José Javier Martínez

José Javier Martínez
University of Alcalá | UAH · Department of Computer Sciences

About

79
Publications
29,566
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,049
Citations

Publications

Publications (79)
Article
Full-text available
Context: There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of attack detected, in a clear and simple way. Objectives: This paper presents a new multi-label dataset for classifying web attacks based o...
Article
Full-text available
Port knocking is an access-control technique that consists of revealing a network protected resource only to those users that can prove they know a preshared port sequence. This proving process is done by connecting to the defined ports in the correct order; so, the list gets exposed to the adversaries with access to the connection’s channel. We pr...
Article
Full-text available
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different en...
Article
Full-text available
Potentially Harmful Apps (PHAs), like any other type of malware, are a problem in the modern Android ecosystem. Even though Google tries to maintain a clean app ecosystem, Google Play Store is still one of the main vectors for spreading PHAs. In this paper, we propose a solution based on machine learning algorithms to detect PHAs inside application...
Article
Full-text available
Continuous authentication (CA) is the process to verify the user’s identity regularly without their active participation. CA is becoming increasingly important in the mobile environment in which traditional one-time authentication methods are susceptible to attacks, and devices can be subject to loss or theft. The existing literature reports CA app...
Article
Tor and i2p networks are two of the most popular darknets. Both darknets have become an area of illegal activities highlighting the necessity to study and analyze them to identify and report illegal content to Law Enforcement Agencies (LEAs). This paper analyzes the connections between the Tor network and the i2p network. We created the first datas...
Preprint
Tor and i2p networks are two of the most popular darknets. Both darknets have become an area of illegal activities highlighting the necessity to study and analyze them to identify and report illegal content to Law Enforcement Agencies (LEAs). This paper analyzes the connections between the Tor network and the i2p network. We created the first datas...
Chapter
Mobile authentication is a hot topic because organizations can adopt BYOD (bring your own device) policies that allow to use personal devices, rather than require the use of officially provided devices. However, this brings additional access control issues like intentional or unintentional unauthorized uses of devices (e.g., stealing a mobile phone...
Article
Full-text available
This paper analyzes the effects of gamification in the social network of a massive online course. An educational social-networking platform gathered information about the contributions of participants and about the social networks that were formed during the course. A gamification layer with three game elements (points, badges, and leaderboard) was...
Article
Full-text available
The development of Airborne and Ground systems is framed by specific regulations, usually expressed as standards. A disadvantage of those standards is the inherent complexity for its application and the verification of compliance given the high number of requirements to be checked in many different situations of the application and which are highly...
Article
Full-text available
A quality management system (QMS) allows an organization to analyze the needs of its customers and to define the appropriate processes for efficient production and service delivery. Customer satisfaction is an important part of this system, with a significant impact on its corporate sustainability. The purpose of this research is a proposal for ass...
Article
Full-text available
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established pattern as indications of malicious activity. In this work, a systematic review of the use of anomaly detection techniques in the p...
Article
Full-text available
With the rise of mobile devices and the high number of instant messaging applications available in the stores, it is necessary to evaluate the usability of such applications to provide a more satisfying user experience. To this end, this paper presents a methodical usability evaluation of instant messaging applications both in iOS and Android platf...
Article
Full-text available
In recent years, smartphones have become the main computing tool for most of the population, making them an ideal tool in many areas. Most of these smartphones are equipped with cutting-edge hardware on their digital cameras, sensors and processors. For this reason, this paper discusses the possibility of using smartphones as an accessible and accu...
Conference Paper
Full-text available
The growing energy consumption is not sustainable in the long run. Taking into account that street lightning is one of the highest energy consumers in cities, this paper aims to develop a methodology to estimate the energy consumption of these installations with as few input variables as possible. In addition, the paper presents a mobile applicatio...
Article
Social networks and gamification are having an important and growing role in education. Social networks provide unknown communication and connection possibilities while games have the potential to engage students. This paper analyzes the structure of the social network resulting from a gamified social undergraduate course as well as the influence t...
Article
Full-text available
Clinical Decision Support Systems have the potential to reduce lack of communication and errors in diagnostic steps in primary health care. Literature reports have showed great advances in clinical decision support systems in the recent years, which have proven its usefulness in improving the quality of care. However, most of these systems are focu...
Article
Full-text available
Mobile devices have small screens that require the user to constantly resize the web content in order to read the text. This study sets out to (a) check whether current mobile devices are able to zoom or increase the font size of text on websites and (b) check the most efficient, effective, and satisfying usability method for the user to do so. A p...
Data
Full-text available
The process of creating e-learning contents using reusable learning objects (LOs) can be broken down in two sub-processes: LOs finding and LO sequencing. Sequencing is usually performed by instructors, who create courses targeting generic profiles rather than personalized materials. This paper proposes an evolutionary approach to automate this latt...
Article
Full-text available
Gamification is the use of game design elements and game mechanics in non-game contexts. This idea has been used successfully in many web based businesses to increase user engagement. Some researchers suggest that it could also be used in web based education as a tool to increase student motivation and engagement. In an attempt to verify those theo...
Conference Paper
Full-text available
Resumen. En este articulo se presenta un estudio sobre la accesibilidad en los dispositivos móviles de últim a gener ación: los llam ados Sm artphones. Este estudio está orientado hacia el uso de estos dispositivos para que personas que tengan alguna discapacidad puedan acceder a contenidos e-learning. Para ello se comprobarán todas las característ...
Article
The assessment in e-learning systems is a basic element to successfully complete any formative action. In this article we present a generic, flexible, interoperable and reusable language for design assessments, and its implementation in the EDVI Learning Management System. This language is based on XML and we have used XML Schema technology. We als...
Conference Paper
Full-text available
In this paper we propose a system that allows to adapt educational contents to learners, based on the knowledge of a learner who is conducting the training through his mobile device, contents will also be tailored to the features of the device and to the context where the learner is at the present moment. Keywords-m-learning; adaptation; learning o...
Article
Full-text available
The process for creating learning contents using reusable learning objects (LOs) can be broken down into two sub-processes: LO finding and LO sequencing. Finding can be automated by the use of federated search engines along with gap analysis techniques; however, sequencing is usually performed by instructors, who create courses targeting generic pr...
Article
Full-text available
Mobile learning is considered an evolution of e-learning that embraces the ubiquitous nature of current computational systems in order to improve teaching and learning. Within this context it is possible to develop mobile applications oriented to learning, but it is also important to assess to what extent such applications actually work. In this pa...
Conference Paper
Full-text available
This system comes up as a result of the increase of e-learning systems. It manages all relevant modules in this context, such as the association of digital rights with the contents (courses), management and payment processing on rights. There are three blocks: - A normalized application following the worldwide accepted standards or recommendations...
Conference Paper
Full-text available
Inspired by political parties' behavior in parliament's elections of chairman, Parliameantary Optimization Algorithm (POA) has emerged as a new stochastic population-based optimizer. Current research has proven POA efficiency in numerical optimization but it is difficult to find a POA version that deals with combinatorial optimization. In this pape...
Conference Paper
This paper presents a web tool that uses Java Server Faces to design questions graphically, to test the outcome in a learning environment and to export them using the QTI v2.1 specification in order to ensure interoperability between different learning systems.
Conference Paper
Full-text available
This paper proposes to improve the Simple Query Interface (SQI), designed to query learning object repositories, modifying a few existing methods to generate new ones. Replacement is not intended, instead, our proposal is to create new methods that incorporate several enhancements in order to enable compatibility with currently compliant systems th...
Article
Nowadays there are two key factors for e-learning implementation: the reusability of learning objects and the interoperability among the learning objects repositories. A learning object must be developed according to the standards like the ones established by IMS, ADL (SCORM) or IEEE (LOM) in order to obtain its complete reusability. It is possible...
Article
Full-text available
Increasing demand for security commercial products requires an improvement of methods for evaluating their software quality. Existing standards offer general frameworks but more specific models which reflect the perception of experts and customers as well as the particular characteristics of this type of products are needed. This article presents a...
Conference Paper
In this paper we present our experience in building and lecturing an interdisciplinary CS course aimed at teaching the Unified Modeling Language (UML) in a cultural context. Combining modeling concepts and ideas brought from philosophy and history of ideas we present a novel way to teach UML and modeling beyond its original environment. Course desi...
Conference Paper
Full-text available
This paper presents a new mobile application designed for auto-assessment that allows students to test their knowledge and expertise in a specific topic using questionnaires designed by their teachers. Students' achievement was evaluated and results suggest that this kind of approaches can improve it.
Conference Paper
Full-text available
This paper presents a course that explores the borders of database systems and their relations with the philosophical movement of phenomenology, all framed in a humanistic informatics context.
Article
Full-text available
Abstract: In this paper, a case of study about the use of XML standards and computer based tools for the reuse and sharing of learning designs is presented. Authors have defined a process for creating Units of Learning. To this end, different tools have been used to design, plan, orchestrate, control and implement learning activities in an e-learni...
Conference Paper
