Follow
J. Carrillo-Mondejar
J. Carrillo-Mondejar
Verified email at unizar.es
Title
Cited by
Cited by
Year
Security Analysis of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JM Castelo Gómez, ...
Applied Sciences 12 (21), 10991, 2022
292022
Characterizing Linux-based malware: Findings and recent trends
J Carrillo-Mondéjar, JL Martínez, G Suarez-Tangil
Future Generation Computer Systems 110, 267-281, 2020
292020
Developing an IoT forensic methodology. A concept proposal
JMC Gómez, JC Mondéjar, JR Gómez, JM Martínez
Forensic Science International: Digital Investigation 36, 301114, 2021
212021
An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns
J Roldán-Gómez, J Boubeta-Puig, J Carrillo-Mondéjar, JMC Gómez, ...
Engineering Applications of Artificial Intelligence 123, 106344, 2023
152023
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants
J Carrillo-Mondéjar, H Turtiainen, A Costin, JL Martínez, G Suarez-Tangil
IEEE Internet of Things Journal 10 (10), 8371-8394, 2022
142022
A context-centered methodology for IoT forensic investigations
JM Castelo Gómez, J Carrillo Mondéjar, J Roldán Gómez, ...
International Journal of Information Security 20, 647-673, 2021
142021
MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats
S Ruiz-Villafranca, J Carrillo-Mondéjar, JM Castelo Gómez, ...
The Journal of Supercomputing 79 (11), 11895-11933, 2023
122023
Non-volatile memory forensic analysis in windows 10 iot core
JM Castelo Gómez, J Roldán Gómez, J Carrillo Mondéjar, ...
Entropy 21 (12), 1141, 2019
122019
A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms
S Ruiz-Villafranca, J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, ...
Computer Networks 233, 109868, 2023
102023
Forensic analysis of the Xiaomi Mi smart sensor set
JMC Gómez, J Carrillo-Mondéjar, JLM Martínez, JN García
Forensic Science International: Digital Investigation 42, 301451, 2022
102022
On how VoIP attacks foster the malicious call ecosystem
J Carrillo-Mondéjar, JL Martinez, G Suarez-Tangil
Computers & Security 119, 102758, 2022
102022
Security Assessment of the MQTT-SN Protocol for the Internet of Things
J Roldán-Gómez, J Carrillo-Mondéjar, JMC Gómez, JLM Martínez
Journal of Physics: Conference Series 2224 (1), 012079, 2022
102022
Automatic Analysis Architecture of IoT Malware Samples
J Carrillo-Mondejar, JM Castelo Gomez, C Núńez-Gómez, ...
Security and Communication Networks 2020, 1-12, 2020
102020
Attack pattern recognition in the internet of things using complex event processing and machine learning
J Roldán-Gómez, J Boubeta-Puig, JMC Gómez, J Carrillo-Mondéjar, ...
2021 IEEE international conference on systems, man, and cybernetics (SMC …, 2021
72021
A TabPFN-based intrusion detection system for the industrial internet of things
S Ruiz-Villafranca, J Roldán-Gómez, JMC Gómez, J Carrillo-Mondéjar, ...
The Journal of Supercomputing, 1-38, 2024
22024
A concept forensic methodology for the investigation of IoT cyberincidents
JM Castelo Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ...
The Computer Journal 67 (4), 1324-1345, 2024
22024
An instrumentation based algorithm for stack overflow detection
J Carrillo-Mondéjar, JM Castelo-Gómez, J Roldán-Gómez, JL Martínez
Journal of Computer Virology and Hacking Techniques 16, 245-256, 2020
22020
Identifying runtime libraries in statically linked Linux binaries
J Carrillo-Mondéjar, RJ Rodríguez
Future Generation Computer Systems 164, 107602, 2025
12025
Forensic Science International: Digital Investigation
JMC Gómez, JC Mondéjar, J Roldán, JMM Gómez
Forensic Science International 36, 301114, 2021
12021
A self-contained emulator for the forensic examination of IoE scenarios
S Ruiz-Villafranca, JMC Gómez, J Carrillo-Mondéjar, J Roldán-Gómez, ...
Ad Hoc Networks 168, 103718, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20