Jose M. Alcaraz Calero's research while affiliated with University of the West of Scotland and other places

Publications (21)

Article
Full-text available
In recent years, Wireless Acoustic Sensor Networks (WASN) have been widely applied to different acoustic fields in outdoor and indoor environments. Most of these applications are oriented to locate or identify sources and measure specific features of the environment involved. In this paper, we study the application of a WASN for room acoustic measu...
Conference Paper
Human Search and Rescue (SAR) tasks are mission-critical and take place in the wild, and thus solutions require timely and accurate human detection on a highly portable platform. This paper proposes a novel lightweight and practical SAR system that meets those demanding requirements by running optimised machine learning in a smartphone, interoperab...
Article
Full-text available
The diverging requirements from various vertical industries have driven the paradigm shift in the next‐generation (5G) mobile networks, where network slicing has emerged as a major paradigm for this purpose by sharing and isolating resources over the same 5G physical infrastructure. To truly fulfill the different quality‐of‐service (QoS) requiremen...
Book
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields inclu...
Article
The Fifth-Generation (5G) networks, as the emerging next generation mobile networks, are adopting softwarization and virtualization technologies as the cornerstones for the network operators to gain significant competitive advantages by reducing both capital and operational expenditure, enabling agile and flexible service creation and deployment, a...
Article
Currently, there is no any effective security solution which can detect cyber-attacks against 5G networks where multitenancy and user mobility are some unique characteristics that impose significant challenges over such security solutions. This paper focuses on addressing a transversal detection system to be able to protect at the same time, infras...
Article
Full-text available
Cloud computing infrastructures are demanding an efficient monitoring mechanism to warranty the operational state of large-scale virtualized data centers and to provide mechanisms to improve the efficiency and stability of such infrastructures. Traditionally, centralized monitoring models (CMM) provide high performance and availability for the grou...
Conference Paper
Full-text available
5G networks are envisioned to support substantially more users than the current 4G does as a direct consequence of the anticipated large diffusion of Machine-2-Machine (M2M) and Internet of Things (IoT) interconnected devices, often with significantly higher committed data rates than general bandwidth currently available into Long Term Evolution (L...
Article
The deployment of a new mobile telecommunication operator and its operation can lead to very high costs and a long entry time to business market. Sharing LTE Network infrastructures and adopting network virtualization technologies are of paramount importance to reduce both capital and operational costs of future mobile networks. However, the number...
Book
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organiz...
Book
This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016. The 40 papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical...
Book
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th Intern...

Citations

... These studies demonstrated that the SSL based on DNNs significantly improved the accuracy and robustness of the model compared with traditional signal processing-based methods. Furthermore, [12] used a CNN to analyze the speech intelligibility, which shows the suitability of a CNN for processing acoustic data. The microphone array-based sound localization method can be implemented using an analytic sound source localization (SSL) algorithm such as in [4][5][6][7][8][9]. ...
... These crane-related hazards can be significantly reduced by automated monitoring and detecting the workforce in realtime from top-view, which allows the operator to take immediate safety actions. Human detection has widespread applications in surveillance and monitoring systems, person counting and tracking, search and rescuing missing people [5][6][7], and action and behavioural understanding, among others [8,9]. Human detection from top-view has also attracted attention in recent years since it deals better with the occlusion problems and can cover a wider area of the scenes compared with frontal-view based human detection [10]. ...
... The firewalls must be modified to consider the resource-constrained nature of IoT devices. Already research efforts are going to design firewalls suitable for IoT in industry as well as academia as addressed in [22][23][24]. Furthermore, efficient suitable encryption/decryption mechanisms for low-powered IoT systems are also required. ...
... To evaluate the feasibility of the proposed RAN slicing framework, we consider the smart grid self-healing scenario in [12], where automatic reconfiguration occurs after a shortcircuit fault. The IEDs, smart substation controllers (SSCs), and merging units (MUs) are equipped with 5G interfaces to transmit IEC 61850 messages in a multicell network topology. ...
... Service function chaining is a mechanism that links different service functions to each other to form a service through virtual machines running either on a single or multiple nodes. These nodes have specified bandwidth constraints on communication with other nodes and limited computing resources[53] [54] [55][56]. Therefore, the performance of service function chaining significantly depends on the choice of the node and its corresponding communication links. ...
... Ricart-Sanchez et al. [27,28] propose a NetFPGA-based network slicing solution implemented in P4 language [29] for 5G MEC architectures. Moreover, an analysis and evaluation of the performance is presented. ...
... This card provides high flexibility and has an extensible framework that allows the control and definition of the tables content. However, it has been demonstrated [25,26] that it does not provide superior performance in high-rate network transmissions. ...
... Bhardwaj et al. [26] proposed the ShadowNet idea to increase the detection and response speed in an IoT-DDoS attack. Serrano Mamolar et al. [4] introduced the architecture of a mobile edge 5G multi-tenant infrastructure with the edge, the core and the inter-domain structure in the network. The mitigation design framework is based on the Snort IDS capabilities named the snort monitoring agent (SMA). ...
... These three problems are partially addressed in the literature reporting simulations and field experiments in tactical networks (e.g. [5], [6], [7], [8], [9], [10]). For example, it is common to find studies using non-stochastic user-generated data flows with few types of messages sent to the network within an uniform time window (problem A). ...
... Also in telecommunications and mobile networks, cyber-attacks can directly inject false data in the network, spread malware, send spam, or collect information for illegal purposes [169]. Self-organised networks [170,171] and virtual network functions [172,173] aid to get an early detection and better mitigation of cyber-attacks in mobile networks [174,175]. ...