Ana Nieto

ORCID: 0000-0003-2826-9119
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Network Security and Intrusion Detection
  • Organ Donation and Transplantation
  • IoT and Edge/Fog Computing
  • Organ Transplantation Techniques and Outcomes
  • Information and Cyber Security
  • Digital Media Forensic Detection
  • Grief, Bereavement, and Mental Health
  • Software System Performance and Reliability
  • Context-Aware Activity Recognition Systems
  • Liver Disease and Transplantation
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Cybercrime and Law Enforcement Studies
  • IPv6, Mobility, Handover, Networks, Security
  • Palliative Care and End-of-Life Issues
  • Privacy, Security, and Data Protection
  • Regional Development and Innovation
  • Mobile Ad Hoc Networks
  • Energy Efficient Wireless Sensor Networks
  • Rural development and sustainability
  • Cloud Computing and Resource Management
  • Security in Wireless Sensor Networks

Unidades Centrales Científico-Técnicas
2021

Centro de Investigaciones Energéticas, Medioambientales y Tecnológicas
2021

Universidad de Málaga
2012-2020

Universidad de Extremadura
2009-2020

Tampere University
2016

Universidad de Guanajuato
2010-2012

Hospital de León
2012

Hospital Regional de Alta Especialidad del Bajío
2010

Ericsson (Sweden)
2006

IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation conditioned by peculiarities Internet Things (IoT) context. As branch computer forensics, this discipline respects most basic forensic principles preservation, traceability, documentation, and authorization. The digital witness approach also promotes such in context IoT while allowing personal devices to cooperate investigations voluntarily providing authorities. However, solution highly dependent on...

10.3390/s18020492 article EN cc-by Sensors 2018-02-07

Personal devices contain electronic evidence associated with the behavior of their owners and other in environment, which can help clarify facts a cyber-crime scene. These are usually analyzed as containers proof. However, it is possible to harness boom personal define concept digital witnesses, where able actively acquire, store, transmit an authorized entity reliably securely. This article introduces this novel concept, providing preliminary analysis on management technologies that be used...

10.1109/mnet.2016.1600087nm article EN IEEE Network 2016-11-01

The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity devices in such scenarios, it bring extremely difficult carry out investigations without cooperation individuals. Even if they are not directly involved offense, their can yield evidence that might provide useful clarification an investigation. However, when providing may leak sensitive personal information. This paper proposes PRoFIT; a model for IoT-forensics takes privacy into...

10.1109/trustcom/bigdatase/icess.2017.293 article EN 2017-08-01

The digital witness approach defines the collaboration between IoT devices - from wearables to vehicles provide evidence through a Digital Chain of Custody an authorised entity. As one cores witness, binding credentials unequivocally identify user behind witness. objective this article is perform critical analysis perspective privacy, and propose solutions that help include some notions privacy in scheme (for those cases where it possible). In addition, anonymous witnessing as tradeoff...

10.1109/trustcom/bigdatase/icess.2017.295 article EN 2017-08-01

Abstract This paper proposes a methodology based on the concept of Human Factors to obtain Cybersecurity profiles. The profiles are determined by set parameters that help model skills individuals (potential offenders, victims, etc.) during digital investigation. definition is flexible enough allow cybersecurity grow when more data available. A critical part solution inclusion personal devices as important elements highly relevant paradigms such Internet Things (IoT) transforming society,...

10.1186/s13673-019-0200-y article EN cc-by Human-centric Computing and Information Sciences 2019-11-01

ABSTRACT Motivated by the growing convergence of diverse types networks and rise concepts such as future internet (FI), in this paper, we analyze coexistence security mechanisms quality service (QoS) resource‐constrained networks, that are relevant within FI environment. More precisely, current state research on QoS integration wireless sensor mobile ad hoc cellular networks. Furthermore, propose a taxonomy to identify similarities among these technologies, well requirements for network...

10.1002/sec.809 article EN Security and Communication Networks 2013-07-17

Heterogeneity of future networks requires the use extensible models to understand Security and QoS tradeoff. We believe that a good starting point is analyze tradeoff from parametric view and, for this reason, in previous paper, we defined Parametric Relationship Model (PRM) define relationships between parameters. In extend approach order change behaviour model so different contexts same system are considered; is, provide Context-based (CPRM). The final aim useful tools administrators help...

10.1109/icc.2014.6883410 article EN 2014-06-01

One of the biggest challenges in IoT-forensics is analysis and correlation heterogeneous digital evidence, to enable an effective understanding complex scenarios. This paper defines a methodology for extracting unique objects (e.g., representing users or devices) from files case, defining context investigation increasing knowledge progressively, using additional case (e.g. network captures). The solution includes external searches open source intelligence (OSINT) sources when needed. In...

10.1109/tifs.2020.2988602 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

Wireless Sensor Networks (WSN) are networks composed of autonomous devices manufactured to solve a specific problem, with limited computational capabilities and resource-constrained (e.g. battery). WSN used monitor physical or environmental conditions within an area temperature, humidity). The popularity the is growing, precisely due wide range sensors available. As result, these being deployed as part several infrastructures. However, designed collaborate only same type. In this sense,...

10.1109/waina.2012.202 article EN 2012-03-01

Motivated by the growing convergence of diverse types networks and raise new concepts such as Future Internet (FI), in this paper we present an analysis current research on development security mechanisms a tradeoff with Quality Service (QoS) mechanisms. More precisely, pay attention to Security QoS problems resource-constrained that are candidates be important part FI due their proximity user or because contribution information society. We analyse state integration sensors, MANET cellular...

10.1109/waina.2012.204 article EN 2012-03-01

The growing number of parameters in heterogeneous networks, as is the case fifth-generation (5G) Green greatly complicates analysis Security and Quality-of-Service Tradeoff (SQT). However, studying these types relationships crucial Future Internet scenarios to prevent potential points failure enhance use limited resources, increasing user's experience. Therefore, it fundamental provide tools models for training, so that users understand dependencies solve them prior deploying new solutions....

10.1109/jsyst.2015.2477782 article EN IEEE Systems Journal 2015-10-07
Coming Soon ...