Seguir
Juan Manuel García García
Juan Manuel García García
instituto tecnologico de Morelia
Dirección de correo verificada de acm.org
Título
Citado por
Citado por
Año
A survey of migration mechanisms of virtual machines
V Medina, JM García
ACM Computing Surveys (CSUR) 46 (3), 1-33, 2014
1952014
A fixed-point algorithm to estimate the Yule–Simon distribution parameter
JMG Garcia
Applied Mathematics and Computation 217 (21), 8560-8566, 2011
252011
Parallel algorithm for multiplication on elliptic curves
JMG Garcia, RM Garcia
Cryptology ePrint Archive, 2002
152002
Network anomaly detection by continuous hidden markov models: An evolutionary programming approach
JJ Flores, F Calderon, A Antolino, JM Garcia
Intelligent Data Analysis 19 (2), 391-412, 2015
92015
Evolving HMMs For Network Anomaly Detection–Learning Through Evolutionary Computation
JJ Flores, A Antolino, JM Garcia
2010 Sixth International Conference on Networking and Services, 271-276, 2010
72010
Evolving hidden Markov models for network anomaly detection
JJ Flores, A Antolino, JM Garcia
Sixth International Conference on Networking and Services (ICNS), 2010
62010
Hybrid network anomaly detection–learning hmms through evolutionary computation
JJ Flores, A Antolino, JM Garcia, FC Solorio
iConcept Press Ltd, 2012
52012
Workload hidden markov model for anomaly detection
JM Garcia, T Navarrete, C Orozco
International Conference on Security and Cryptography 2, 56-60, 2006
52006
An Architecture for Systematic Administration of SELinux Policies in Distributed Environments
PC Lugo, JJ Flores, JMG Garcia
International Journal of Computers and Communications 1 (4), 127-135, 2007
42007
Discrete fuzzy transform applied to computer anomaly detection
JMG Garcia
2011 Annual Meeting of the North American Fuzzy Information Processing …, 2011
32011
A system for distributed SELinux policy management
PC Lugo, JMG Garcia, JJ Flores
2009 Third International Conference on Network and System Security, 254-261, 2009
32009
Detección de anomalıas en la carga de un procesador, utilizando modelos ocultos de markov
T Navarrete, JM Garcıa
Instituto Tecnológico de Morelia 1, 2004
32004
Análisis y control de riesgos de seguridad informática: control adaptativo
JM García
Extraído desde 9 (01), 2014, 2008
12008
Quantum Cryptoanalysis of Elliptic Curve Systems
JM Garcia, R Menchaca
Computación y Sistemas 4 (3), 242-248, 2001
12001
Live replication of virtual machines
V Medina, JM García
Proceedings of the 10th WSEAS international conference on Software …, 2011
2011
An algorithm to fill out a bloc with pseudorandom binary data
JMG Garcia
Proceedings of the 4th WSEAS international conference on Computer …, 2010
2010
A Network Isolation Analysis in Xen y
MCVM Rios, JMG García
2009
A specification language for information security policies
JMG Garcia
Proceedings of the international conference on Computational and information …, 2009
2009
Security architecture for a systematic administration of SELinux policies in distributed environments
PC Lugo, JJ Flores, JMG Garcia
Proceedings of the 7th conference on Data networks, communications …, 2008
2008
Intrusion Risk Analysis and the Power Law Distribution of Attacks.
JMG Garcia
WOSIS, 47-52, 2004
2004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20