Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 50.

Martin, Alejandro and Hernandez-Castro, Julio C. and Camacho, David (2018) An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access, 6 . pp. 57205-57218. ISSN 2169-3536. (doi:https://doi.org/10.1109/ACCESS.2018.2873583) (Full text available)
[img]
Preview

González Fernández, Edgar and Sandoval Orozco, Ana and García Villalba, Luis and Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:https://doi.org/10.3390/s18092804) (Full text available)
[img]
Preview

McBride, Jack and Hernandez-Castro, Julio C. and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: Proceedings of the 2017 International Workshop on Secure Internet of Things SIoT 2017. IEEE ISBN 978-1-5386-4541-3. (doi:https://doi.org/10.1109/SIoT.2017.00009) (Full text available)
[img]
Preview

Cervantes, Alejandro and Sloan, Tom and Hernandez-Castro, Julio C. and Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). e0195737. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0195737) (Full text available)
[img]

McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: ACM Digital Library. 2018 International Conference on Embedded Wireless Systems and Networks (EWSN). pp. 278-283. ISBN 978-0-9949886-2-1. (Full text available)
[img]
Preview

Armas Vega, Esteban and Sandoval Orozco, Ana and García Villalba, Luis and Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). p. 3372. ISSN 1424-8220. (doi:https://doi.org/10.3390/s18103372) (Full text available)
[img]
Preview

de Balthasar, Thibault and Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: Lecture Notes in Computer Science. Springer-Verlag Berlin pp. 297-312. ISBN 978-3-319-70289-6. E-ISBN 978-3-319-70290-2. (doi:https://doi.org/10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Osadchy, Margarita and Hernandez-Castro, Julio C. and Gibson, Stuart J. and Dunkelman, Orr and Perez-Cabo, Daniel (2017) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security, . ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2017.2718479) (Full text available)
[img]
Preview

Avoine, Gildas and Beaujeant, Antonin and Hernandez-Castro, Julio C. and Demay, Louis and Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). pp. 1-37. ISSN 0360-0300. (doi:https://doi.org/10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Orozco, Ana Lucila Sandoval and Corripio, Jocelin Rosales and González, David Manuel Arenas and Villalba, Luis Javier García and Hernandez-Castro, Julio C. (2016) Theia: a tool for the forensic analysis of mobile devices pictures. Computing, 98 (12). pp. 1251-1286. ISSN 0010-485X. E-ISSN 1436-5057. (doi:https://doi.org/10.1007/s00607-015-0482-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sandoval Orozco, Ana Lucila and Garcia Villalba, Luis Javier and Arenas Gonzalez, David Manuel and Rosales Corripio, Jocelin and Hernandez-Castro, Julio C. and Gibson, Stuart James (2015) Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision,, 9 (5). pp. 723-731. ISSN 1751-9632. E-ISSN 1751-9640. (doi:https://doi.org/10.1049/iet-cvi.2014.0243) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:https://doi.org/10.7717/peerj-cs.10) (Full text available)
[img]
Preview

Sandoval Orozco, Ana Lucila and Corripio, Jocelin Rosales and García Villalba, Luis Javier and Hernandez-Castro, Julio C. (2015) Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications, 75 (12). pp. 7087-7111. ISSN 1380-7501. E-ISSN 1573-7721. (doi:https://doi.org/10.1007/s11042-015-2633-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (Full text available)
[img]

Barnes, David J. and Hernandez-Castro, Julio C. (2015) On the limits of engine analysis for cheating detection in chess. Computers and Security, 48 . pp. 58-73. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2014.10.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bowles, Stephen and Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bello Orgaz, Gema and Hernandez-Castro, Julio C. and Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert and Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (Full text available)
[img]

Safkhani, Masoumeh and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Bagheri, Nasour (2014) Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 259 (Pt B). pp. 571-577. ISSN 0377-0427. (doi:https://doi.org/10.1016/j.cam.2013.09.073) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(14)70461-0) (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert and Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Barrero, David and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro and Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:https://doi.org/10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sandoval Orozco, A.L. and Arenas Gonzalez, David Manuel and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:https://doi.org/10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Corripio, J.R. and Sandoval Orozco, A.L. and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. and Gibson, Stuart J. (2013) Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. In: The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK. (Unpublished) (Full text available)
[img]
Preview

Picazo Sanchez, Pablo and Martin, Lara and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:https://doi.org/10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Khalil, Omar and Hernandez-Castro, Julio C. and Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:https://doi.org/10.1016/j.diin.2013.01.004) (Full text available)
[img]
Preview

Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:https://doi.org/10.1007/s00607-013-0313-5) (Full text available)
[img]
Preview

Tapiador, Juan E. and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:https://doi.org/10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:https://doi.org/10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Palomar, Esther and Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:https://doi.org/10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Estévez-Tapiador, Juan M. and Peris-Lopez, Pedro and Clark, John A. and Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:https://doi.org/10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and de Fuentes, Jose Maria and Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:https://doi.org/10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Hernandez-Castro, Julio C. and van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Tapiador, Juan E. and Palomar, Esther and Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Li, Tieyan and Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:https://doi.org/10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:https://doi.org/10.1587/transinf.E93.D.518) (Full text available)
[img]
Preview

Mitrokotsa, Aikaterini and Dimitrakakis, Christos and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:https://doi.org/10.1109/LCOMM.2010.02.091946) (Full text available)
[img]
Preview

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. and Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Peris-Lopez, Pedro and Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Alcaide, Almudena and Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Palomar, Esther and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Polimon, Javier and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (Full text available)
[img]
Preview

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:https://doi.org/10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

This list was generated on Wed May 1 22:42:16 2019 BST.