A. Omar Portillo-Dominguez

A. Omar Portillo-Dominguez

University College Dublin

H-index: 12

Europe-Ireland

About A. Omar Portillo-Dominguez

A. Omar Portillo-Dominguez, With an exceptional h-index of 12 and a recent h-index of 9 (since 2020), a distinguished researcher at University College Dublin, specializes in the field of Software Engineering, Data Analytics, Performance Engineering, Cloud Computing.

His recent articles reflect a diverse array of research interests and contributions to the field:

Abnormal event analysis

A Systematic Literature Review exploring the barriers to innovative modular construction methods for the international Hyper-Scale Data Centre sector

Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system

Protecting User Credentials against SQL Injection through Cryptography and Image Steganography

A Systematic Review of How Cloud Infrastructure and GDPR have affected Digital Investigations in a Multinational Business Context

A. Omar Portillo-Dominguez Information

University

University College Dublin

Position

Rapid7 Ireland

Citations(all)

280

Citations(since 2020)

180

Cited By

166

hIndex(all)

12

hIndex(since 2020)

9

i10Index(all)

14

i10Index(since 2020)

8

Email

University Profile Page

University College Dublin

A. Omar Portillo-Dominguez Skills & Research Interests

Software Engineering

Data Analytics

Performance Engineering

Cloud Computing

Top articles of A. Omar Portillo-Dominguez

Abnormal event analysis

Published Date

2023/2/21

An embodiment for contextualizing abnormal events which employ location-based social networks, LBSN, data to determine events that may be linked to the abnormal events is provided. The embodiment may include detecting an occurrence of an abnormal event within a geographic region, wherein the abnormal event occurs at an occurrence time. The embodiment may also include obtaining location-based social networks, LBSN, data relating to the geographic region for a time period including the occurrence time. The embodiment may further include analyzing the obtained LBSN data, wherein the analyzation determines a linked event within the geographic region for the time period. The embodiment may also include associating the linked event with the abnormal event.

A Systematic Literature Review exploring the barriers to innovative modular construction methods for the international Hyper-Scale Data Centre sector

Authors

Peter E Lonergan,A Omar Portillo-Dominguez

Published Date

2022

Data centres form the essential global infrastructure relied upon for multiple industries such as the internet, financial services, and telecommunications. Consequently, data centre construction has developed into a buoyant business sector, leveraging increasing global investment. However, traditional means of data centre procurement do not match stakeholder’s ambitions or current delivery demands. Thus, there is a need for the adoption of new and innovative construction methodologies in the sector to introduce improvements for the delivery of this essential infrastructure. As a step in that direction, this paper presents a Systematic Literature Review (SLR) that investigates the barriers preventing the implementation of modular construction (MC) techniques on advancing the construction performance for the Hyper-Scale data centre sector. The results of the SLR have identified five main adoption barriers that must be addressed to facilitate the adoption of MC in the sector. Also, despite the many potential benefits of modular construction, the SLR has shown that research into this topic is limited. Thus, we present qualitative findings and recommendations from the study that can act as pointers of future research work.

Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system

Authors

Athul Vijay,A Omar Portillo-Dominguez,Vanessa Ayala-Rivera

Published Date

2022/10/24

In the recent past, Android has emerged as the frontrunner in the smartphone domain when compared to its competitors in terms of global usage. However, this has also led to an increased number of malware attacks targeting Android. To counter this, various anti-malware systems and techniques are available nowadays that offer strong protection to users. The existence and deployment of malware detection models, such as antiviruses, are still made futile by the attackers modifying the code and creating more malware that evades the capability of the detection tools. This presents a larger threat to users' sensitive data by the malware, and that could further lead to data manipulation. This paper aims to contribute to achieving a more secure software engineering experience for Android users by proposing a lightweight tool that enables users to detect such malware more easily and, in turn, protect their overall data …

Protecting User Credentials against SQL Injection through Cryptography and Image Steganography

Authors

Parmit Singh Banga,A Omar Portillo-Dominguez,Vanessa Ayala-Rivera

Published Date

2022/10/24

As today's world is all about the internet and technology, the whole context of businesses has been shifted digitally. Almost every sector has established itself on a digital platform. Such a digital platform typically requires a website and a database that contains and stores a large amount of user data. However, the over resilience on websites also opens the gates for malicious attackers to try compromising those websites and get access to their information, such as user credentials. As per the Open Web Application Security Project (OWASP), SQL injection is one of the top-rated vulnerabilities currently faced by the software development community. SQL injection involves manipulating queries made to databases and executing malicious operations on them; this allows, among other actions, retrieving sensitive information. Due to its relevance, various approaches have been proposed to better protect user information …

A Systematic Review of How Cloud Infrastructure and GDPR have affected Digital Investigations in a Multinational Business Context

Authors

Stuart Fraser,A Omar Portillo-Dominguez

Published Date

2022

With cloud infrastructure becoming an ever more popular platform for business network implementations, and with ever-tightening data protection regulation, the ability to carry out digital investigations has become more difficult. This has led to areas of research that have looked to restore the balance to digital investigations in this environment. These areas include the use of blockchain, data tracing, and digital forensics as a service. With so many methods to consider, this article looks at how each method aims to return the balance and make it possible to carry out an investigation that complies with new privacy regulations (eg, the General Data Protection Regulation-GDPR-) by performing a systematic literature review of those areas. During the study, it was noted that, although blockchain appears to be a popular choice for data collection and transfer, it is disputed as to its ability to be GDPR-compliant. Factors such as over-processing and the inability to have a defined data processor are just some of the factors that dispute blockchains compliance. Indeed, there is no real one-fits-all solution to the issues faced when carrying out digital investigations. Furthermore, any potential solution appears to have to be an amalgamation of several methods. Such a hybrid approach might allow for GDPR-compliant data collection with a secure and immutable chain of custody. Thus, rendering any evidence collected admissible in a court of law, while also maintaining regulatory requirements.

See List of Professors in A. Omar Portillo-Dominguez University(University College Dublin)

A. Omar Portillo-Dominguez FAQs

What is A. Omar Portillo-Dominguez's h-index at University College Dublin?

The h-index of A. Omar Portillo-Dominguez has been 9 since 2020 and 12 in total.

What are A. Omar Portillo-Dominguez's top articles?

The articles with the titles of

Abnormal event analysis

A Systematic Literature Review exploring the barriers to innovative modular construction methods for the international Hyper-Scale Data Centre sector

Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system

Protecting User Credentials against SQL Injection through Cryptography and Image Steganography

A Systematic Review of How Cloud Infrastructure and GDPR have affected Digital Investigations in a Multinational Business Context

are the top articles of A. Omar Portillo-Dominguez at University College Dublin.

What are A. Omar Portillo-Dominguez's research interests?

The research interests of A. Omar Portillo-Dominguez are: Software Engineering, Data Analytics, Performance Engineering, Cloud Computing

What is A. Omar Portillo-Dominguez's total number of citations?

A. Omar Portillo-Dominguez has 280 citations in total.

What are the co-authors of A. Omar Portillo-Dominguez?

The co-authors of A. Omar Portillo-Dominguez are John Murphy, Liam Murphy, Damien Magoni, Miao wang, Vanessa Ayala-Rivera.

Co-Authors

H-index: 36
John Murphy

John Murphy

University College Dublin

H-index: 29
Liam Murphy

Liam Murphy

University College Dublin

H-index: 20
Damien Magoni

Damien Magoni

Université de Bordeaux

H-index: 9
Miao wang

Miao wang

Swinburne University of Technology

H-index: 8
Vanessa Ayala-Rivera

Vanessa Ayala-Rivera

National College of Ireland

academic-engine