Dr Jorge Blasco Alis

  1. 2020
  2. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Blasco Alis, J., Tileria Palacios, M. & Suarez de Tangil Rotaeche, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2019
  5. Published
  6. Published

    Wearables Security and Privacy

    Blasco, J., Chen, T. M., Kupwade Patil, H. & Wolff, D., 1 Jan 2019, Studies in Systems, Decision and Control. Springer International Publishing AG, p. 351-380 30 p. (Studies in Systems, Decision and Control; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. 2018
  8. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In : Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticle

  9. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P., 24 Aug 2018, In : Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782.

    Research output: Contribution to journalArticle

  10. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In : Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticle

  11. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J., 13 Mar 2018, p. 152-154. 3 p.

    Research output: Contribution to conferencePoster

  12. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In : Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticle

  13. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaper

  14. 2017
  15. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  16. E-pub ahead of print

    Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case

    Blasco Alis, J., 2 Aug 2017, Data Analytics and Decision Support for Cybersecurity. Springer, p. 55-97 43 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. 2016
  18. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In : ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticle

  19. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaper

  20. 2015
  21. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In : Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticle

  22. 2014
  23. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

    Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P. & Blasco, J., Mar 2014, In : Expert Systems with Applications. 41, 4, Part 1, p. 1104-1117 14 p.

    Research output: Contribution to journalArticle

  25. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In : International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticle

  26. Published

    Security models in vehicular ad-hoc networks: A survey

    De Fuentes, J. M., González-Manzano, L., González-Tablas, A. I. & Blasco, J., 1 Jan 2014, In : IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India). 31, 1, p. 47-64 18 p.

    Research output: Contribution to journalReview article

  27. 2012
  28. Published

    Bypassing information leakage protection with trusted applications

    Blasco, J., Hernandez-Castro, J. C., Tapiador, J. E. & Ribagorda, A., 1 Jun 2012, In : Computers and Security. 31, 4, p. 557-568 12 p.

    Research output: Contribution to journalArticle

  29. 2011
  30. Published

    Analysis of update delays in signature-based network intrusion detection systems

    Gascon, H., Orfila, A. & Blasco, J., 1 Nov 2011, In : Computers and Security. 30, 8, p. 613-624 12 p.

    Research output: Contribution to journalArticle