Seguir
J. Carrillo-Mondejar
J. Carrillo-Mondejar
E-mail confirmado em unizar.es
Título
Citado por
Citado por
Ano
Characterizing Linux-based malware: Findings and recent trends
J Carrillo-Mondéjar, JL Martínez, G Suarez-Tangil
Future Generation Computer Systems 110, 267-281, 2020
202020
Developing an IoT forensic methodology. A concept proposal
JMC Gómez, JC Mondéjar, JR Gómez, JM Martínez
Forensic Science International: Digital Investigation 36, 301114, 2021
172021
Security Analysis of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JM Castelo Gómez, ...
Applied Sciences 12 (21), 10991, 2022
162022
A context-centered methodology for IoT forensic investigations
JM Castelo Gómez, J Carrillo Mondéjar, J Roldán Gómez, ...
International Journal of Information Security 20, 647-673, 2021
122021
Forensic analysis of the Xiaomi Mi smart sensor set
JMC Gómez, J Carrillo-Mondéjar, JLM Martínez, JN García
Forensic Science International: Digital Investigation 42, 301451, 2022
92022
Security Assessment of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, JLM Martínez
Journal of Physics: Conference Series 2224 (1), 012079, 2022
82022
Automatic Analysis Architecture of IoT Malware Samples
J Carrillo-Mondejar, JM Castelo Gomez, C Núñez-Gómez, ...
Security and Communication Networks 2020, 1-12, 2020
82020
Non-volatile memory forensic analysis in windows 10 iot core
JM Castelo Gómez, J Roldán Gómez, J Carrillo Mondéjar, ...
Entropy 21 (12), 1141, 2019
82019
On how VoIP attacks foster the malicious call ecosystem
J Carrillo-Mondéjar, JL Martinez, G Suarez-Tangil
Computers & Security 119, 102758, 2022
72022
Attack pattern recognition in the internet of things using complex event processing and machine learning
J Roldán-Gómez, J Boubeta-Puig, JMC Gómez, J Carrillo-Mondéjar, ...
2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021
72021
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms
S Ruiz-Villafranca, J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, ...
Computer Networks 233, 109868, 2023
52023
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns
J Roldán-Gómez, J Boubeta-Puig, J Carrillo-Mondéjar, JMC Gómez, ...
Engineering Applications of Artificial Intelligence 123, 106344, 2023
42023
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats
S Ruiz-Villafranca, J Carrillo-Mondéjar, JM Castelo Gómez, ...
The Journal of Supercomputing 79 (11), 11895-11933, 2023
42023
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
J Carrillo-Mondéjar, H Turtiainen, A Costin, JL Martínez, G Suarez-Tangil
IEEE Internet of Things Journal, 2022
32022
A concept forensic methodology for the investigation of IoT cyberincidents
JM Castelo Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ...
The Computer Journal 67 (4), 1324-1345, 2024
22024
Forensic Science International: Digital Investigation
JMC Gómez, JC Mondéjar, J Roldán, JMM Gómez
Forensic Science International 36, 301114, 2021
12021
An instrumentation based algorithm for stack overflow detection
J Carrillo-Mondéjar, JM Castelo-Gómez, J Roldán-Gómez, JL Martínez
Journal of Computer Virology and Hacking Techniques 16, 245-256, 2020
12020
Stories from a Customized Honeypot for the IoT
J Carrillo-Mondéjar, J Roldán-Gómez, JMC Gómez, SR Villafranca, ...
Journal of Internet Technology 25 (1), 117-127, 2024
2024
24 Integrando el Edge Computing en el Desarrollo de una Metodología Forense Dedicada a Entornos IoT
JM Castelo Gómez, J Roldán-Gómez, J Carrillo-Mondéjar, ...
Ediciones de la Universidad de Castilla-La Mancha, 2021
2021
Detección de vulnerabilidades basadas en Stack Overflow mediante DBI
JC Mondéjar, JLM Martínez
Actas de las Cuartas Jornadas Nacionales de Investigación en Ciberseguridad …, 2018
2018
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20