Carlos Mex
TitleCited byYear
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
Mexican International Conference on Artificial Intelligence, 622-631, 2006
Masquerade attacks based on user's profile
INS Razo-Zapata, C Mex-Perera, RL Monroy
Journal of Systems and Software 85 (11), 2640-2651, 2012
On the MAC/Network/Energy performance evaluation of wireless sensor networks: contrasting MPH, AODV, DSR and ZTR routing protocols
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ...
Sensors 14 (12), 22811-22847, 2014
An efficient multi-parent hierarchical routing protocol for WSNs
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galván-Tejada, ...
2014 Wireless Telecommunications Symposium, 1-8, 2014
Security in all-optical networks: Failure and attack avoidance using self-organization
G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz
2008 2nd ICTON Mediterranean Winter, 1-5, 2008
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, J Nolazco-Flores
Sensors 15 (4), 7619-7649, 2015
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers
JC Hernández, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera
IMA International Conference on Cryptography and Coding, 374-377, 2001
Transparent optical network dimensioning for self-organizing routing
G Castañón, I Razo-Zapata, J Mozo, C Mex
2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009
Cryptanalysis of a summation generator with 2-bit memory
JC Mex-Perera, SJ Shepherd
Signal processing 82 (12), 2025-2028, 2002
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, J Nolazco-Flores
Sensors 17 (7), 1573, 2017
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican International Conference on Informatics …, 2006
Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space
PL García-Perera, C Mex-Perera, JA Nolazco-Flores
International School on Neural Networks, Initiated by IIASS and EMFCSC, 370-374, 2004
Cml-wsn: A configurable multi-layer wireless sensor network simulator
C Del-Valle-Soto, F Lezama, J Rodriguez, C Mex-Perera, EM de Cote
Applications for Future Internet, 91-102, 2017
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier
AF Martínez-Herrera, C Mancillas-López, C Mex-Perera
Microprocessors and Microsystems 45, 129-140, 2016
Cryptographic-speech-key generation architecture improvements
LP García-Perera, JA Nolazco-Flores, C Mex-Perera
Iberian Conference on Pattern Recognition and Image Analysis, 579-585, 2005
SVM applied to the generation of biometric speech key
LP García-Perera, C Mex-Perera, JA Nolazco-Flores
Iberoamerican Congress on Pattern Recognition, 637-644, 2004
Lightpath requests processing in flexible packet switching optical networks using reinforcement learning
IS Razo-Zapata, G Castañon, C Mex-Perera
2013 15th International Conference on Transparent Optical Networks (ICTON), 1-4, 2013
On self-healing for transparent optical packet switching networks: An approach to security
IS Razo-Zapata, G Castanón, C Mex-Perera
15th International Conference on Optical Network Design and Modeling-ONDM …, 2011
Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases
AF Martínez-Herrera, C Mex-Perera, J Nolazco-Flores
Information Security, 209-217, 2015
The system can't perform the operation now. Try again later.
Articles 1–20