Félix J. García Clemente

Félix J. García Clemente
University of Murcia | UM · Department of Computer Engineering and Technology

PhD

About

125
Publications
41,386
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,034
Citations
Introduction
@felixgarcia - Felix’s major research interests focus on Cybersecurity, Network Management and Interaction Systems. He is co-author of over 100 scientific publications and an active member on different national and international research projects. He was a visiting scholar at EPFL (Switzerland), NTU-NIE (Singapore) and Stanford University (USA). Currently, he is a coauthor of EjsS, a member of UNEDLabs and a collaborator in the Open Source Physics project and Open Source Physics @ Singapore.
Additional affiliations
February 2002 - present
University of Murcia
Position
  • Professor (Associate)

Publications

Publications (125)
Article
Full-text available
The race for automation has reached farms and agricultural fields. Many of these facilities use the Internet of Things technologies to automate processes and increase productivity. Besides, Machine Learning and Deep Learning allow performing continuous decision making based on data analysis. In this work, we fill a gap in the literature and present...
Preprint
Smartphones are widely available and used extensively by students worldwide. These phones often come equipped with high-quality cameras that can be combined with basic optical elements to build a cost-effective DIY spectrometer. Here, we discuss a series of demonstrations and pedagogical exercises, accompanied by our DIY diffractive spectrometer th...
Article
Smartphones are widely available and used extensively by students worldwide. These phones often come equipped with high-quality cameras that can be combined with basic optical elements to build a cost-effective DIY spectrometer. Here, we discuss a series of demonstrations and pedagogical exercises, accompanied by our DIY diffractive spectrometer th...
Conference Paper
En la actualidad los recursos accesibles a través de la web juegan un papel importante en la educación y el aprendizaje, gracias en parte a los avances tecnológicos de los ´últimos a Esta importancia es incluso mayor en ´áreas científicas y de ingeniería, principalmente en aquellas universidades a distancia, donde los laboratorios presenciales clás...
Preprint
Full-text available
The recent pandemic has changed the way we see education. It is not surprising that children and college students are not the only ones using online education. Millions of adults have signed up for online classes and courses during last years, and MOOC providers, such as Coursera or edX, are reporting millions of new users signing up in their platf...
Chapter
Full-text available
In the last decades, factories have suffered a significant change in automation, evolving from isolated towards interconnected systems. However, the adoption of open standards and the opening to the internet have caused an increment in the number of attacks. In addition, traditional intrusion detection systems relying on a signature database, where...
Article
Full-text available
Nowadays, the use of technology in continuously increasing, making a significant impact in almost every area, including education. New areas have gained much popularity in the last years in educational technology (EdTech), such as Massive Open Online Courses (MOOCs) or computer-supported collaborative learning. In addition, research and interest in...
Conference Paper
Full-text available
Over the last decade, we have seen a large amount of research being performed in technology-enhanced learning. The European Conference on Technology-enhanced Learning (EC-TEL) is one of the conferences with the most extended trajectory in this area. The goal of this paper is to provide an overview of the last ten years of the conference. We collect...
Article
Full-text available
Industrial control systems (ICS) are considered cyber‐physical systems that join both cyber and physical worlds. Due to their tight interaction, where humans and robots co‐work and co‐inhabit in the same workspaces and production lines, cyber‐attacks targeting ICS can alter production processes and even bypass safety procedures. As an example, thes...
Article
Since the first reported case in Wuhan in late 2019, COVID-19 has rapidly spread worldwide, dramatically impacting the lives of millions of citizens. To deal with the severe crisis resulting from the pandemic, worldwide institutions have been forced to make decisions that 1 affect the socio-economic realm. In this sense, researchers from diverse kn...
Conference Paper
Full-text available
The increasing adoption of the Industry 4.0 paradigm encompasses digitally interconnected factories which enables many advantages. However, it is still necessary to dedicate effort towards investigating protection mechanisms against cyberattacks in these scenarios. Despite the power demonstrated by Anomaly Detection-based Intrusion Detection System...
Conference Paper
Full-text available
We propose using “iLabs,” which relies on the digitalization of an experiment and a virtual display with photographs, as a solution to overcome the lack of scalability of realistic online experimentation and facilitate educational conversations.
Article
Full-text available
Industrial Control Systems (ICSs) are widely used in critical infrastructures to support the essential services of society. Therefore, their protection against terrorist activities, natural disasters, and cyber threats is critical. Diverse cyber attack detection systems have been proposed over the years, in which each proposal has applied different...
Article
Full-text available
The evolution of mobile multimedia computing and artificial intelligence represents a significant challenge in terms of real-time data processing and data protection management. It can be seen in the EU and US, where governments are adapting their regulation laws to meet current and future societal requirements. However, existing solutions provide...
Conference Paper
Full-text available
Emergency settings are actually being strengthened by using Information and Communication Technologies (ICT) for the dynamic deployment of a Public Safety Network (PSN). A PSN is built on top of existing public service networks to help first responder teams in performing critical tasks. However, current solutions expose limitations when starting-up...
Article
Full-text available
The smart classrooms of the future will use different software, devices and wearables as an integral part of the learning process. These educational applications generate a large amount of data from different sources. The area of Multimodal Learning Analytics (MMLA) explores the affordances of processing these heterogeneous data to understand and i...
Article
This paper presents a general way to enable the automatic generation of digitized labs from remote laboratories and their easy deployment and publication. To demonstrate its effectiveness, we use two existing tools to generate and publish two digitized labs online from two implementations of a Snell's law remote laboratory, although they could be a...
Article
Full-text available
In recent decades, Industrial Control Systems (ICS) have been affected by heterogeneous cyberattacks that have a huge impact on the physical world and the people’s safety. Nowadays, the techniques achieving the best performance in the detection of cyber anomalies are based on Machine Learning and, more recently, Deep Learning. Due to the incipient...
Article
Full-text available
5G mobile networks are pushing new dynamic and flexible scenarios that demand the automation and optimization of network management processes. In this sense, Self-Organizing Networks (SON) arose to evolve from traditional manual management towards fully autonomic and dynamic processes. Due to the large volumes of data generated in 5G networks, func...
Conference Paper
Full-text available
The evolution of information and communications technology, and particularly the Internet of Things as the basis for the setting up of the Smart Cities, are provoking a worldwide revolution in terms of data protection management. A clear example of this shift can be seen in the European Union which is adapting the regulation to meet current society...
Preprint
Full-text available
In this paper we introduce the new and planned features of Easy Java/JavaScript Simulations (EJS) to support Learning Analytics (LA) and Educational Data Mining (EDM) research and practice in the use of simulations for the teaching and self-learning of natural sciences and engineering. Simulations created with EJS can now be easily embedded in a po...
Preprint
Full-text available
Our smartphone is a powerful internet connected computer packed with internal sensors that measure sound, light, acceleration and magnetic field strength. Physics teachers can use them as measurement devices to do science and promote joy of learning. Several other research has shown the benefits of using smartphone for teaching and learning physics...
Preprint
Full-text available
Easy JavaScript Simulations (EjsS) is a popular and powerful authoring toolkit for the creation of open source HTML5 compliant JavaScript simulations. This paper focuses on developing a Learning Analytics extension in Moodle for EjsS, capable of monitoring interactions with the simulation (e.g. mouse clicks, states of buttons and sliders, variable...
Article
Full-text available
A smart campus provides students who are geographically scattered with online tools to get access to learning resources and laboratories. Although these remote laboratories have the potential and capabilities to implement different learning experiments, most of them are configured in a static fashion, being able to serve only one experiment for a g...
Article
Full-text available
ICT solutions must meet the requirements demanded by challenging and complex scenarios such as remote care, which can be viewed as a combination of heterogeneous services using multimedia and home-care tools. Network Slicing emerged to this end, a paradigm tailoring the needs of any scenario whose specifications need to be met at all times. For its...
Article
Full-text available
Fog and mobile edge computing (MEC) will play a key role in the upcoming fifth generation (5G) mobile networks to support decentralized applications, data analytics and management into the network itself by using a highly distributed compute model. Furthermore, increasing attention is paid to providing user-centric cybersecurity solutions, which pa...
Article
Full-text available
Continuous authentication was introduced to propose novel mechanisms to validate users’ identity and address the problems and limitations exposed by traditional techniques. However, this methodology poses several challenges that remain unsolved. In this paper, we present a novel framework, PALOT, that leverages IoT to provide context-aware, continu...
Article
Full-text available
Traditional networks are characterized by wasting considerable amount of energy that could be reduced drastically. The challenge of energy saving should be managed efficiently, where the mobility of users and services are nominated to play a significant role as well as the use of the Software Defined Networking (SDN) paradigm. Besides the network m...
Article
Full-text available
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and optimizing healthcare by delivering new ways to monitor, diagnose and treat patients through integrated clinical environments (ICE). Despite the benefits provided by MCPS, many of the ICE medical devices have not been designed to satisfy cybersecurity requirements a...
Article
Full-text available
Cyber attacks are becoming a very common trend in existing networks, expecting to be even more acute in future 5G networks due to greater number of connected devices, higher mobile data volume, low latency, etc. Security mechanisms to tackle cyber threats should be updated when users, possibly carrying devices with some kind of malware, move in hig...
Chapter
Full-text available
The evolution of technology has increased the amount of heterogeneous and sensitive information handled by Information Management Systems (IMS). Context-aware systems belong to the category of IMS and they discover the information of the context or environment in which users are located, and adapt their behavior considering that information without...
Conference Paper
In this paper we present the results obtained from a large experimental environment that makes use of Bluetooth Low Energy (BLE) as the core technology for a location estimation system. BLE is a common technology for this kind of geopositioning systems, but most of the existing proposals are based on the RSS (Received Signal Strength) value obtaine...
Conference Paper
Full-text available
The disruptive vision of Medical Cyber-Physical Systems (MCPS) enables the promising next-generation of eHealth systems that are intended to interoperate efficiently, safely, and securely. Safety-critical interconnected systems that analyze patients' vital signs gathered from medical devices, infer the state of the patient's health, and start treat...
Conference Paper
Full-text available
Modern authentication systems still suffer of some limitations that threaten users’ data protection. To strengthen the overall security of authentication processes, the continuous authentication paradigm has been increasingly employed. Nonetheless, this fresh methodology still poses a number of challenges that remain unsolved. In this paper, we pre...
Conference Paper
Full-text available
Easy Java/JavaScript Simulations, EjsS, is a modelling and authoring tool that allows teachers to create, adapt and share instructional simulations in Java or JavaScript. EjsS transforms a high-level specification of a physics simulation into code that uses the latest technological advances. This presentation focuses on the EjsS functionality to ge...
Conference Paper
Full-text available
Medical Cyber-Physical Systems (MCPS) is a new disruptive approach oriented to enable smart healthcare systems to monitor, process, and make autonomous decisions without needing to involve doctors and caregivers. Yet, current MCPS pose several open challenges, being security of medical devices one of the most critical for its close relationship wit...
Article
Full-text available
The upcoming fifth generation (5G) mobile technology, which includes advanced communication features, is posing new challenges on cybersecurity defense systems. Although innovative approaches have evolved in the last few years, 5G will make existing intrusion detection and defense procedures become obsolete in case they are not adapted accordingly....
Article
Full-text available
Over the last years, solutions based on Information and Communications Technologies (ICT) have opted for the deployment of eHealth services to provide a higher level of quality and safety to medical processes, with which to mitigate human errors. As a result, Medical Cyber-Physical Systems (MCPS) is a new disruptive approach oriented to enable smar...
Chapter
Full-text available
The ability to integrate multiple learning applications from different organizations allows sharing resources and reducing costs in the deployment of learning systems. In this sense, Learning Tools Interoperability (LTI) is the main current leading technology for integrating learning applications with platforms like Learning Management Systems (LMS...
Conference Paper
Full-text available
5G mobile networks are pushing new dynamic and flexible scenarios that require the automation of the management processes performed by network administrators. To this end, Self-Organizing Networks (SON) arose with the goal of moving from traditional manual management processes towards an automatic and dynamic perspective. The orchestration of the m...
Article
Full-text available
The widespread use of mobile devices such as laptops, smartphones or tablets enables new opportunities and services in the field of pervasive computing and sensing. In particular, monitoring the activity of those devices in indoor working environments enables new methods to address some issues related to energy consumption or employees’ wellness. H...
Article
Occupancy is relevant information about key aspects, such as energy consumption or comfort management. Energy-saving and environmental quality strategies can be carried out in response to real-time facility occupancy. Some relevant solutions to measure and monitor occupancy information leverage radio-based indoor localization systems and employ Rec...
Article
Full-text available
Botnets are one of the most powerful cyberthreats affecting continuity and delivery of existing network services. Detecting and mitigating attacks promoted by botnets become a greater challenge with the advent of 5G networks, as the number of connected devices with high mobility capabilities, the volume of exchange data, and the transmission rates...
Conference Paper
Full-text available
Cybersecurity defense systems have evolved, in fact, new intrusion detection systems (IDS) allows to identify cyber-threats that may have only recently gone unnoticed. However, new protection challenges are raised by the new upcoming fifth generation (5G) mobile technology. The new advanced features of 5G will make that existing detection procedure...
Article
Full-text available
The Big Data age is characterized by the explosive increase of data managed by electronic systems. Healthcare Information Management systems are aware of this situation having to adapt services and procedures. This, along with the fact that the proliferation of mobile devices and communications has also promoted the use of context-aware services ub...
Conference Paper
Full-text available
Se vaticina que las nuevas redes móviles 5G van a dar soporte a grandes y nuevas características donde se va a ver significativamente incrementado tanto el ancho de banda, y por ende la transmisión de gran cantidad de información, como un alto número de dispositivos conectados. En este contexto se hacen necesarias soluciones innovadoras frente a la...
Conference Paper
Full-text available
Managing network resources in charge of monitoring network flows generated by potential attackers is a complex process that should be carried out in an automatic way. Self-Organizing Networks should be able to guarantee the provision of flow-based monitoring services to later detect cyber-attacks and react against them automatically. In this sense,...