Luis A. Trejo
Luis A. Trejo
Tecnologico de Monterrey
Verified email at - Homepage
TitleCited byYear
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
JB Camiña, C Hernández-Gracidas, R Monroy, L Trejo
Expert Systems with Applications 41 (3), 919-930, 2014
Towards building a masquerade detection method based on user file system navigation
B Camiña, R Monroy, LA Trejo, E Sánchez
Mexican International Conference on Artificial Intelligence, 174-186, 2011
Programming environment for phase-reconfigurable parallel programming on SuperNode
JM Adamo, L Trejo
Journal of Parallel and Distributed Computing 23 (3), 278-292, 1994
Temporal and spatial locality: An abstraction for masquerade detection
JB Camina, R Monroy, LA Trejo, MA Medina-Pérez
IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data
J Rodríguez, A Barrera-Animas, L Trejo, M Medina-Pérez, R Monroy
Sensors 16 (10), 1619, 2016
The C_NET programming environment: An overview
JM Adamo, C Bonello, L Trejo
Parallel Processing: CONPAR 92—VAPP V, 115-120, 1992
Online personal risk detection based on behavioural and physiological patterns
AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy, JB Camiña, ...
Information Sciences 384, 281-297, 2017
Mining IP to domain name interactions to detect DNS flood attacks on recursive DNS servers
R Alonso, R Monroy, L Trejo
Sensors 16 (8), 1311, 2016
Developing a high level programming environment for Supernode
JM Adamo, J Bonneville, C Bonello, P Moukeli, N Alhafez, L Trejo
Proceedings of Transputer Application-Glasgow,(UK), 632-637, 1991
Improving back-propagation: Epsilon-back-propagation
LA Trejo, C Sandoval
International Workshop on Artificial Neural Networks, 427-432, 1995
Spanning tree protocol and ethernet pause frames ddos attacks: Their efficient mitigation
LA Trejo, R Monroy, RL Monsalvo
Zitiert auf, 20, 2006
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican International Conference on Informatics …, 2006
Fitoviz: A visualisation approach for real-time risk situation awareness
A López-Cuevas, MA Medina-Pérez, R Monroy, JE Ramírez-Márquez, ...
IEEE Transactions on Affective Computing 9 (3), 372-382, 2017
Using cloud computing mapreduce operations to detect ddos attacks on dns servers
LA Trejo, R Alonso, A Ávila, R Monroy, E Sánchez, J Vázquez, M Maqueo
Proceedings of 4th Iberian Grid Infrastructure Conference, 2010
A tool for managing security policies in organisations
AV Álvarez, KA García, R Monroy, LA Trejo, J Vázquez
International Workshop on Security, 378-388, 2006
Experimenting upon the conjugate gradient algorithm within the C_NET programming environment
JM Adamo, L Trejo
LIP, 1992
Virtual Sensors for Optimal Integration of Human Activity Data
AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo
Sensors 19 (9), 2017, 2019
Towards an Efficient One-Class Classifier for Mobile Devices and Wearable Sensors on the Context of Personal Risk Detection
L Trejo, A Barrera-Animas
Sensors 18 (9), 2857, 2018
Elisa: emergency, positioning, and immediate assistance system
LA Trejo, E Sánchez, R Alonso, J Vázquez, J Cardona
X Safety, Health and Environmental World Congress Converging Towards …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20