On the features and challenges of security and privacy in distributed internet of things R Roman, J Zhou, J Lopez Computer networks 57 (10), 2266-2279, 2013 | 1785 | 2013 |
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges R Roman, J Lopez, M Mambo Future Generation Computer Systems 78, 680-698, 2018 | 1525 | 2018 |
Securing the internet of things R Roman, P Najera, J Lopez Computer 44 (9), 51-58, 2011 | 1100 | 2011 |
Trust management systems for wireless sensor networks: Best practices J Lopez, R Roman, I Agudo, C Fernandez-Gago Computer Communications 33 (9), 1086-1093, 2010 | 442 | 2010 |
Key management systems for sensor networks in the context of the Internet of Things R Roman, C Alcaraz, J Lopez, N Sklavos Computers & Electrical Engineering 37 (2), 147-159, 2011 | 435 | 2011 |
Applying intrusion detection systems to wireless sensor networks. R Roman, J Zhou, J Lopez CCNC 2006, 640-644, 2006 | 366 | 2006 |
On the vital areas of intrusion detection systems in wireless sensor networks A Abduvaliyev, ASK Pathan, J Zhou, R Roman, WC Wong IEEE Communications Surveys & Tutorials 15 (3), 1223-1237, 2013 | 285 | 2013 |
Wireless sensor networks and the internet of things: Do we need a complete integration? C Alcaraz, P Najera, J Lopez, R Roman 1st International Workshop on the Security of the Internet of Things (SecIoT …, 2010 | 244 | 2010 |
Integrating wireless sensor networks and the internet: a security analysis R Roman, J Lopez Internet Research 19 (2), 246-259, 2009 | 179 | 2009 |
Analysis of security threats, requirements, technologies and standards in wireless sensor networks J Lopez, R Roman, C Alcaraz International School on Foundations of Security Analysis and Design, 289-338, 2007 | 160 | 2007 |
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes R Roman, C Alcaraz, J Lopez Mobile Networks and Applications 12, 231-244, 2007 | 156 | 2007 |
Current cyber-defense trends in industrial control systems JE Rubio, C Alcaraz, R Roman, J Lopez Computers & Security 87, 101561, 2019 | 143 | 2019 |
Real-time location and inpatient care systems based on passive RFID P Najera, J Lopez, R Roman Journal of Network and Computer Applications 34 (3), 980-989, 2011 | 141 | 2011 |
Evolution and Trends in IoT Security R Roman, J Lopez, S Gritzalis Computer 51 (7), 16-25, 2018 | 97* | 2018 |
A survey on the applicability of trust management systems for wireless sensor networks MC Fernández-Gago, R Román, J Lopez Third international workshop on security, privacy and trust in pervasive and …, 2007 | 93 | 2007 |
Digital witness: Safeguarding digital evidence by using secure architectures in personal devices A Nieto, R Roman, J Lopez IEEE network 30 (6), 34-41, 2016 | 89 | 2016 |
Security of industrial sensor network-based remote substations in the context of the internet of things C Alcaraz, R Roman, P Najera, J Lopez Ad Hoc Networks 11 (3), 1091-1104, 2013 | 78 | 2013 |
Selecting key management schemes for WSN applications C Alcaraz, J Lopez, R Roman, HH Chen Computers & Security 31 (8), 956-966, 2012 | 66 | 2012 |
On the security of wireless sensor networks R Roman, J Zhou, J Lopez International Conference on Computational Science and Its Applications, 681-690, 2005 | 66 | 2005 |
The role of wireless sensor networks in the area of critical information infrastructure protection R Roman, C Alcaraz, J Lopez information security technical report 12 (1), 24-31, 2007 | 64 | 2007 |