Investigación e Ingeniería Telemática (I2T) - GIC 21/139
Publikationen (232) Publikationen, an denen Forscher/innen teilgenommen haben
2024
-
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware
Computer Communications, Vol. 218, pp. 14-30
-
End to End secure data exchange in value chains with dynamic policy updates
Future Generation Computer Systems, Vol. 158, pp. 333-345
-
Modelling and Measuring Trust in Human–Robot Collaboration
Applied Sciences (Switzerland), Vol. 14, Núm. 5
-
Quantitative measurement of link failure reaction time for devices with P4-programmable data planes
Telecommunication Systems, Vol. 85, Núm. 2, pp. 277-288
2023
-
ACSmI: a solution to address the challenges of cloud services federation and monitoring towards the cloud continuum
International Journal of Computational Science and Engineering, Vol. 26, Núm. 5, pp. 537-554
-
Artificial Intelligence Enabled Project Management: A Systematic Literature Review
Applied Sciences (Switzerland), Vol. 13, Núm. 8
-
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework
ACM International Conference Proceeding Series
-
Implementación de un algoritmo de machine learning utilizando criptografía homomórfica
Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023
-
Improving efficiency and security of IIoT communications using in-network validation of server certificate
Computers in Industry, Vol. 144
-
Industrial Data Homogenization and Monitoring Scheme with Blockchain Oracles
Smart Cities, Vol. 6, Núm. 1, pp. 263-290
-
Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance
International Conference on Electrical, Computer and Energy Technologies, ICECET 2023
-
Interoperable Industry 4.0 Plant Blockchain and Data Homogenization via Decentralized Oracles
Lecture Notes in Networks and Systems
-
Multi-Layer Monitoring at the Edge for Vehicular Video Streaming: Field Trials
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB
-
Physical Assessment of an SDN-Based Security Framework for DDoS Attack Mitigation: Introducing the SDN-SlowRate-DDoS Dataset
IEEE Access, Vol. 11, pp. 46820-46831
-
Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systems
Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
-
Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes
Smart Cities, Vol. 6, Núm. 2, pp. 913-928
-
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review
Journal of Cloud Computing, Vol. 12, Núm. 1
-
“Are You What You Claim to Be?” Attribute Validation with IOTA for Multi Authority CP-ABE
Lecture Notes in Networks and Systems
2022
-
A Systematic Literature Review of Lightweight Blockchain for IoT
IEEE Access, Vol. 10, pp. 123138-123159
-
Adapting Agile Principles for Requirements Engineering in Automotive Software Development
2022 IEEE European Technology and Engineering Management Summit, E-TEMS 2022 - Conference Proceedings