In this paper we present our experience in building and lecturing an interdisciplinary CS course aimed at teaching the Unified Modeling Language (UML) in a cultural context. Combining modeling concepts and ideas brought from philosophy and history of ideas we present a novel way to teach UML and modeling beyond its original environment. Course desi...
Conference Paper
Full-text available
This project presents a new way of sightseeing, by adapting itself to new times and new technologies. It has been created a system able to guide the tourist at all times during a visit to a city by means of a PDA with GPS technology; it shows the most interesting points (both in text and multimedia contents), the most important routes, a street dir...
Conference Paper
The University of Alcalá (Spain) and the Lund University (Sweden) have been collaborating for several years in the development of various courses at the in-between of the Computer Science and the Humanities fields. We are trying to join different expertise and to apply it to design new ways of teaching. Within this scope we present here a course th...
Conference Paper
Full-text available
Standards and specifications widely accepted and used lay the foundations to enable and facilitate the interoperability among systems, and the software maintenance and reuse, especially within the scope of learning objectspsila search systems. One of these standards is the SQI (standard query interface) specification by the European Committee for S...
Conference Paper
The process of creating e-learning contents using reusable learning objects (LOs) can be broken down in two sub-processes: LOs finding and LO sequencing. Sequencing is usually performed by instructors, who create courses targeting generic profiles rather than personalized materials. This paper proposes an evolutionary approach to automate this latt...
Conference Paper
Full-text available
The process of creating e-learning contents using reusable learning objects (LOs) can be broken down in two sub-processes: LOs finding and LO sequencing. Although semiautomatic tools that aid in the finding process exits, sequencing is usually performed by instructors, who create courses targeting generic profiles rather than personalized materials...
Conference Paper
Full-text available
In e-learning initiatives content creators are usually required to arrange a set of learning resources in order to present them in a comprehensive way to the learner. Course materials are usually divided into reusable chunks called Learning Objects (LOs) and the ordered set of LOs is called sequence, so the process is called LO sequencing. In this...
Conference Paper
The process of creating e-learning courseware using reusable learning objects (LOs) can be broken down in two sub-processes: LOs finding and LO sequencing. Sequencing is usually performed by instructors, who create courses targeting generic profiles rather than personalized materials. This paper proposes an evolutionary approach to automate this la...
Chapter
Full-text available
Automated LO sequencing is a recurring problem in the e-learning field that could be undertaken employing models that ensure interoperability and artificial intelligent techniques. The purpose of the study was to design, develop and test a PSO agent that performs automatic LO sequencing through competencies. A model that employs competencies as a m...
Article
Full-text available
Competency definition and standardization is actually a highly active research and development trend in the e-learning area. Meanwhile adaptive systems and techniques have a consolidated background and they have been widely used to construct personalized e-learning systems. This paper aims to join these two different areas developments in order to...
Conference Paper
Full-text available
In e-learning initiatives content creators are usually required to arrange a set of learning resources in order to present them in a comprehensive way to the learner. Course materials are usually divided into reusable chunks called Learning Objects (LOs) and the ordered set of LOs is called sequence, so the process is called LO sequencing. In this...
Conference Paper
Full-text available
The process of creating e-learning contents using reusable learning objects (LOs) can be broken down in two sub-processes: LOs finding and LO sequencing. Sequencing is usually performed by instructors, who create courses targeting generic profiles rather than personalized materials. This paper proposes an evolutionary approach to automate this latt...
Conference Paper
Full-text available
Active development in the field of e-Learning has led to multiple organizations and specifications that try to provide some interoperability to systems, tools and learning contents. The great amount of specifications, exacerbated by its intrinsic complexity, has resulted in many commercial tools that agree specific norms or even subsets of one spec...
Conference Paper
Full-text available
Current e-learning applications should provide universal access to educational information, regardless of the standards, protocols or programming languages used. This would maximize the reuse of learning objects and help this technology to gain its place as a fundamental and, in some cases only, support tool for present day educational systems. To...
Conference Paper
Full-text available
As a part of many e-learning initiatives, a set of learning units must be arranged in a particular order to meet the learnerspsila requirements. This process is known as sequencing and it is typically performed by instructors, who create wide-public ordered series rather than learner personalized sequences. This paper proposes an innovative intelli...
Conference Paper
Full-text available
In e-learning initiatives, sequencing problem concerns arranging a particular set of learning units in a suitable succession for a particular learner. Sequencing is usually performed by instructors, who create general and ordered series rather than learner personalized sequences. This paper proposes an innovative intelligent technique for learning...
Article
Full-text available
E-learning model emerged in mid-90s claiming to be the substitute for traditional classroom-based learning, meanwhile learning object paradigm have driven almost all technological researches and developments within e-learning area. Despite great investments, few authors and projects have analyzed the e-learning lifecycle and the role that learning...