1. S. de Diego, C. Regueiro y G. Maciá-Fernández, "Enabling Identity for the IoT-as-a-Service Business Model", IEEE Access, vol. 9, pp. 159965-159975, 2021. DOI: 10.1109/ACCESS.2021.3131012.

  2. M. Robles-Carrillo, "European Union policy on 5G: Context, scope and limits". Telecommunications Policy, vol. 45, nº 8, 2021, 102216. DOI: 10.1016/j.telpol.2021.102216.

  3. R. Magán-Carrión, D. Urda, I. Díaz-Cano y B. Dorronsoro, "Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration", IEEE Transactions on Emerging Topics in Computing, vol. 10, nº 4, 2022, pp. 1717-1732, DOI: 10.1109/TETC.2022.3178283.

  4. E. Figueras-Martín, R. Magán-Carrión, and J. Boubeta-Puig, "Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study". Journal of Information Security and Applications, vol. 68, p. 103229, Aug. 2022. DOI: 10.1016/j.jisa.2022.103229.

  5. M. Robles-Carrillo y P. García Teodoro. "Ransomware: An Interdisciplinary Technical and Legal Approach". Security and Communications Networks. Volume 2022 | Article ID 2806605, DOI: 10.1155/2022/2806605.

  6. R. Magán-Carrión, D. Urda, I. Diaz-Cano, and B. Dorronsoro, “Evaluating the Impact of Different Feature as a Counter Data Aggregation Approaches on the Performance of NIDSs and Their Selected Features,” Logic Journal of the IGPL, Volume 32, Issue 2, April 2024, Pages 263–280, https://doi.org/10.1093/jigpal/jzae007.

  7. P. García-Teodoro, J. Camacho, G. Maciá-Fernández, J.A. Gómez-Hernández y V.J. López-Marín, "A Novel Zero-Trust Network Access Control Scheme based on the Security Profile of Devices and Users", Computer Networks, 2022. DOI: 10.1016/j.comnet.2022.109068.

  8. R. García-Peñas, R.A. Rodríguez-Gómez y G. Maciá-Fernández, "HoDiNT: Distributed architecture for collection and analysis of Internet Background Radiation", Computer Networks, 250 (2024) 110570.  https://digibug.ugr.es/bitstream/handle/10481/92757/HoDiNT_Arch_IBR.pdf?sequence=1&isAllowed=y.

  9. M. Robles Carrillo. "Digital identity: an approach to its nature, concept, and functionalities". International Journal of Law and Information Technology, Volume 32, Issue 1, 2024, DOI: 10.1093/ijlit/eaae019.

  10. Medina-Arco, J.G.; Magán-Carrión, R.; Rodríguez-Gómez, R.A.; García-Teodoro, P. "Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems". Sensors 2024, 24, 479.  https://www.mdpi.com/1424-8220/24/2/479.

  11. Diego, S. de,  Regueiro, C. y Maciá-Fernández, G., “Collaborative credentials for the Internet of Things”, Computer Networks,  251, 110629 (2024).  DOI: 10.1016/j.comnet.2024.110629.