Skip to main content
Kent Academic Repository

Items where Author, Editor or other role is "Hernandez Castro, Julio"

Group by: Creator's name | Item Type | Date | No Grouping
Number of items: 73.

Article

Yilmaz, Yagiz, Cetin, Orcun, Grigore, Claudia, Arief, Budi, Hernandez-Castro, Julio (2023) Personality Types and Ransomware Victimisation. Digital Threats: Research and Practice, 4 (4). pp. 1-25. ISSN 2692-1626. E-ISSN 2576-5337. (doi:10.1145/3568994) (KAR id:102123)
Format: PDF Format: PDF

Patsakis, Constantinos, Politou, Eugenia, Alepis, Efthimios, Hernandez-Castro, Julio C. (2023) Cashing out crypto: state of practice in ransom payments. International Journal of Information Security, 23 (2). pp. 699-712. ISSN 1615-5270. (doi:10.1007/s10207-023-00766-z) (KAR id:105461)
Format: PDF

Almaraz Luengo, Elena, Alaña Olivares, Bittor, García Villalba, Luis Javier, Hernandez-Castro, Julio C., Hurley-Smith, Darren (2023) StringENT test suite: ENT battery revisited for efficient P value computation. Journal of Cryptographic Engineering, 13 (2). pp. 235-249. ISSN 2190-8516. (doi:10.1007/s13389-023-00313-5) (KAR id:101386)
Format: PDF

Filiz, Burak, Arief, Budi, Cetin, Orcun, Hernandez-Castro, Julio C. (2021) On the Effectiveness of Ransomware Decryption Tools. Computers & Security, 111 . Article Number 102469. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102469) (KAR id:92302)
Format: PDF Format: PDF

Yilmaz, Yagiz, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2021) Investigating the Impact of Ransomware Splash Screens. Journal of Information Security and Applications, 61 . Article Number 102934. ISSN 2214-2126. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2021.102934) (KAR id:92301)
Format: PDF Format: PDF

Hurley-Smith, Darren, Patsakis, Constantinos, Hernandez-Castro, Julio C. (2020) On the unbearable lightness of FIPS 140-2 randomness tests. IEEE Transactions on Information Forensics and Security, . p. 1. ISSN 1556-6013. (doi:10.1109/TIFS.2020.2988505) (KAR id:81881)
Format: PDF

Hernandez-Castro, J., Cartwright, A., Cartwright, E. (2020) An economic analysis of ransomware and its welfare consequences. Royal Society Open Science, 7 (3). p. 190023. ISSN 2054-5703. (doi:10.1098/rsos.190023) (KAR id:80658)
Format: PDF

Hurley-Smith, Darren, Hernandez-Castro, Julio (2020) Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Transactions on Privacy and Security, 23 (3). pp. 1-25. ISSN 2471-2566. (doi:10.1145/3398726) (KAR id:81957)
Format: PDF Format: PDF

Martin, Alejandro, Hernandez-Castro, Julio C., Camacho, David (2018) An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access, 6 . pp. 57205-57218. ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2873583) (KAR id:69882)
Format: PDF

González Fernández, Edgar, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:10.3390/s18092804) (KAR id:69341)
Format: PDF

Sloan, Tom, Hernandez-Castro, Julio (2018) Dismantling OpenPuff PDF steganography. Digital Investigation, 25 . pp. 90-96. ISSN 1742-2876. (doi:10.1016/j.diin.2018.03.003) (KAR id:67242)
Format: PDF

Cervantes, Alejandro, Sloan, Tom, Hernandez-Castro, Julio C., Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). Article Number 195737. ISSN 1932-6203. (doi:10.1371/journal.pone.0195737) (KAR id:67066)
Format: PDF

Hurley-Smith, Darren, Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67241)
Format: PDF

Armas Vega, Esteban, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). Article Number 3372. ISSN 1424-8220. (doi:10.3390/s18103372) (KAR id:69864)
Format: PDF

Osadchy, Margarita, Hernandez-Castro, Julio C., Gibson, Stuart J., Dunkelman, Orr, Perez-Cabo, Daniel (2017) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2640-2653. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2718479) (KAR id:62081)
Format: PDF

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
Format: PDF

Bello, Gema, Hernandez-Castro, Julio, Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:10.1016/j.future.2016.06.032) (KAR id:58380)
Format: PDF

Harrison, Joe, Roberts, David L., Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58382)
Format: PDF

Avoine, Gildas, Beaujeant, Antonin, Hernandez-Castro, Julio C., Demay, Louis, Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). Article Number 47. ISSN 0360-0300. (doi:10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:60598)

Orozco, Ana Lucila Sandoval, Corripio, Jocelin Rosales, González, David Manuel Arenas, Villalba, Luis Javier García, Hernandez-Castro, Julio C. (2016) Theia: a tool for the forensic analysis of mobile devices pictures. Computing, 98 (12). pp. 1251-1286. ISSN 0010-485X. E-ISSN 1436-5057. (doi:10.1007/s00607-015-0482-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:61997)

Sandoval Orozco, Ana Lucila, Garcia Villalba, Luis Javier, Arenas Gonzalez, David Manuel, Rosales Corripio, Jocelin, Hernandez-Castro, Julio C., Gibson, Stuart James (2015) Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision,, 9 (5). pp. 723-731. ISSN 1751-9632. E-ISSN 1751-9640. (doi:10.1049/iet-cvi.2014.0243) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:53396)
Format: PDF

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
Format: PDF

Sandoval Orozco, Ana Lucila, Corripio, Jocelin Rosales, García Villalba, Luis Javier, Hernandez-Castro, Julio C. (2015) Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications, 75 (12). pp. 7087-7111. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2633-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:61966)

Barnes, David J., Hernandez-Castro, Julio C. (2015) On the limits of engine analysis for cheating detection in chess. Computers and Security, 48 . pp. 58-73. ISSN 0167-4048. (doi:10.1016/j.cose.2014.10.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:44719)
Format: PDF

Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58386)
Format: PDF

Safkhani, Masoumeh, Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Bagheri, Nasour (2014) Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 259 (Pt B). pp. 571-577. ISSN 0377-0427. (doi:10.1016/j.cam.2013.09.073) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45298)
Format: PDF

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0) (KAR id:38400)
Format: PDF

Barrero, David, Hernandez-Castro, Julio C., Peris-Lopez, Pedro, Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45299)
Format: PDF

Sandoval Orozco, A.L., Arenas Gonzalez, David Manuel, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58385)
Format: PDF

Picazo Sanchez, Pablo, Martin, Lara, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45300)
Format: PDF

Khalil, Omar, Hernandez-Castro, Julio C., Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:10.1016/j.diin.2013.01.004) (KAR id:45303)
Format: PDF

Sandoval Orozco, A.L., Arenas, Gonzalez, Rosales, Corripio, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:10.1007/s00607-013-0313-5) (KAR id:45306)
Format: PDF

Tapiador, Juan E., Hernandez-Castro, Julio C., Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31939)
Format: PDF

Blasco Alis, Jorge, Hernandez-Castro, Julio C., Tapiador, Juan E., Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31937)
Format: PDF

Peris-Lopez, Pedro, Orfila, Agustin, Palomar, Esther, Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31942)
Format: PDF

Hernandez-Castro, Julio C., Estévez-Tapiador, Juan M., Peris-Lopez, Pedro, Clark, John A., Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31940)
Format: PDF

Blasco Alis, Jorge, Hernandez-Castro, Julio C., de Fuentes, Jose Maria, Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31941)
Format: PDF

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31943)
Format: PDF

Peris-Lopez, Pedro, Orfila, Agustin, Hernandez-Castro, Julio C., van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31944)
Format: PDF

Hernandez-Castro, Julio C., Tapiador, Juan E., Palomar, Esther, Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31949)
Format: PDF

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945)
Format: PDF

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:10.1587/transinf.E93.D.518) (KAR id:31947)
Format: PDF

Mitrokotsa, Aikaterini, Dimitrakakis, Christos, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:10.1109/LCOMM.2010.02.091946) (KAR id:31946)
Format: PDF

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31950)
Format: PDF

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31952)
Format: PDF

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31951)
Format: PDF

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31953)
Format: PDF

Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Peris-Lopez, Pedro, Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31959)
Format: PDF

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31956)
Format: PDF

Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957)
Format: PDF

Palomar, Esther, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31955)
Format: PDF

Polimon, Javier, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (doi:10.3233/kes-2008-12102) (KAR id:31960)
Format: PDF

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31958)
Format: PDF

Book section

McBride, Jack and Hernandez-Castro, Julio and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: 2017 International Workshop on Secure Internet of Things (SIoT). IEEE. ISBN 978-1-5386-4542-0. E-ISBN 978-1-5386-4541-3. (doi:10.1109/SIoT.2017.00009) (KAR id:64302)
Format: PDF

McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. Junction Publishing, Canada, pp. 278-283. ISBN 978-0-9949886-2-1. (KAR id:67379)
Format: PDF

Conference or workshop item

Ozturk, Omer Said, Ekmekcioglu, Emre, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2023) New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 13-18. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590780) (KAR id:102124)
Format: PDF Format: PDF

Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2023) Dark ending: what happens when a dark web market closes down. In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy. . ISBN 978-989-758-624-8. (doi:10.5220/0011681600003405) (KAR id:100540)
Format: PDF

Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont, Jamie, Hernandez-Castro, Julio C. (2022) Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots. In: 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022). . pp. 15-31. (In press) (KAR id:102122)
Format: PDF

Brierley, Calvin, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. In: Tuveri, N. and Michalas, A. and Brumley, B.B., eds. Lecture Notes in Computer Science. Secure IT Systems. 26th Nordic Conference, NordSec 2021. 13115. pp. 79-92. Springer ISBN 978-3-030-91624-4. E-ISBN 978-3-030-91625-1. (doi:10.1007/978-3-030-91625-1_5) (KAR id:92304)
Format: PDF Format: PDF

Brierley, Calvin, Pont, Jamie, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Persistence in Linux-Based IoT Malware. In: Lecture Notes in Computer Science. Secure IT Systems. 12556. pp. 3-19. Springer E-ISBN 978-3-030-70852-8. (doi:10.1007/978-3-030-70852-8_1) (KAR id:84209)
Format: PDF

Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2021) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. In: 2021 APWG Symposium on Electronic Crime Research (eCrime). . pp. 1-13. IEEE ISBN 978-1-6654-8029-1. (doi:10.1109/eCrime54498.2021.9738745) (KAR id:99679)
Format: PDF

Pont, Jamie, Arief, Budi, Hernandez-Castro, Julio C. (2020) Why Current Statistical Approaches to Ransomware Detection Fail. In: Lecture Notes in Computer Science. Information Security. 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings. 12472. Springer ISBN 978-3-030-62973-1. (doi:10.1007/978-3-030-62974-8_12) (KAR id:82960)
Format: PDF

Arief, Budi, Periam, Andy, Cetin, Orcun, Hernandez-Castro, Julio C. (2020) Using Eyetracker to Find Ways to Mitigate Ransomware. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. . pp. 448-456. Scitepress ISBN 978-989-758-399-5. (doi:10.5220/0008956004480456) (KAR id:80445)
Format: PDF Format: PDF

Pont, Jamie, Abu Oun, Osama, Brierley, Calvin, Arief, Budi, Hernandez-Castro, Julio C. (2019) A Roadmap for Improving the Impact of Anti-Ransomware Research. In: Askarov, Aslan and Hansen, René Rydhof and Rafnsson, Willard, eds. Lecture Notes in Computer Science. Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. 11875. Springer ISBN 978-3-030-35054-3. (doi:10.1007/978-3-030-35055-0_9) (KAR id:76942)
Format: PDF

de Balthasar, Thibault, Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: Lecture Notes in Computer Science. . pp. 297-312. Springer-Verlag Berlin ISBN 978-3-319-70289-6. E-ISBN 978-3-319-70290-2. (doi:10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:64334)
Format: PDF

Bello Orgaz, Gema, Hernandez-Castro, Julio C., Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (doi:10.1007/978-3-319-10422-5_36) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:45297)

Corripio, J.R., Sandoval Orozco, A.L., Garcia Villalba, L.J., Hernandez-Castro, Julio C., Gibson, Stuart J. (2013) Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. In: The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK. (Unpublished) (KAR id:37195)
Format: PDF

Thesis

Fiennes, Sicily Bambini (2021) Investigating image-based species identification for birds in the wildlife trade. Master of Science by Research (MScRes) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.92734) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92734)
Format: PDF

Internet publication

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (KAR id:51071)
Format: HTML

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only. (KAR id:45255)
Format: HTML

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
Format: HTML

Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (KAR id:52891)
Format: PDF

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (KAR id:52890)
Format: PDF

This list was generated on Thu Apr 18 20:18:45 2024 BST.