default search action
José Roldán Gómez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Sergio Ruiz-Villafranca, Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez:
A self-contained emulator for the forensic examination of IoE scenarios. Ad Hoc Networks 168: 103718 (2025) - 2024
- [j15]Juan Manuel Castelo Gómez, José Roldán Gómez, Sergio Ruiz-Villafranca, Álvaro del Amo Mínguez:
Forensic Analysis of the IoT Operating System Ubuntu Core. Comput. Informatics 43(3): 529-560 (2024) - [j14]Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez:
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents. Comput. J. 67(4): 1324-1345 (2024) - [j13]Sergio Ruiz-Villafranca, Juan Manuel Castelo Gómez, José Roldán Gómez:
A forensic tool for the identification, acquisition and analysis of sources of evidence in IoT investigations. Internet Things 27: 101308 (2024) - [j12]Sergio Ruiz-Villafranca, José Roldán Gómez, Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Luis Martínez:
A TabPFN-based intrusion detection system for the industrial internet of things. J. Supercomput. 80(14): 20080-20117 (2024) - [j11]José Roldán Gómez, Jesús Martínez del Rincón, Juan Boubeta-Puig, José Luis Martínez:
An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection. Wirel. Networks 30(6): 5127-5144 (2024) - 2023
- [j10]Sergio Ruiz-Villafranca, José Roldán Gómez, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Miguel Villalón Millán:
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms. Comput. Networks 233: 109868 (2023) - [j9]José Roldán Gómez, Juan Boubeta-Puig, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, Jesús Martínez del Rincón:
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns. Eng. Appl. Artif. Intell. 123(Part B): 106344 (2023) - [j8]Sergio Ruiz-Villafranca, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez:
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats. J. Supercomput. 79(11): 11895-11933 (2023) - 2021
- [j7]Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez Martínez:
Developing an IoT forensic methodology. A concept proposal. Digit. Investig. 36 Supplement: 301114 (2021) - [j6]Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez Martínez:
A context-centered methodology for IoT forensic investigations. Int. J. Inf. Sec. 20(5): 647-673 (2021) - [j5]José Roldán Gómez, Juan Boubeta-Puig, Gabriela Pachacama-Castillo, Guadalupe Ortiz, José Luis Martínez:
Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures. PeerJ Comput. Sci. 7: e787 (2021) - [c1]José Roldán Gómez, Juan Boubeta-Puig, Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Luis Martínez:
Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning. SMC 2021: 1919-1926 - 2020
- [j4]José Roldán Gómez, Juan Boubeta-Puig, José Luis Martínez, Guadalupe Ortiz:
Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst. Appl. 149: 113251 (2020) - [j3]Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, Carlos Núñez-Gómez, José Roldán Gómez, José Luis Martínez:
Automatic Analysis Architecture of IoT Malware Samples. Secur. Commun. Networks 2020: 8810708:1-8810708:12 (2020) - [j2]Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez, José Luis Martínez:
An instrumentation based algorithm for stack overflow detection. J. Comput. Virol. Hacking Tech. 16(3): 245-256 (2020)
2010 – 2019
- 2019
- [j1]Juan Manuel Castelo Gómez, José Roldán Gómez, Javier Carrillo Mondéjar, José Luis Martínez:
Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core. Entropy 21(12): 1141 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint