default search action
Ricardo J. Rodríguez
Person information
- affiliation: University of Zaragoza, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]María-Emilia Cambronero, Miguel A. Martínez, Luis Llana, Ricardo J. Rodríguez, Alejandro Russo:
Towards a GDPR-compliant cloud architecture with data privacy controlled through sticky policies. PeerJ Comput. Sci. 10: e1898 (2024) - [c26]Daniel Uroz, Ricardo J. Rodríguez, Carlos Hernandez Gañán:
Poster: Empirical Analysis of Lifespan Increase of IoT C&C Domains. IMC 2024: 767-768 - 2023
- [j33]Ricardo J. Rodríguez, Stefano Marrone, Ibai Marcos, Giuseppe Porzio:
MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP. Comput. Secur. 132: 103373 (2023) - [j32]Pedro Fernández-Álvarez, Ricardo J. Rodríguez:
Module extraction and DLL hijacking detection via single or multiple memory dumps. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301505 (2023) - [j31]Jing Bai, Xiaolin Chang, Ricardo J. Rodríguez, Kishor S. Trivedi, Shupan Li:
Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach. IEEE Trans. Veh. Technol. 72(4): 5181-5194 (2023) - 2022
- [j30]Razvan Raducu, Ricardo J. Rodríguez, Pedro Álvarez:
Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review. IEEE Access 10: 21742-21758 (2022) - [j29]Pedro Fernández-Álvarez, Ricardo J. Rodríguez:
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application. Digit. Investig. 40(Supplement): 301342 (2022) - [j28]Ricardo J. Rodríguez, Xabier Ugarte-Pedrero, Juan Tapiador:
Introduction to the Special Issue on Challenges and Trends in Malware Analysis. DTRAP 3(2): 8:1-8:2 (2022) - [j27]Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa:
Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks. DTRAP 3(2): 11:1-11:28 (2022) - [j26]Daniel Uroz, Ricardo J. Rodríguez:
Characterization and Evaluation of IoT Protocols for Data Exfiltration. IEEE Internet Things J. 9(19): 19062-19072 (2022) - [j25]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j24]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [c25]Esteban Damián Gutiérrez Mlot, Jose Saldana, Ricardo J. Rodríguez:
Towards a Testbed for Critical Industrial Systems: SunSpec Protocol on DER Systems as a Case Study. ETFA 2022: 1-4 - [c24]Jianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang:
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning. ISCC 2022: 1-6 - [i2]Ricardo J. Rodríguez, José Luis Salazar, Julián Fernández-Navajas:
Sittin'On the Dock of the (WiFi) Bay: On the Frame Aggregation under IEEE 802.11 DCF. CoRR abs/2211.03471 (2022) - 2021
- [j23]Jose Selvi, Ricardo J. Rodríguez, Emilio Soria-Olivas:
Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names. IEEE Access 9: 126446-126456 (2021) - [j22]Miguel Martín-Pérez, Ricardo J. Rodríguez, Davide Balzarotti:
Pre-processing memory dumps to improve similarity score of Windows modules. Comput. Secur. 101: 102119 (2021) - [j21]Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang:
LSGAN-AT: enhancing malware detector robustness against adversarial examples. Cybersecur. 4(1): 38 (2021) - [j20]Miguel Martín-Pérez, Ricardo J. Rodríguez, Frank Breitinger:
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms. Digit. Investig. 36 Supplement: 301120 (2021) - [c23]Miguel Martín-Pérez, Ricardo J. Rodríguez:
Quantifying Paging on Recoverable Data from Windows User-Space Modules. ICDF2C 2021: 1-19 - [c22]Daniel Uroz, Ricardo J. Rodríguez:
Evaluation of the Executional Power in Windows using Return Oriented Programming. SP (Workshops) 2021: 361-372 - [i1]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - 2020
- [j19]Daniel Uroz, Ricardo J. Rodríguez:
On Challenges in Verifying Trusted Executable Files in Memory Forensics. Digit. Investig. 32 Supplement: 300917 (2020) - [j18]Alvaro Botas, Ricardo J. Rodríguez, Vicente Matellán, Juan Felipe García Sierra, M. Teresa Trobajo, Miguel V. Carriegos:
On Fingerprinting of Public Malware Analysis Services. Log. J. IGPL 28(4): 473-486 (2020) - [j17]Ricardo J. Rodríguez, Simona Bernardi, Armin Zimmermann:
An Evaluation Framework for Comparative Analysis of Generalized Stochastic Petri Net Simulation Techniques. IEEE Trans. Syst. Man Cybern. Syst. 50(8): 2834-2844 (2020)
2010 – 2019
- 2019
- [j16]Daniel Uroz, Ricardo J. Rodríguez:
Characteristics and detectability of Windows auto-start extensibility points in memory forensics. Digit. Investig. 28 Supplement: S95-S104 (2019) - [j15]Jose Selvi, Ricardo J. Rodríguez, Emilio Soria-Olivas:
Detection of algorithmically generated malicious domain names using masked N-grams. Expert Syst. Appl. 124: 156-163 (2019) - [j14]Yu Shi, Xiaolin Chang, Ricardo J. Rodríguez, Zhenjiang Zhang, Kishor S. Trivedi:
Quantitative security analysis of a dynamic network system under lateral movement-based attacks. Reliab. Eng. Syst. Saf. 183: 213-225 (2019) - [j13]Abel Gómez, Ricardo J. Rodríguez, María-Emilia Cambronero, Valentín Valero:
Profiling the publish/subscribe paradigm for automated analysis using colored Petri nets. Softw. Syst. Model. 18(5): 2973-3003 (2019) - [j12]Ricardo J. Rodríguez, Javier Campos:
On Throughput Approximation of Resource-Allocation Systems by Bottleneck Regrowing. IEEE Trans. Control. Syst. Technol. 27(1): 370-377 (2019) - [j11]Ricardo J. Rodríguez, Rafael Tolosana-Calasanz, Omer F. Rana:
A Dynamic Data-throttling Approach to Minimize Workflow Imbalance. ACM Trans. Internet Techn. 19(3): 32:1-32:21 (2019) - [c21]Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa:
Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks. MICRADS 2019: 3-13 - 2018
- [j10]Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang:
Modeling and Analysis of High Availability Techniques in a Virtualized System. Comput. J. 61(2): 180-198 (2018) - [j9]Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83: 1-13 (2018) - [c20]Xiaolin Chang, ShaoHua Lv, Ricardo J. Rodríguez, Kishor S. Trivedi:
Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System. ICCCN 2018: 1-6 - 2017
- [j8]Ricardo J. Rodríguez:
A Petri net tool for software performance estimation based on upper throughput bounds. Autom. Softw. Eng. 24(1): 73-99 (2017) - [j7]Ricardo Julio Rodríguez, Juan Carlos García-Escartín:
Security assessment of the Spanish contactless identity card. IET Inf. Secur. 11(6): 386-393 (2017) - [j6]Ricardo J. Rodríguez:
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware. J. Comput. Virol. Hacking Tech. 13(2): 139 (2017) - [j5]Ricardo J. Rodríguez:
Evolution and characterization of point-of-sale RAM scraping malware. J. Comput. Virol. Hacking Tech. 13(3): 179-192 (2017) - [c19]Alvaro Botas, Ricardo J. Rodríguez, Vicente Matellán, Juan Felipe García Sierra:
Empirical Study to Fingerprint Public Malware Analysis Services. SOCO-CISIS-ICEUTE 2017: 589-599 - [c18]Armin Zimmermann, Andrés Canabal Lavista, Ricardo J. Rodríguez:
Some Notes on Rare-Event Simulation Challenges. VALUETOOLS 2017: 263-264 - 2016
- [j4]Ricardo J. Rodríguez:
On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets. IEEE Trans. Syst. Man Cybern. Syst. 46(2): 282-293 (2016) - [c17]Laura García, Ricardo J. Rodríguez:
A Peek under the Hood of iOS Malware. ARES 2016: 590-598 - [c16]Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi:
Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. GraMSec@CSF 2016: 134-149 - [c15]Roberto Nardone, Ricardo J. Rodríguez, Stefano Marrone:
Formal security assessment of Modbus protocol. ICITST 2016: 142-147 - [e1]Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez:
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9721, Springer 2016, ISBN 978-3-319-40666-4 [contents] - 2015
- [j3]Stefano Marrone, Ricardo J. Rodríguez, Roberto Nardone, Francesco Flammini, Valeria Vittorini:
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. Comput. Electr. Eng. 47: 275-285 (2015) - [j2]Ricardo J. Rodríguez, José Merseguer, Simona Bernardi:
Modelling Security of Critical Infrastructures: A Survivability Assessment. Comput. J. 58(10): 2313-2327 (2015) - [c14]Alvaro Botas, Ricardo J. Rodríguez, Teemu Uolevi Väisänen, Patrycjusz Zdzichowski:
Counterfeiting and Defending the Digital Forensic Process. CIT/IUCC/DASC/PICom 2015: 1966-1971 - [c13]Ricardo J. Rodríguez, Stefano Marrone:
Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems. IDC 2015: 439-449 - [c12]José Vila, Ricardo J. Rodríguez:
Practical Experiences on NFC Relay Attacks with Android - Virtual Pickpocketing Revisited. RFIDSec 2015: 87-103 - 2014
- [c11]Ricardo J. Rodríguez, Elena Gómez-Martínez:
Model-Based Safety Assessment Using OCL and Petri Nets. EUROMICRO-SEAA 2014: 56-59 - [c10]Ricardo J. Rodríguez, Sasikumar Punnekkat:
Cost Optimisation in Certification of Software Product Lines. ISSRE Workshops 2014: 509-514 - [c9]Elena Gómez-Martínez, Ricardo J. Rodríguez, Leire Etxeberria Elorza, Miren Illarramendi Rezabal, Clara Benac Earle:
Model-Based Verification of Safety Contracts. SEFM Workshops 2014: 101-115 - [c8]Ricardo J. Rodríguez, Lars-Åke Fredlund, Ángel Herranz-Nieva, Julio Mariño:
Execution and Verification of UML State Machines with Erlang. SEFM 2014: 284-289 - 2013
- [j1]Ricardo J. Rodríguez, Jorge Júlvez, José Merseguer:
On the Performance Estimation and Resource Optimization in Process Petri Nets. IEEE Trans. Syst. Man Cybern. Syst. 43(6): 1385-1398 (2013) - 2012
- [c7]Ricardo J. Rodríguez, Jorge Júlvez, José Merseguer:
PeabraiN: A PIPE Extension for Performance Estimation and Resource Optimisation. ACSD 2012: 142-147 - [c6]Ricardo J. Rodríguez, Rafael Tolosana-Calasanz, Omer F. Rana:
Automating Data-Throttling Analysis for Data-Intensive Workflows. CCGRID 2012: 310-317 - [c5]Ricardo J. Rodríguez, Catia Trubiani, José Merseguer:
Fault-tolerant techniques and security mechanisms for model-based performance prediction of critical systems. ISARCS 2012: 21-30 - [c4]Ricardo J. Rodríguez, Rafael Tolosana-Calasanz, Omer F. Rana:
Measuring the Effectiveness of Throttled Data Transfers on Data-Intensive Workflows. KES-AMSTA 2012: 144-153 - 2010
- [c3]Ricardo J. Rodríguez, Jorge Júlvez:
Accurate Performance Estimation for Stochastic Marked Graphs by Bottleneck Regrowing. EPEW 2010: 175-190 - [c2]Ricardo J. Rodríguez, José Merseguer:
Integrating Fault-Tolerant Techniques into the Design of Critical Systems. ISARCS 2010: 33-51 - [c1]Ricardo J. Rodríguez, José Merseguer, Simona Bernardi:
Modelling and analysing resilience as a security issue within UML. SERENE 2010: 42-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint