Carlos Mex
Cited by
Cited by
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
Mexican International Conference on Artificial Intelligence, 622-631, 2006
On the MAC/Network/Energy performance evaluation of wireless sensor networks: contrasting MPH, AODV, DSR and ZTR routing protocols
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ...
Sensors 14 (12), 22811-22847, 2014
Security in all-optical networks: Failure and attack avoidance using self-organization
G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz
2008 2nd ICTON Mediterranean Winter, 1-5, 2008
An efficient multi-parent hierarchical routing protocol for WSNs
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galván-Tejada, ...
2014 Wireless Telecommunications Symposium, 1-8, 2014
Masquerade attacks based on user's profile
INS Razo-Zapata, C Mex-Perera, RL Monroy
Journal of Systems and Software 85 (11), 2640-2651, 2012
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 15 (4), 7619-7649, 2015
Multi-speaker voice cryptographic key generation
LP Garcia-Perera, JC Mex-Perera, JA Nolazco-Flores
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers
JC Hernández, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera
IMA International Conference on Cryptography and Coding, 374-377, 2001
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 17 (7), 1573, 2017
Transparent optical network dimensioning for self-organizing routing
G Castañón, I Razo-Zapata, J Mozo, C Mex
2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009
Cryptanalysis of a summation generator with 2-bit memory
JC Mex-Perera, SJ Shepherd
Signal processing 82 (12), 2025-2028, 2002
Using the general next bit predictor like an evaluation criteria
JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi
proceedings of NESSIE workshop, Leuven, Belgium, 2000
Wireless Sensor Network Energy Model and Its Use in the Optimization of Routing Protocols
C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Velázquez, ...
Energies 13 (3), 728, 2020
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican International Conference on Informatics …, 2006
Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space
PL García-Perera, C Mex-Perera, JA Nolazco-Flores
International School on Neural Networks, Initiated by IIASS and EMFCSC, 370-374, 2004
Using classifiers to predict linear feedback shift registers
JC Hernández, P Isasi, JM Sierra, C Mex-Perera, B Ramos
Proceedings IEEE 35th Annual 2001 International Carnahan Conference on …, 2001
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier
AF Martínez-Herrera, C Mancillas-López, C Mex-Perera
Microprocessors and Microsystems 45, 129-140, 2016
Cml-wsn: A configurable multi-layer wireless sensor network simulator
C Del-Valle-Soto, F Lezama, J Rodriguez, C Mex-Perera, EM de Cote
Applications for Future Internet, 91-102, 2017
Lightpath requests processing in flexible packet switching optical networks using reinforcement learning
IS Razo-Zapata, G Castañon, C Mex-Perera
2013 15th International Conference on Transparent Optical Networks (ICTON), 1-4, 2013
The system can't perform the operation now. Try again later.
Articles 1–20