Roger Piqueras Jover Updated January 10th, 2024 Main LinkedIn Profile
Blog @me
Education: December10: M.Phil. in Electrical
Engineering (M.S. + PhD everything but dissertation), Columbia University in the City of NY
(GPA: 4.0) June08: M.S. in Electrical and Computer
Engineering, University of
California, Irvine (GPA: 4.0) March06:
Dipl.-Ing. in Telecommunications Engineering, Polytechnic University of Catalunya
(Barcelona) (Top 10%) Bio: Roger
Piqueras Jover, a native of Barcelona, graduated from the Escola Tθcnica
Superior d'Enginyeria de Telecomunicacions
de Barcelona (ETSETB) of the Universitat Politθcnica de
Catalunya (UPC) in 2006, earning a Dipl.-Ing. in Telecommunications
Engineering with a specialization in communications. During his tenure, he
conducted his graduation project within the Radio Communication Research Group of
the Department of Signal Theory and
Communications, focusing on the analysis of Radio Resource Management
Strategies for Heterogeneous Mobile Networks GSM/EDGE+UMTS. In
2006 he was awarded a Balsells Fellowship to pursue graduate studies in
Electrical Engineering at the University of
California, Irvine. There he joined the Wireless Circuits and Systems Lab
where he contributed to the design and implementation of a wireless channel
emulator for MIMO/OFDM 802.11n systems. He successfully completed his
studies, obtaining a MSc in Electrical and Computer Engineering in June 2008.
Subsequently, he relocated to New York City to engage in a research project
on interference mitigation in Femtocell Networks at the Department of Electrical Engineering
at Columbia University in the City of
New York, graduating in 2010 with a MPhil in Electrical Engineering. From
December 2010 to September 2015, Roger served as a member of AT&Ts Security Research
Center. Throughout his tenure, he ascended through various roles,
from Member of Technical Staff to Principal Member of Technical Staff,
earning esteemed recognitions such as the CSO Award, the CTO Award, and the
Key Contributor Award multiple times. At AT&T, he spearheaded projects
and research endeavors on LTE mobile network security, delving into PHY layer
threats, LTE protocol exploits, and control plane signaling scalability issues.. In
September 2015, Roger transitioned to the
CTO Security Architecture team of Bloomberg LP as a senior security architect. In
this capacity, he played a pivotal role as a technical leader in ProdSec, AppSec, network and infrastructure security, and
embedded device security. Notably, he acted as a subject matter expert and
internal consulting resource on wireless and mobile security, network
intrusion detection, machine learning applied to intrusion detection,
hardware forensics, and embedded device security. Additionally, he
facilitated technology evaluations of vendors engaging with Bloomberg, while
also evaluating new technologies and providing strategic direction for
technology innovation across the organization. Since
May 2021, Roger has been a member of the Android Platform Security
team at Google, serving as the Tech Lead/Manager of the Cellular and
Baseband Security team. In this capacity, he leads a team of software
engineers focused on fortifying Android against false base station threats
and enhancing baremetal connectivity firmware. Roger
also served a two-year term as the chairman of the Commonwealth Cyber Initiative,
a pioneering effort in 5G security encompassing a state-of-the-art 5G
security lab, academic research, industry partnerships, collaboration with
standards groups, startup engagement and funding in 5G security, among other
areas. Moreover, for several years, he provided expert advice and consulting
services in mobile and wireless security across academia, industry, and
government sectors. Outside of his
professional pursuits, Rogers second full-time job is his family. He also
enjoys playing soccer, listening to music, and attending rock/punk-rock/metal
concerts. He proudly supports Futbol
Club Barcelona, declaring it the greatest football team ever. More
detailed information can be found in my Resume and LinkedIn profile. Certifications: GIAC Assessing and Auditing Wireless
Networks (GAWN). May 2021. GIAC Mobile Device Security Analyst (GMOB).
November 2020. GIAC Certified UNIX Security Administrator
(GCUX). February 2020. GIAC Reverse Engineering Malware (GREM). October 2019. GIAC Certified Incident Handler (GCIH). March 2019. Data
Mining with WEKA certification. December 2018. HA Radio
Certification. December 2016. Publications and
standards: (More details and links at my Google
Scholar profile) The Android Platform Security Model. Michael A. Specter Renι Mayrhofer,
Jeffrey Vander Stoep, Chad Brubaker, Dianne Hackborn, Bram Bonnι, Gόliz
Seray Tuncay, Roger Piqueras Jover. arXiv Technical Report. May 2019. December 2023.
