Carlos Mex
Cited by
Cited by
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
Mexican International Conference on Artificial Intelligence, 622-631, 2006
Wireless sensor network energy model and its use in the optimization of routing protocols
C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Velázquez, ...
Energies 13 (3), 728, 2020
On the MAC/Network/Energy performance evaluation of wireless sensor networks: contrasting MPH, AODV, DSR and ZTR routing protocols
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ...
Sensors 14 (12), 22811-22847, 2014
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 15 (4), 7619-7649, 2015
An efficient multi-parent hierarchical routing protocol for WSNs
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galván-Tejada, ...
2014 Wireless Telecommunications Symposium, 1-8, 2014
Security in all-optical networks: Failure and attack avoidance using self-organization
G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz
2008 2nd ICTON Mediterranean Winter, 1-5, 2008
Masquerade attacks based on user's profile
IS Razo-Zapata, C Mex-Perera, R Monroy
Journal of Systems and Software 85 (11), 2640-2651, 2012
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers
JC Hernández, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera
IMA International Conference on Cryptography and Coding, 374-377, 2001
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 17 (7), 1573, 2017
Monitoring of water quality in a shrimp farm using a FANET
AG Orozco-Lugo, DC McLernon, M Lara, SAR Zaidi, BJ González, ...
Internet of Things, 100170, 2020
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier
AF Martínez-Herrera, C Mancillas-López, C Mex-Perera
Microprocessors and Microsystems 45, 129-140, 2016
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican international conference on informatics …, 2006
Multi-speaker voice cryptographic key generation
LP García-Perera, JC Mex-Perera, JA Nolazco-Flores
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
Transparent optical network dimensioning for self-organizing routing
G Castañón, I Razo-Zapata, J Mozo, C Mex
2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009
Cryptanalysis of a summation generator with 2-bit memory
JC Mex-Perera, SJ Shepherd
Signal processing 82 (12), 2025-2028, 2002
Using the general next bit predictor like an evaluation criteria
JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi
proceedings of NESSIE workshop, Leuven, Belgium, 2000
Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space
PL García-Perera, C Mex-Perera, JA Nolazco-Flores
International School on Neural Networks, Initiated by IIASS and EMFCSC, 370-374, 2004
Using classifiers to predict linear feedback shift registers
JC Hernández, P Isasi, JM Sierra, C Mex-Perera, B Ramos
Proceedings IEEE 35th Annual 2001 International Carnahan Conference on …, 2001
New detection paradigms to improve wireless sensor network performance under jamming attacks
C Del-Valle-Soto, C Mex-Perera, I Aldaya, F Lezama, JA Nolazco-Flores, ...
Sensors 19 (11), 2489, 2019
The system can't perform the operation now. Try again later.
Articles 1–20