Follow
José María Jorquera Valero
José María Jorquera Valero
Senior Researcher, Universidad de Murcia
Verified email at um.es
Title
Cited by
Cited by
Year
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet, MG Pérez, GM Pérez
IEEE Communications Surveys & Tutorials 23 (2), 1048-1077, 2021
1202021
AI and ML–Enablers for beyond 5G Networks
A Kaloxylos, A Gavras, D Camps Mur, M Ghoraishi, H Hrasnica
452021
Improving the security and QoE in mobile devices through an intelligent and adaptive continuous authentication system
JM Jorquera Valero, PM Sanchez Sanchez, L Fernandez Maimo, ...
Sensors 18 (11), 3769, 2018
312018
Design of a security and trust framework for 5G multi-domain scenarios
JM Jorquera Valero, PM Sánchez Sánchez, A Lekidis, ...
Journal of Network and Systems Management 30 (1), 7, 2022
262022
Toward pre-standardization of reputation-based trust models beyond 5G
JMJ Valero, PMS Sánchez, MG Pérez, AH Celdrán, GM Pérez
Computer Standards & Interfaces 81, 103596, 2022
252022
Multi-party collaboration in 5G networks via DLT-enabled marketplaces: A pragmatic approach
A Fernández-Fernández, M De Angelis, PG Giardina, J Taylor, P Chainho, ...
2021 Joint European Conference on Networks and Communications & 6G Summit …, 2021
212021
Identification and classification of cyber threats through ssh honeypot systems
JMJ Valero, MG Pérez, AH Celdrán, GM Pérez
Handbook of Research on Intrusion Detection Systems, 105-129, 2020
102020
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet, MG Pérez, GM Pérez
Journal of Network and Computer Applications 212, 103579, 2023
92023
Trusted Execution Environment-enabled platform for 5G security and privacy enhancement
JMJ Valero, PMS Sánchez, A Lekidis, P Martins, P Diogo, MG Pérez, ...
Security and Privacy Preserving for IoT and 5G Networks: Techniques …, 2022
82022
BEHACOM-a dataset modelling users’ behaviour in computers
PMS Sánchez, JMJ Valero, M Zago, AH Celdrán, LF Maimó, EL Bernal, ...
Data in Brief 31, 105767, 2020
72020
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers
PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet, MG Pérez, GM Pérez
Internet of Things 22, 100764, 2023
62023
Transformación digital para PyMEs del sector manufacturero en Colombia
D López, O Quijano, J Ruiz, J Valero
Bogotá DC: Pontificia Universidad Javeriana, 2020
52020
A security and trust framework for decentralized 5G marketplaces
JMJ Valero, MG Pérez, GM Pérez
arXiv preprint arXiv:2210.11517, 2022
42022
SLA-driven trust and reputation management framework for 5G distributed service marketplaces
JMJ Valero, V Theodorou, MG Pérez, GM Pérez
IEEE Transactions on Dependable and Secure Computing, 2023
32023
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning
JMJ Valero, PMS Sánchez, MG Pérez, AH Celdrán, GM Pérez
Computer Communications 211, 229-238, 2023
22023
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges
JM Jorquera Valero, PM Sánchez Sánchez, M Gil Pérez, ...
ACM Computing Surveys 55 (11), 1-36, 2023
22023
Trust-as-a-Service: A reputation-enabled trust framework for 5G networks
JMJ Valero, PMS Sánchez, MG Pérez, AH Celdrán, GM Pérez
arXiv preprint arXiv:2210.11501, 2022
22022
Overview of the security and trust mechanisms in the 5GZORRO project
P Chainho, A Fernandez-Fernández, J Fernández Hidalgo, M Gil Pérez, ...
EUCNC 2021, 2021
22021
Can evil IoT twins be identified? Now yes, a hardware behavioral fingerprinting methodology
PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet, MG Pérez, GM Pérez
Now Yes, a Hardware Behavioral Fingerprinting Methodology, 2021
22021
Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices
JMJ Valero, PMS Sánchez, AH Celdran, GM Pérez
Handbook of Research on Multimedia Cyber Security, 21-47, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20