[PDF] UE Security Reloaded: Developing a 5G Standalone User-Side Security
Testing Framework. Evangelos Bitsikas, Syed
Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pφpper. Proceedings
of the 16th ACM Conference on Security and Privacy in Wireless and Mobile
Networks. May 2023. [PDF] Study on 5G security enhancements against False Base Stations (FBS):
Certificate based solution for Protecting System Information Messages with
Digital Signature in an NPN. Roger Piqueras Jover (Under SoftHandover
Consulting affiliation). 3GPP
33.809. October 2020. [online] Security Analysis of SMS as a Second Factor of Authentication. Roger Piqueras Jover. Communications
of the ACM. September 2020. [online] Security Analysis of SMS as a Second Factor of Authentication. Roger Piqueras Jover. ACM
Queue. September 2020. [PDF] Biometric Identity Based on Intra-Body Communication Channel
Characteristics and Machine Learning. Ahmed Khorshid, Ibrahim Alquaydheb,
Fadi Kurdahi, Roger Piqueras Jover, Ahmed Eltawil. MDPI
Sensors. March 2020. [PDF] 5G protocol vulnerabilities and exploits. Roger Piqueras Jover. ShmooCon 2020. January 2020. [Slides] Dynamic 5G Network Slicing for First Responders. Ken Carlsberg, Eric Burger, Roger Piqueras Jover. Principles,
Systems and Applications of IP Telecommunications (IPTCom
2019). October 2019. CSAI: Open-Source Cellular Radio Access Network Security Analysis
Instrument. Thomas Byrd, Vuk Marojevic,
Roger Piqueras Jover. arXiv Technical Report. May 2019. [PDF] [Source code] IEEE
91st Vehicular Technology Conference: VTC2020-Spring. May 2020. The current state of affairs in 5G security
and the main remaining security challenges. Roger Piqueras Jover. arXiv Technical Report (not peer reviewed). April 2019. [PDF] Security and Protocol Exploit Analysis of the 5G Specifications. Roger Piqueras Jover, Vuk Marojevic. IEEE Access 7 (2019): 24956-24963. September 2018
(pre-print) and February 2019. [PDF] 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation. Marc Lichtman, Raghunandan M Rao, Vuk Marojevic, Jeffrey Reed, Roger Piqueras Jover. IEEE
International Conference on Communications - Workshop on 5G Security 2018
(ICC 5GSec18). May 2018. [PDF] Some key challenges in securing 5G wireless networks. Roger Piqueras Jover. Response
to FCC NOI DA 16-1282 (not peer reviewed). January 2017. [PDF][FCC][PDF2] LTE security, protocol exploits and location tracking experimentation
with low-cost software radio. Roger Piqueras Jover. arXiv Technical Report (not peer reviewed). July 2016. [PDF] dHSS - Distributed Peer-to-Peer implementation of the LTE HSS based on the
Bitcoin/Namecoin architecture. Roger Piqueras Jover, Joshua Lackey. IEEE
International Conference on Communications - Workshop on 5G Architecture
(IEEE ICC 5GArch16). May 2016. [PDF] (§) LTE/LTE-A Jamming, Spoofing and Sniffing: Threat Assessment and
Mitigation. Marc Lichtman, Roger Piqueras Jover, Mina Labib,
Raghunandan Rao, Vuk Marojevic, Jeffrey H. Reed. IEEE
Communications Magazine. Special issue on Critical
Communications and Public Safety Networks. April 2016. [IEEE
Xplore][PDF] (§) LTE Security and Protocol Exploits. Roger Piqueras Jover. ShmooCon 2016. January 2016. (Acceptance rate
15.77%) [Slides][Video] Detecting malicious activity on smartphones using sensor measurements. Roger Piqueras Jover, Ilona Murynets,
Jeffrey Bickford. 9th
International Conference on Network and System Security (NSS15). To be presented, November 2015.
Connection-less communication of IoT devices over LTE mobile networks. Roger Piqueras Jover, Ilona Murynets. IEEE
International Conference on Sensing, Communication and Networking (IEEE
SECON'15). June 2015. [PDF] Scalability of Machine to Machine systems and
the Internet of Things on LTE mobile networks. Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin. IEEE
WoWMoM 2015. June 2015.
(Acceptance rate 20%) [PDF] A scalable test bed for large-scale LTE security research. Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin. IEEE
North Jersey Advanced Communications Symposium. Poster session. September 2014. [PDF] Enhancing the security of LTE networks against jamming attacks. Roger Piqueras Jover, Joshua Lackey, Arvind
Raghavan. EURASIP
Journal on Information Security. April 2014. [PDF] Firecycle: A scalable test bed for large-scale LTE security research. IEEE
International Conference on Communications Communications
and Information Systems Security Symposium (ICC14 CISS). June 2014. [PDF] Analysis and Detection of SIMbox Fraud in
Mobility Networks. Ilona
Murynets, Michael Zabarankin,
Roger Piqueras Jover, Adam Panagia. IEEE
Infocom, April 2014. (Acceptance rate 19.4%) [PDF] Is It Really You? User Identification via Adaptive Behavior
Fingerprinting. Paul
Giura, Ilona Murynets,
Roger Piqueras Jover, Yevgeny Vahlis. ACM
Conference on Data and Application Security and Privacy (CODASPY14), March 2014. (16% acceptance rate) [pdf] Security Attacks Against the Availability of LTE Mobility Networks:
Overview and Research Directions. Roger Piqueras Jover. IEEE
Global Wireless Summit - Wireless Personal Multimedia Communications
Symposium (GWS - WPMC), June 2013. [pdf] Analysis of SMS Spam in Mobility Networks. Ilona
Murynets, Roger Piqueras Jover. International
Journal of Advanced Computer Science (IJACSci),
Vol. 3 num. 7, July 2013. [pdf] How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent
Threats. Roger Piqueras Jover, Paul Giura. International
Journal on Information Technology (IREIT), Vol. 1 num. 2. March 2013.
[pdf] Anomaly detection in cellular Machine-to-Machine communications. Ilona
Murynets, Roger Piqueras Jover. IEEE
International Conference on Communications (ICC13). June
2013. [pdf] Crime Scene Investigation: SMS Spam Data Analysis. Ilona
Murynets, Roger Piqueras Jover. ACM
Internet Measurement Conference 2012 (IMC12). November 2012, Boston MA.
(24% acceptance rate) [ACM
Library] [pdf] How an SMS-based Malware Infection Will Get Throttled by the Wireless
Link. Ilona Murynets,
Roger Piqueras Jover. IEEE International
Conference on Communications (ICC12 CISS). June 2012. [IEEE
Xplore] [PDF] Uplink
Interference Mitigation for OFDMA Femtocell Networks. Yanzan Sun, Roger Piqueras Jover, Xiaodong Wang. IEEE Transactions on
Wireless Communications, vol.11, no.2, pp.614-625, February 2012. [IEEE
Xplore] [PDF] (§) Dynamic
Pricing for Decentralised RAT Selection in
Heterogeneous Scenarios Roger
Piqueras Jover, Jordi
Perez-Romero, Oriol Sallent, Ramon Agusti. 2006
IEEE 17th International Symposium on Personal, Indoor and Mobile Radio
Communications, Helsinki, September 2006 [IEEE
Xplore] (§) Analysis
and Design of New Initial RAT Selection Strategies Based on Pricing and Path
Loss for Heterogeneous Wireless Networks GSM/EDGE/UMTS (Thesis) Roger
Piqueras Jover Final research project
for the degree of Telecommunications Engineering BSc, Universitat
Politθcnica de Catalunya, March 2006. (In Catalan)
[pdf] Translation
to English of my undergraduate thesis (work in progress) available here: Analysis and Design of New Initial RAT Selection Strategies
Based on Pricing and Path Loss for Heterogeneous Wireless Networks
GSM/EDGE/UMTS (Note:
Automatically generated with Google Translate. Dont
expect Shakespeares English. Read abstract for details on the translation) Variable Rigidity PDMS
Structures. Roger
Piqueras Jover, Teresa Fazio, Shalom Wind. Presented
at The Gordon Research Conference on
Nanostructure Fabrication, July 2010, Tilton, NH (link) Biocompatible
Surfaces witch Locally variable Rigidity Roger
Piqueras Jover, Teresa Fazio, Shalom Wind. Presented
at The 54th International
Conference on Electron, Ion and Photon Beam Technology and Nanofabrication, EIPBN June 2010, Anchorage, AK. [pdf] (§) PDF of the accepted version of the paper
(pre-print) shared here as per the new IEEE
Policy Regarding Authors Rights to Post Accepted Versions of Their Papers. ©
2006-2016 IEEE. Personal use of this material is permitted. Permission from
IEEE must be obtained for all other uses, in any current or future media,
including reprinting/republishing this material for advertising or
promotional purposes, creating new collective works, for resale or
redistribution to servers or lists, or reuse of any copyrighted component of
this work in other works. Other publications and
articles: · Hardening
cellular basebands in Android. Google Security Blog. December 2023. · SMS
Security & Privacy Gaps Make It Clear Users Need a Messaging Upgrade.
Google Security Blog. September 2023. · Android
14 introduces first-of-its-kind cellular connectivity security features.
Google Security Blog. August 2023. · Hardening
Firmware Across the Android Ecosystem. Google Security Blog. February
2023. · Leveraging
digital certificates to protect commercial 5G mobile networks. March
2021. · A
reflection on the history of cellular security research and the security
outlook of 5G. June 2019. · Are
we there yet? The long path to securing 5G mobile communication networks. May 2018. · The
impact of open source on mobile security research. May 2016. Books: (Book chapter)
Applying low-cost software radio for experimental analysis of LTE
security, protocol exploits and location leaks. Intrusion Detection and Prevention for Mobile
Ecosystems. Taylor &
Francis LLC, CRC Press. Publication Summer 2017. (Book chapter)
Security and impact of the IoT on LTE mobile networks. [Pre-print PDF version]* Security and Privacy in Internet of Things (IoT):
Models, Algorithms, and Implementations. Taylor &
Francis LLC, CRC Press. Publication late 2015. *Posted here based on the contributor
agreement with the publisher. Patents: (More details and links at my Google
Scholar profile) · BIOMETRIC
IDENTIFICATION THROUGH INTRA-BODY COMMUNICATION. US Patent Application
US20220197987A1, filed May 15th 2020. Patent pending. · CRYPTOGRAPHICALLY
SIGNING AN ACCESS POINT DEVICE BROADCAST MESSAGE. US Patent US9860067B2, filed October 2015. · METHOD AND APPARATUS
FOR COMMUNICATING NETWORK MANAGEMENT TRAFFIC OVER A NETWORK. US Patent US9729197 B2, filed October 2015. · METHOD AND APPARATUS
FOR ENCRYPTION OF COMMUNICATIONS OVER A NETWORK. US Patent US9769128 B2, filed September 2015. · METHOD
AND APPARATUS FOR ENCRYPTION OF COMMUNICATIONS OVER A POWER LINE NETWORK.
US Patent Application PCT/US2016/050039, filed September 2016. Patent
pending. · METHODS AND
APPARATUS TO TRANSMIT DATA IN A CONNECTIONLESS MODE. US Patent US9832790B2, filed September 2015. · METHOD AND
APPARATUS FOR DISTRIBUTING SOFTWARE UPDATES. US Patent US9904535B2, filed September 2015. · METHOD
AND APPARATUS FOR COMMUNICATIONS MANAGEMENT IN A NEIGHBORHOOD NETWORK. US Patent US9735833 B2, filed July 2015. · METHOD AND APPARATUS
FOR AUTHENTICATION AND IDENTITY MANAGEMENT OF COMMUNICATING DEVICES. US Patent US9820146 B2, filed July 2015. · SIGNAL
FNGERPRINTING FOR AUTHENTICATION OF COMMUNICATING DEVICES. US Patent US9913139B2, filed June 2015. · METHOD
AND APPARATUS FOR PROVIDING SECURITY USING NETWORK TRAFFIC ADJUSTMENTS. US Patent US9667317 B2, filed June 2015. · DECENTRALIZED
AND DISTRIBUTED SECURE HOME SUBSCRIBER SERVER DEVICE. US Patent US9667600 B2, filed April 2015. · SECURITY
ENHANCEMENTS FOR A SOFTWARE-DEFINED NETWORK WITH NETWORK FUNCTIONS
VIRTUALIZATION. US Patent US9742807 B2, filed November 2014. · BASE
STATION ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. US
Patent Application 20150138992 A1, filed November 2013. Patent pending. · ENDPOINT
DEVICE ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. United States Patent US9288007 B2, filed November
2013. [UPSTO
link] · METHOD
AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR
NETWORK SECURITY. United States
Patent US9119064 B2, filed November 2013. · MALWARE
AND ANOMALY DETECTION VIA ACTIVITY RECOGNITION BASED ON SENSOR DATA. United States Patent US 9319423 B2, filed November
2013. · DETECTION
AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION
NETWORKS. United States Patent US9295028 B2, filed October 2013. · SYNCHRONIZING
MOBILE DEVICES AND DISPLAYS. United States
Patent US8915441 B2, filed October 2012. · SHORT
MESSAGE SERVICE SPAM DATA ANALYSIS AND DETECTION. United States Patent US9445245, filed July 2012. · METHOD AND APPARATUS FOR
RANKING APPS IN THE WIDE-OPEN INTERNET. United States
Patent Application 20140006418 A1, filed July 2012. Patent pending. · METHOD AND APPARATUS FOR
DERIVING AND USING TRUSTFUL APPLICATION METADATA. United States Patent US9449104 B2, filed July 2012. · METHOD AND APPARATUS FOR
SEARCHING FOR SOFTWARE APPLICATIONS. United States
Patent Application 20140006440 A1, filed July 2012. Patent pending. · METHOD AND APPARATUS FOR
ROBUST MOBILE APPLICATION FINGERPRINTING. United States Patent Application 20140006375 A1, filed July 2012.
Patent pending. · 11 more patent applications filed pending to be published. Selected talks: · The impact
of open-source testbeds on cellular security research. IEEE
Future Networks Testbed Requirements, Challenges and Opportunities workshop.
February 2022. [Slides] · 5G Protocol Vulnerabilities and
Exploits. ShmooCon 2020. February 2020. [Slides] [Video] · Mobile
Network Security and its Impact on Fraud and Privacy. iSMG
New York Fraud Summit. March 2019. [Recording] · Exploring LTE security with
open-source tools, testing protocols exploits and analyzing their potential
impact on 5G mobile networks. Virginia Tech Hume Center. November 2018. [Slides] · Protocol-fuzzing LTE Mobile
Networks with Open-Source Tools, Testing Protocol Exploits and Analyzing
Their Potential Impact on 5G Mobile Networks. HushCon
East. June 2018. · Seminar:
Protocol-fuzzing mobile networks with open-source tools to enhance the
security of LTE and 5G mobile networks. UC Irvine. May 2018. · Tutorial:
LTE security analysis and experimentation with low-cost software radio.
CTTC Research Center. March 2017. · LTE
security, protocol exploits and location tracking experimentation with
low-cost software radio. Hacker Halted. September 2016. [Slides] · LTE
protocol exploits: IMSI catchers, blocking devices and location leaks. TakeDownCon. June 2016. [Slides] · LTE Security and Protocol Exploits.
ShmooCon 2016. January 2016. · Security
Threats and Challenges of the IoT Over Mobile Networks. International
Wireless Industry Consortium workshop on IoT. November 2015. · Security Analysis and Design in LTE using Simulation Modeling. Riverbed/OPNET Modeler User Conference. February 2015. · Security
Attacks Against the Availability of LTE Mobility Networks - Overview and
Research Directions. Telefonica Research. Barcelona. June 2014. · Next-generation
Mobility Security Architecture Research Testbed: 15th
Annual AT&T Cyber Security Conference (September 2013) Selected media appearances: · Android
14 could stop your one-time passwords from leaking. Android Police.
August 2023. · Android
14 takes aim at insecure cryptography in cellular networks. XDA
Developers. August 2023. · Google
details how Android 14 protects against cellular attacks. 9to5 Google.
August 2023. · Google
Teams Up with Ecosystem Partners to Enhance Security of SoC Processors.
The Hacker News. February 2023. · Google
is making your Android phone safer with hardened firmware. Android
Police. March 2023. · 5G:
Are We Ready? Security Risks with the New Technology. Trend Micro
security blog. January 2021. · How
cops can secretly track your phone. The Intercept. July 2020. · 5G
security is a mess. Could digital certificates help?
CSO Online. February 2020. · One
Small Fix Would Curb Stingray Surveillance. Wired. January 2020. · Sen.
Wyden Pushes FCC on 5G Security. BankInfoSecurity.
November 2019. · 5G
testbed in Virginia targets wireless security. Fierce Wireless. October
2019. · 5G
wireless test bed boosts security research in Virginia. TechRepublic.
October 2019. · Test
bed for 5G wireless security will accelerate cyber research in Virginia.
Virginia Tech News. October 2019. · The
History of Cellular Network Security Doesnt Bode
Well for 5G. Electronic Frontier Foundation (EFF) Deeplinks
blog. June 2019. · Cellular
Networks Present Security Challenges (discussion on SS7, GSM, LTE and 5G
security). Interview with Data Breach Today, iSMG.
April 2019. · Discussion
on mobile (SS7, GSM, LTE, 5G) security [7:20]. iSMG
Security Report podcast. March 2019. · AT&T
Awarded Patent for Bitcoin-Powered Subscriber Server. CoinDesk. June
2017. · Radio
interview on technology and mobile security (Live from NYC). RAC1 Radio
Barcelona. November 2016. [Audio
In Catalan] · AT&T
Adopting Blockchain. Financial Advisor. October 2016. · AT&T
is Seeking a Patent for a Bitcoin-Powered Server. CoinDesk. October 2016. · Watch Out!
Security Experts Offer Warnings, Recommendations during UConns Cybercrime
Prevention Conference. University of Connecticut Business School. July
2016. · How
to Secure the Changing Face of Mobile. Bloomberg Technology Blog. June
2016. · Mobile
Security: A Conversation with Roger Piqueras Jover. Bloomberg Technology
Blog. December 2015. · AT&T
researchers publish landmark SMS spam study. The FrontLine V3.co.uk Service and affiliations: Tutorials and panels: ·
LTE
and 5G protocol security procedures and vulnerability analyses using software
radio testbeds 2018 IEEE Conference on Military Communications (IEEE
MILCOM). [Slides] ·
LTE
Mobility Security and Virtualization 2016 IEEE International Conference
on Communications (IEEE ICC) [Slides] ·
Invited panelist:
Physical-layer security for future emerging networks: challenges and
limitations - 2016 IEEE International Conference on Communications (IEEE ICC)
Workshop on Wireless Physical Layer Security Program Committee: ·
ACM CCS TPC
member - 2024 ·
ACM Conference on
Security and Privacy in Wireless and Mobile Networks TPC member 2023,
2024 ·
IEEE Conference on Communications and
Network Security - TPC member 2019. ·
IEEE Wireless Communications and Networking
Conference - TPC member 2019. ·
1st IEEE Workshop
on 5G Wireless Security (5G-SECURITY) TPC member 2018. ·
International
Symposium on Security and Privacy of the Internet of Things TPC member
2017, 2018, 2019. ·
IEEE Seattle 5G
Summit TPC Co-Chair - 2016 ·
IEEE Aalborg 5G Summit TPC
Co-Chair - 2016 ·
IEEE Sarnoff Symposium
Demo/Exhibit Chair ·
IEEE Silicon Valley 5G Summit TPC
Co-Chair 2015 · IEEE Toronto 5G Summit TPC Co-Chair -
2015 · IEEE Workshop on Software Defined 5G Networks (Soft5G) TPC member - 2016 ·
The 36th IEEE Sarnoff
Symposium TPC member - 2015 ·
IEEE International 5G Summit Program
co-chair - 2015 ·
International
Conference on Emerging Security Information, Systems and Technologies
(SECUREWARE) TPC member - 2015 ·
IEEE Workshop on Data
Analysis for Social and Secure Smartphone Applications TPC member -
2014 ·
Global Wireless
Summit Wireless Vitae
TPC member 2014 ·
All
Things Cellular Sigcomm
workshop (previously CellNet) TPC member
2014 ·
International
Conference on Internet Monitoring and Protection (ICIMP) TPC member
2013, 2014, 2015 ·
IEEE GWS -
Wireless Personal Multimedia Communications Symposium (WPMC'13) Session
chair Service and Editorial: ·
IEEE Wireless Communications
magazine. Special issue: Challenges
and Novel Solutions for 5G Network Security, Privacy and Trust Co-guest
editor. ·
ELSEVIVER Future
Generation Computer Systems: Special issue on Advancements in 5G Network
Security Co-guest editor. ·
Member of the
IEEE Communications Society Industry Relation
task force. ·
Journal of
Cyber Security and Mobility: Special
issue on Next generation mobility network security Guest Editor [CFPs] Reviewer: · IEEE
Transactions on Wireless Communications · IEEE
Transactions on Mobile Computing · IEEE
Transactions on Vehicular Technology · IEEE
Communications Letters · IEEE/ACM
Transactions on Networking · IEEE
Wireless Communications Magazine · IEEE
IoT journal · Elseviver Ad-Hoc Networks Journal · Wiley
International Journal of Communication Systems · Conferences:
CCS, WiSec, Sigmetrics,
ICC, ICASSP, WCNC, VizSec, Oakland (S&P),
PIMRC, Mobicom, Sigcomm,
IEEE CNS. IEEE/ComSoc
Member IEEE Internet of Things
Community member IEEE Cybersecurity Technical
Community member ACM/Sigcomm/Sigmobile Member |
||
Copyright © 2024, Roger Piqueras Jover. All
rights reserved. |