Ochoa, Martín
1904  results:
Search for persons X
?
1

Adversarial attacks against mouse- and keyboard-based biome..:

López, Christian ; Solano, Jesús ; Rivera, Esteban...
International Journal of Information Security.  22 (2023)  6 - p. 1665-1685 , 2023
 
?
3

Effects of Prenatal Cannabinoids Exposure upon Placenta and..:

, In: Advances in Maternal-Fetal Biomedicine; Advances in Experimental Medicine and Biology,
 
?
4

Is Modeling Access Control Worth It?:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Basin, David ; Guarnizo, Juan ; Krstic, Srđan.. - p. 2830-2844 , 2023
 
?
 
?
6

A Siamese Neural Network for Scalable Behavioral Biometrics..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
Solano, Jesús ; Rivera, Esteban ; Tengana, Lizzy... - p. 515-535 , 2022
 
?
7

Constrained Proximity Attacks on Mobile Targets:

Wang, Xueou ; Hou, Xiaolu ; Rios, Ruben..
ACM Transactions on Privacy and Security.  25 (2022)  2 - p. 1-29 , 2022
 
?
8

Scalable and Secure HTML5 Canvas-Based User Authentication:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
Rivera, Esteban ; Tengana, Lizzy ; Solano, Jesús... - p. 554-574 , 2022
 
?
10

ATLAS: A Practical Attack Detection and Live Malware Analys..:

, In: Lecture Notes in Computer Science; Information Security,
Aung, Yan Lin ; Ochoa, Martín ; Zhou, Jianying - p. 319-338 , 2022
 
?
11

Scanning the Cycle: Timing-based Authentication on PLCs:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
 
?
12

SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems:

Chekole, Eyasu Getahun ; Ochoa, Martín ; Chattopadhyay, Sudipta
International Journal of Critical Infrastructure Protection.  33 (2021)  - p. 100431 , 2021
 
?
13

Centy: Scalable Server-Side Web Integrity Verification Syst..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
14

AttkFinder: Discovering Attack Vectors in PLC Programs usin..:

, In: 24th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
15

Risk-based Authentication Based on Network Latency Profilin:

, In: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security,
Rivera, Esteban ; Tengana, Lizzy ; Solano, Jesús... - p. 105-115 , 2020
 
1-15