default search action
Rubén Trapero
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Christos Dalamagkas, Yannis Spyridis, Thomas Lagkas, Georgios Efstathopoulos, Achilleas Sesis, Ignacio Labrador Pavón, Rubén Trapero Burgos, Rodrigo Diaz Rodriguez, Antonios Sarigiannidis, Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Giannis Ledakis, Achilleas Pasias, Thanasis Kotsiopoulos, Anastasios Drosou, Orestis Mavropoulos, Alba Colet-Subirachs, Pol Paradell Sola, José Luis Domínguez-García, Marisa Escalante, Alberto Molinuevo Martín, Benito Caracuel, Francisco Ramos, Vasileios Gkioulos, Sokratis K. Katsikas, Hans Christian Bolstad, Dan-Eric Archer, Nikola Paunovic, Ramon Gallart-Fernandez, Theodoros Rokkas, Alicia Arce:
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture. Digit. 1(4): 173-187 (2021)
2010 – 2019
- 2019
- [j9]Alejandro Molina Zarca, Jorge Bernal Bernabé, Rubén Trapero, Diego Rivera, Jesus Villalobos, Antonio F. Skarmeta, Stefano Bianchi, Anastasios Zafeiropoulos, Panagiotis Gouvas:
Security Management Architecture for NFV/SDN-Aware IoT Systems. IEEE Internet Things J. 6(5): 8005-8020 (2019) - [c17]Borislava Gajic, Rubén Trapero, Diomidis S. Michalopoulos:
Telco Cloud Resilience: Synergies Between Fault and Security Management. EuCNC 2019: 267-272 - [c16]Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, Rodrigo Diaz Rodriguez:
Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. ISCRAM 2019 - [c15]Dimitrios Schinianakis, Rubén Trapero, Diomidis S. Michalopoulos, Beatriz Gallego-Nicasio Crespo:
Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach. WCNC 2019: 1-8 - 2018
- [c14]Heng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. ARES 2018: 5:1-5:10 - [c13]Tsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri:
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level. IOSec@RAID 2018: 27-38 - [c12]Salman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri:
Threat Modeling the Cloud: An Ontology Based Approach. IOSec@RAID 2018: 61-72 - [c11]Heng Zhang, Jesus Luna, Rubén Trapero, Neeraj Suri:
Whetstone: Reliable Monitoring of Cloud Services. SMARTCOMP 2018: 115-122 - 2017
- [j8]Rubén Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri:
A novel approach to manage cloud security SLA incidents. Future Gener. Comput. Syst. 72: 193-205 (2017) - [j7]Jesus Luna, Ahmed Taha, Rubén Trapero, Neeraj Suri:
Quantitative Reasoning about Cloud Security Using Service Level Agreements. IEEE Trans. Cloud Comput. 5(3): 457-471 (2017) - [c10]Heng Zhang, Rubén Trapero, Jesus Luna, Neeraj Suri:
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. SCC 2017: 27-34 - [c9]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
A Framework for Ranking Cloud Security Services. SCC 2017: 322-329 - 2016
- [j6]Jolanda Modic, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri:
Novel efficient techniques for real-time cloud security assessment. Comput. Secur. 62: 1-18 (2016) - [j5]Rubén Trapero, Jesus Luna, Neeraj Suri:
Quantifiably Trusting the Cloud: Putting Metrics to Work. IEEE Secur. Priv. 14(3): 73-77 (2016) - [c8]Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri:
Identifying and Utilizing Dependencies Across Cloud Security Services. AsiaCCS 2016: 329-340 - [c7]Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. Trustcom/BigDataSE/ISPA 2016: 465-472 - 2015
- [j4]Patricia Arias Cabarcos, Florina Almenárez, Rubén Trapero, Daniel Díaz Sánchez, Andrés Marín López:
Blended Identity: Pervasive IdM for Continuous Authentication. IEEE Secur. Priv. 13(3): 32-39 (2015) - [c6]Philippe Massonet, Jesus Luna, Alain Pannetrat, Rubén Trapero:
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. ESSoS 2015: 102-110 - 2014
- [c5]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. TrustCom 2014: 284-291 - 2011
- [j3]Juan C. Yelmo, José M. del Álamo, Rubén Trapero, Yod Samuel Martín:
A user-centric approach to service creation and delivery over next generation networks. Comput. Commun. 34(2): 209-222 (2011) - [j2]José M. del Álamo, Antonio M. Fernández, Rubén Trapero, Juan C. Yelmo, Miguel-Ángel Monjas:
A Privacy-Considerate Framework for Identity Management in Mobile Services. Mob. Networks Appl. 16(4): 446-459 (2011) - 2010
- [c4]José M. del Álamo, Miguel-Ángel Monjas, Juan C. Yelmo, Beatriz San Miguel González, Rubén Trapero, Antonio M. Fernández:
Self-service Privacy: User-Centric Privacy for Network-Centric Identity. IFIPTM 2010: 17-31
2000 – 2009
- 2009
- [j1]Juan C. Yelmo, Rubén Trapero, José M. del Álamo:
Identity management and web services as service ecosystem drivers in converged networks. IEEE Commun. Mag. 47(3): 174-180 (2009) - [c3]Jian Yu, Paolo Falcarin, Sancho Rego, Isabel Ordás, Eduardo Martins, Quan Sun, Rubén Trapero, Quan Z. Sheng:
XDM-Compatible Service Repository for User-Centric Service Creation and Discovery. ICWS 2009: 992-999 - 2007
- [c2]Juan C. Yelmo, Rubén Trapero, José M. del Álamo, Jürgen Sienel, Marc Drewniok, Isabel Ordás, Kathleen McCallum:
User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services. ICSOC 2007: 342-352 - [c1]Juan C. Yelmo, José M. del Álamo, Rubén Trapero:
Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services. FIDIS 2007: 447-461
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint