Recent Submissions

  • Awareness information dissemination using aggregation into collective perception messages for connected vehicles 

    Marias i Parella, Jordi; Casademont Serra, Jordi; Vazquez-Gallego, Francisco; López Aguilera, M. Elena (Institute of Electrical and Electronics Engineers (IEEE), 2023)
    Conference report
    Restricted access - publisher's policy
    In the last few years, two critical situations have arisen in the ecosystem of Intelligent Transportation Systems (ITS) related to the Vehicle-to-Everything (V2X) radio technologies, that are delaying their commercial ...
  • A testbed for a nearby-context aware: threat detection and mitigation system for connected vehicles 

    Martín Pérez, Miguel; Marias i Parella, Jordi; Fernández Hidalgo, Javier; de Juan Fidalgo, Pablo; Casademont Serra, Jordi; Álvarez Romero, Antonio; Díaz Rodríguez, Rodrigo (Universidade de Vigo, 2023)
    Conference report
    Restricted access - publisher's policy
    The fact than more and more Cyber-Physical or IoT systems are integrated in vehicle fleets, coupled with the growing connectivity of these devices, poses a higher risk of cyber attacks, due to the increased attack surface. ...
  • Demo: interoperability between cellular and V2X networks (802.11p / LTE-PC5) under a Cloud Native Edge Scenario 

    Marias i Parella, Jordi; Pino, Adrián; Cordero, Bruno; Casademont Serra, Jordi; Carmona Cejudo, Estela; Vazquez-Gallego, Francisco (Institute of Electrical and Electronics Engineers (IEEE), 2023)
    Conference report
    Restricted access - publisher's policy
    By leveraging the use of wireless communication technologies and edge computing capabilities, Cooperative Intelligent Transport Systems (C-ITS) aim to improve safety and traffic management in mobility use cases. However, ...
  • Impact of the burst size on the FTM procedure in android phones 

    Corrêa Oliveira, Diogo; Zola, Enrica Valeria; Martín Escalona, Israel (Association for Computing Machinery (ACM), 2023)
    Conference lecture
    Restricted access - publisher's policy
    Since its integration in common-off-the-shelf (COTS) devices, the IEEE 802.11mc standard for the ranging estimation between a Wi-Fi card and an Access Point (AP) has grown interest in the research community. In 2021, Android ...
  • Multiuser virtual experiences powered by holoportation technologies and multimodal Human-Computer Interaction (HCI) 

    Hjeij, Mohamad Kassem; Montagud Climent, Mario; Rincón Rivera, David (Association for Computing Machinery (ACM), 2024)
    Conference report
    Open Access
    This paper elaborates on a set of research objectives to optimize multi-user Social Virtual Reality (VR) experiences. A first objective consists of designing and developing a novel and lightweight Volumetric Video (VV) ...
  • A QoS harmonization strategy for Wi-Fi and cellular networks convergence 

    Jain, Akshay; Garcia, Daniel; Darroudi, Seyed Mahdi; López Aguilera, M. Elena (Institute of Electrical and Electronics Engineers (IEEE), 2023)
    Conference report
    Open Access
    Beyond 5G networks will not only present an evolution of the current 5G standards, but they will also provision a path for increased convergence with other Radio Access Technologies (RATs). The Wi-Fi Alliance and 3GPP ...
  • Generación sintética de trayectorias mediante aprendizaje profundo con garantías de privacidad diferencial 

    Rubio Jornet, Víctor; Parra Arnau, Javier; Forné Muñoz, Jorge (Jornadas de Ingeniería Telemática (JITEL), 2023)
    Conference lecture
    Open Access
    La generación sintética de trayectorias es cru- cial para poder realizar estudios y análisis en diferentes campos, como la movilidad urbana, los protocolos de redes móviles, la epidemiología computacional o la simulación ...
  • Addressing scalability for real-time multiuser holo-portation: introducing and assessing a Multipoint Control Unit (MCU) for volumetric video 

    Fernández Langa, Sergi; Montagud Climent, Mario; Rincón Rivera, David; Moragues, Jaume; Cernigliaro, Gianluca (Association for Computing Machinery (ACM), 2023)
    Conference report
    Open Access
    Scalability, interoperability, and cost efficiency are key remaining challenges to successfully providing real-time holo-portation (and Metaverse-like) services. This paper, for the first time, presents the design and ...
  • Assessing the impact of coupling RTT and RSSI measurements in fingerprinting Wi-Fi indoor positioning 

    González Díaz, Néstor; Zola, Enrica Valeria; Martín Escalona, Israel (Association for Computing Machinery (ACM), 2023)
    Conference lecture
    Open Access
    The field of Indoor Positioning Systems (IPS) is rapidly expanding due to the increasing need for accurate indoor localization. This research delves into the fingerprinting technique, a commonly used method in IPS, and ...
  • Study and development of an autopsy module for automated analysis of image metadata 

    Doménech Fons, Jordi; Pegueroles Vallés, Josep R. (2024)
    Conference report
    Restricted access - publisher's policy
    The importance of cybersecurity is raising every day with the development of new technologies. Accordingly, cybercrimes are increasing notably and more than ever qualified people is needed to protect the rest of people ...
  • XSS vulnerability test enhancement for Progressive Web Applications 

    Pegueroles Vallés, Josep R.; Kanj Bongard, Sebastien; Estebanell Castellví, Arnau (Springer, 2023)
    Conference report
    Restricted access - publisher's policy
    Progressive Web Applications produce false negative results when scanned with security vulnerability scanners. In this paper the author will investigate the causes behind vulnerability scanners missing simple vulnerabilities ...
  • Análisis forense de la herramienta de tunelado de puertos Ngrok 

    Kanj Bongard, Sebastien; Navarro, Carlos; Pasamar, Abraham; Rosés, Oriol; Pegueroles Vallés, Josep R. (Jornadas de Ingeniería Telemática (JITEL), 2023)
    Conference report
    Open Access
    Las herramientas de tunelado, como Ngrok, permiten publicar a Internet puertos de interés camuflados en protocolos frecuentes y habitualmente permitidos en infraestructuras corporativas. Usando servidores proxy se evita ...

View more