"CCBHash (Compound Code Block Hash) para Análisis de Malware",
XVII Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 11/2022. More.. 2033.pdf (427.58 KB)
XVII Reunión Española sobre Criptología y Seguridad de la Información, pp. 168-173, 11/2022. More.. 2033.pdf (427.58 KB)
"Cybersecurity Profiles based on Human-Centric IoT Devices",
Human-centric Computing and Information Sciences, vol. 9, no. 1, Springer, pp. 1-23, 2019. DOI (I.F.: 3.7)More.. HFNR2019.pdf (2.92 MB)
Human-centric Computing and Information Sciences, vol. 9, no. 1, Springer, pp. 1-23, 2019. DOI (I.F.: 3.7)More.. HFNR2019.pdf (2.92 MB)
"A comprehensive methodology for deploying IoT honeypots",
15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018), vol. LNCS 11033, Springer Nature Switzerland AG, pp. 229–243, 09/2018. DOI More.. 1701.pdf (676.29 KB)
Modify or remove your filters and try again. 15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2018), vol. LNCS 11033, Springer Nature Switzerland AG, pp. 229–243, 09/2018. DOI More..
Abstract
Recent news have raised concern regarding the security on the IoT field. Vulnerabilities in devices are arising and honeypots are an excellent way to cope with this problem. In this work, current solutions for honeypots in the IoT context, and other solutions adaptable to it are analyzed in order to set the basis for a methodology that allows deployment of IoT honeypot.