| Title | Student | Status / Date |
|---|---|---|
| Generative AI and the human factor: impact of LLMs on cybersecurity and user-targeted attacks | Jaime Pujante Sáez | Ongoing |
| Application of Large Language Models to automated vulnerability discovery and software robustness evaluation | Mario Rodríguez Béjar | Ongoing |
| Evaluation of Large Language Models for advanced cybersecurity information analysis | Álvaro Ruiz Ródenas | Ongoing |
| Intrusion Detection for Internet of Things based on Federated Learning | Enrique Mármol Campos | 11/2024 |
| Definition of a Methodology for the Security Evaluation of Internet of Things Devices | Sara Nieves Matheu | 07/2020 |
| A Data-centric Security Architecture for the Integration of Constrained Devices into IoT Scenarios | Salvador Pérez Franco | 07/2020 |
| Title | Student | Date |
|---|---|---|
| Linguistic Analysis and Robustness of LLM-Based Detectors Against AI-Generated Phishing Emails | Ahmed Seid Yahi | 02/2026 |
| Study of sample balancing techniques for cybersecurity report classification | Jaime Pujante Sáez | 07/2025 |
| Generation of malicious emails with LLMs and evaluation against commercial and open-source spam filters | Ignacio Ruiz Chicano | 07/2025 |
| Large Language Models for Advanced Cybersecurity Information Analysis | Álvaro Ruiz Ródenas | 02/2025 |
| Design and evaluation of a CP-ABE-based group information sharing mechanism for the IoT | Salvador Pérez | 09/2015 |
| Title | Student | Date |
|---|---|---|
| Analysis of LLMs for pentesting automation | Víctor Saura Meseguer | 07/2025 |
| Using blockchain in federated learning for secure model sharing and updating | Juan Luis Gomez Gomez | 07/2025 |
| Using federated learning to improve energy efficiency in buildings | Juan de Dios Hernández Kakauridze | 07/2025 |
| Analysis of cybersecurity behavior using Machine Learning techniques | Ignacio Ruiz Chicano | 07/2024 |
| Fine-tuning pre-trained LLMs in private data and environment settings | Julián Fernández Calvo | 07/2024 |
| Distributed access control system for smart buildings integrating location information via magnetic field measurements | Javier García Navarro | 02/2015 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| BSc in Data Science and Engineering | Cybersecurity | 1 | |
| Master in Cybersecurity | Risk Analysis, Management and Cybersecurity Governance | 1 | |
| Master in Cybersecurity | Introduction to Research | 1 | Course coordinator |
| Master in Cybersecurity | Ethical Hacking | 1 | Course coordinator |
| Master in Cybersecurity | Security Operations, Incident Management and Forensics | 1 | |
| Master in Cybersecurity | Malware, Privacy and Attack Technologies | 1 | Course coordinator |
| BSc in Computer Engineering | Professional Skills in Computer Engineering | 2 | |
| Master in Cybersecurity | Cybersecurity Projects Laboratory | 2 | Course coordinator |
| Master in Cybersecurity | Advanced Cyber Intelligence Techniques | 2 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| Master in Cybersecurity | Ethical Hacking | 1 | |
| Master in Cybersecurity | Introduction to Research | 1 | Course coordinator |
| Master in Cybersecurity | Advanced Aspects of Cybersecurity Management | 2 | Course coordinator |
| Master in Cybersecurity | Cybersecurity Projects Laboratory | 2 | |
| Master in Cybersecurity | Advanced Cyber Intelligence Techniques | 2 |
| Program | Subject | Semester | Role | |
|---|---|---|---|---|
| Master in Cybersecurity | Ethical Hacking | 1 | ||
| Master in Big Data Technologies (Inter-university) | Business Applications and Use Cases | 2 | ||
| Master in Cybersecurity | Advanced Aspects of Cybersecurity Management | 2 | ||
| Master in Big Data Technologies (Inter-university) | Internet of Things in the Big Data Context | 2 | ||
| Master in Cybersecurity | Cybersecurity Projects Laboratory | 2 | ||
| Master in Cybersecurity | Advanced Cyber Intelligence Techniques | 2 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| BSc in Computer Engineering | Network Architectures | 1 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| BSc in Computer Engineering | Network Architectures | 1 | |
| BSc in Computer Engineering | Advanced Network Architectures | 1 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| BSc in Computer Engineering | Network Architectures | 1 |
| Program | Subject | Semester | Role |
|---|---|---|---|
| BSc in Computer Engineering | Network Architectures | 1 | |
| BSc in Computer Engineering | Security | 2 |
Intern student at Department of Information and Communication Engineering (DIIC), Universidad de Murcia (Spain)