Javier Lopez
Javier Lopez
Professor of Computer Science, University of Malaga
Verified email at
Cited by
Cited by
On the features and challenges of security and privacy in distributed internet of things
R Roman, J Zhou, J Lopez
Computer Networks 57 (10), 2266-2279, 2013
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
R Roman, J Lopez, M Mambo
Future Generation Computer Systems 78, 680-698, 2018
Securing the internet of things
R Roman, P Najera, J Lopez
Computer 44 (9), 51-58, 2011
Trust management systems for wireless sensor networks: Best practices
J Lopez, R Roman, I Agudo, C Fernandez-Gago
Computer Communications 33 (9), 1086-1093, 2010
Key management systems for sensor networks in the context of the Internet of Things
R Roman, C Alcaraz, J Lopez, N Sklavos
Computers & Electrical Engineering 37 (2), 147-159, 2011
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
I Stellios, P Kotzanikolaou, M Psarakis, C Alcaraz, J Lopez
IEEE Communications Surveys & Tutorials 20 (4), 3453-3495, 2018
Applying intrusion detection systems to wireless sensor networks
R Roman, J Zhou, J Lopez
IEEE Consumer Communications & Networking Conference (CCNC 2006), 2006
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
C Alcaraz, P Najera, J Lopez, R Roman
1st International Workshop on the Security of the Internet of Things (SecIoT'10), 2010
Evolving privacy: From sensors to the Internet of Things
J Lopez, R Rios, F Bao, G Wang
Future Generation Computer Systems 75, 46-57, 2017
Integrating wireless sensor networks and the internet: a security analysis
R Roman, J Lopez
Internet Research 19 (2), 246-259, 2009
A security analysis for wireless sensor mesh networks in highly critical systems
C Alcaraz, J Lopez
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
J Lopez, R Roman, C Alcaraz
Foundations of Security Analysis and Design V, 289-338, 2009
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
R Roman, C Alcaraz, J Lopez
Mobile Networks and Applications 12 (4), 231-244, 2007
Digital Twin: A Comprehensive Survey of Security Threats
C Alcaraz, J Lopez
IEEE Communications Surveys & Tutorials, 2022
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
Overview of wireless sensor network security
J Lopez, J Zhou
Wireless sensor network security. IOS Press, incorporated, 1-21, 2008
Real-time location and inpatient care systems based on passive RFID
P Najera, J Lopez, R Roman
Journal of Network and Computer Applications 34 (3), 980-989, 2011
OCPP Protocol: Security Threats and Challenges
C Alcaraz, J Lopez, S Wolthusen
IEEE Transactions on Smart Grid, 2017
Wireless Sensor Network Security
J López, J Zhou
Ios PressInc, 2008
Modelling trust dynamics in the Internet of Things
C Fernandez-Gago, F Moyano, J Lopez
Information Sciences 396, 72-82, 2017
The system can't perform the operation now. Try again later.
Articles 1–20