to vehicles provide evidence through a Digital Chain of Custody an authorised entity. As one cores witness, binding credentials unequivocally identify user behind witness. objective this article is perform critical analysis perspective privacy, and propose solutions that help include some notions privacy in scheme (for those cases where it possible). In addition, anonymous witnessing as tradeoff...
Abstract This paper proposes a methodology based on the concept of Human Factors to obtain Cybersecurity profiles. The profiles are determined by set parameters that help model skills individuals (potential offenders, victims, etc.) during digital investigation. definition is flexible enough allow cybersecurity grow when more data available. A critical part solution inclusion personal devices as important elements highly relevant paradigms such Internet Things (IoT) transforming society,...
ABSTRACT Motivated by the growing convergence of diverse types networks and rise concepts such as future internet (FI), in this paper, we analyze coexistence security mechanisms quality service (QoS) resource‐constrained networks, that are relevant within FI environment. More precisely, current state research on QoS integration wireless sensor mobile ad hoc cellular networks. Furthermore, propose a taxonomy to identify similarities among these technologies, well requirements for network...
Heterogeneity of future networks requires the use extensible models to understand Security and QoS tradeoff. We believe that a good starting point is analyze tradeoff from parametric view and, for this reason, in previous paper, we defined Parametric Relationship Model (PRM) define relationships between parameters. In extend approach order change behaviour model so different contexts same system are considered; is, provide Context-based (CPRM). The final aim useful tools administrators help...
One of the biggest challenges in IoT-forensics is analysis and correlation heterogeneous digital evidence, to enable an effective understanding complex scenarios. This paper defines a methodology for extracting unique objects (e.g., representing users or devices) from files case, defining context investigation increasing knowledge progressively, using additional case (e.g. network captures). The solution includes external searches open source intelligence (OSINT) sources when needed. In...
Wireless Sensor Networks (WSN) are networks composed of autonomous devices manufactured to solve a specific problem, with limited computational capabilities and resource-constrained (e.g. battery). WSN used monitor physical or environmental conditions within an area temperature, humidity). The popularity the is growing, precisely due wide range sensors available. As result, these being deployed as part several infrastructures. However, designed collaborate only same type. In this sense,...
Motivated by the growing convergence of diverse types networks and raise new concepts such as Future Internet (FI), in this paper we present an analysis current research on development security mechanisms a tradeoff with Quality Service (QoS) mechanisms. More precisely, pay attention to Security QoS problems resource-constrained that are candidates be important part FI due their proximity user or because contribution information society. We analyse state integration sensors, MANET cellular...
The growing number of parameters in heterogeneous networks, as is the case fifth-generation (5G) Green greatly complicates analysis Security and Quality-of-Service Tradeoff (SQT). However, studying these types relationships crucial Future Internet scenarios to prevent potential points failure enhance use limited resources, increasing user's experience. Therefore, it fundamental provide tools models for training, so that users understand dependencies solve them prior deploying new solutions....