Jetzabel Serna-Olvera

Learn More
Research in vehicular ad hoc networks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the research community. In this paper we overview the main privacy concepts and explain why this concept is fundamental for wide adoption of VANETs. A set of privacy requirements for VANETs(More)
In current e-banking systems, millions of consumers are now able to conduct financial transactions using a wide range of mobile devices; this growth exposes the system not only to the set of known threats that are now migrating from traditional PC-based e-banking to the mobile-based scenario, but, to emerging threats specifically targeting mobile devices.(More)
Every day, hundreds or even thousands of computers are infected with financial malware (i.e. Zeus) that forces them to become zombies or drones, capable of joining massive financial botnets that can be hired by well-organized cyber-criminals in order to steal online banking customers' credentials. Despite the fact that detection and mitigation mechanisms(More)
The ever increasing diversity and mobility of devices have originated a marked rise in ubiquitous resources; a great number of collaborative applications could be exploited just by employing an efficient ubiquitous resource management mechanism. The CARM (Composable-Adaptive Resource Management) middleware-based architecture provides a flexible(More)
This paper discusses the challenges in detecting privacy revealing information using ontologies, natural language processing and machine learning techniques. It reviews current definitions, and sketches problem levels towards identifying the main open challenges. Furthermore, it elicits that the current notion of personally identifiable information lacks(More)
With the prevalence of privacy incidents and recurrent leaks, privacy protection has become a concern of users and data protection entities. Previous research in privacy risk prevention has mostly followed the "collect and prevent" philosophy, e.g., by applying anonymization techniques to the user data on the back-end. These approaches neglect the users'(More)