Follow
Carlos Mex
Title
Cited by
Cited by
Year
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
652012
Wireless sensor network energy model and its use in the optimization of routing protocols
C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Velázquez, ...
Energies 13 (3), 728, 2020
642020
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
MICAI 2006: Advances in Artificial Intelligence: 5th Mexican International …, 2006
392006
Monitoring of water quality in a shrimp farm using a FANET
AG Orozco-Lugo, DC McLernon, M Lara, SAR Zaidi, BJ González, ...
Internet of Things 18, 100170, 2022
322022
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 15 (4), 7619-7649, 2015
282015
On the MAC/Network/Energy performance evaluation of wireless sensor networks: Contrasting MPH, AODV, DSR and ZTR routing protocols
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ...
Sensors 14 (12), 22811-22847, 2014
242014
An efficient multi-parent hierarchical routing protocol for WSNs
C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galvan-Tejada, ...
2014 Wireless Telecommunications Symposium, 1-8, 2014
192014
Security in all-optical networks: Failure and attack avoidance using self-organization
G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz
2008 2nd ICTON Mediterranean Winter, 1-5, 2008
152008
A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks
C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, A Rodríguez, ...
Sensors 21 (4), 1179, 2021
142021
Masquerade attacks based on user's profile
IS Razo-Zapata, C Mex-Perera, R Monroy
Journal of Systems and Software 85 (11), 2640-2651, 2012
142012
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 17 (7), 1573, 2017
132017
Some Representations of the S-Box of Camellia in GF(((22)2)2)
AF Martínez-Herrera, JC Mex-Perera, JA Nolazco-Flores
Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012
112012
Merging the camellia, SMS4 and AES s-boxes in a single s-box with composite bases
AF Martínez-Herrera, C Mex-Perera, J Nolazco-Flores
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
92015
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier
AF Martínez-Herrera, C Mancillas-López, C Mex-Perera
Microprocessors and Microsystems 45, 129-140, 2016
82016
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers
JC Hernández, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera
Cryptography and Coding: 8th IMA International Conference Cirencester, UK …, 2001
82001
Using the general next bit predictor like an evaluation criteria
JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi
proceedings of NESSIE workshop, Leuven, Belgium, 2000
82000
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican international conference on informatics …, 2006
72006
Multi-speaker voice cryptographic key generation
LP García-Perera, JC Mex-Perera, JA Nolazco-Flores
The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005
72005
New detection paradigms to improve wireless sensor network performance under jamming attacks
C Del-Valle-Soto, C Mex-Perera, I Aldaya, F Lezama, JA Nolazco-Flores, ...
Sensors 19 (11), 2489, 2019
62019
Transparent optical network dimensioning for self-organizing routing
G Castañón, I Razo-Zapata, J Mozo, C Mex
2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009
62009
The system can't perform the operation now. Try again later.
Articles 1–20