Reading Time: < 1 minute

Show all

Wang, Yixiang; Liu, Jiqiang; Chang, Xiaolin; Wang, Jianhua; Rodríguez, Ricardo J.

AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples Journal Article

In: Journal of Information Security and Applications, vol. 68, pp. 103227, 2022, ISSN: 2214-2126.

Abstract | Links | BibTeX | Tags: adversarial examples, deep learning, generalization, optimization, Security, Transferability

Chang, Xiaolin; Lv, Shaohua; Rodríguez, Ricardo J; Trivedi, Kishor

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System Proceedings Article

In: Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6, 2018, ISSN: 1095-2055.

Abstract | Links | BibTeX | Tags: Quantitative analysis, Reactive defense strategy, Security, Stochastic reward nets, Survivability

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

In: IET Information Security, vol. 11, no. 6, pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling Security of Critical Infrastructures: A Survivability Assessment Journal Article

In: The Computer Journal, vol. 58, no. 10, pp. 2313–2327, 2015.

Abstract | Links | BibTeX | Tags: Security, sensitive analysis, software system engineering, Survivability, UML

Vila, José; Rodríguez, Ricardo J

Practical Experiences on NFC Relay Attacks with Android: Virtual Pickpocketing Revisited Proceedings Article

In: Proceedings of the 11th International Workshop on RFID Security (RFIDsec), pp. 87–103, Springer, 2015.

Abstract | Links | BibTeX | Tags: Android, contactless cards, contactless payment, NFC, relay attacks, Security

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling and Analysing Resilience as a Security Issue within UML Proceedings Article

In: Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems (SERENE), pp. 42–51, ACM, London, United Kingdom, 2010.

Abstract | Links | BibTeX | Tags: Petri nets, Petri nets, Security, software system engineering, UML