Luis A. Trejo
Luis A. Trejo
Tecnologico de Monterrey
Verified email at tec.mx - Homepage
Title
Cited by
Cited by
Year
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
502012
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
JB Camiña, C Hernández-Gracidas, R Monroy, L Trejo
Expert systems with applications 41 (3), 919-930, 2014
212014
Temporal and spatial locality: An abstraction for masquerade detection
JB Camina, R Monroy, LA Trejo, MA Medina-Pérez
IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016
172016
Towards building a masquerade detection method based on user file system navigation
B Camiña, R Monroy, LA Trejo, E Sánchez
Mexican International Conference on Artificial Intelligence, 174-186, 2011
172011
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data
J Rodríguez, AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy
Sensors 16 (10), 1619, 2016
162016
Online personal risk detection based on behavioural and physiological patterns
AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy, JB Camiña, ...
Information Sciences 384, 281-297, 2017
132017
Programming environment for phase-reconfigurable parallel programming on supernode
JM Adamo, L Trejo
Journal of Parallel and Distributed Computing 23 (3), 278-292, 1994
121994
Improving back-propagation: Epsilon-back-propagation
LA Trejo, C Sandoval
International Workshop on Artificial Neural Networks, 427-432, 1995
91995
The C_NET programming environment: An overview
JM Adamo, C Bonello, L Trejo
Parallel Processing: CONPAR 92—VAPP V, 115-120, 1992
91992
Developing a high level programming environment for Supernode
JM Adamo, J Bonneville, C Bonello, P Moukeli, N Alhafez, L Trejo
Proceedings of Transputer Application-Glasgow,(UK), 632-637, 1991
81991
Fitoviz: A visualisation approach for real-time risk situation awareness
A López-Cuevas, MA Medina-Pérez, R Monroy, JE Ramirez-Marquez, ...
IEEE Transactions on Affective Computing 9 (3), 372-382, 2017
72017
Mining IP to domain name interactions to detect DNS flood attacks on recursive DNS servers
R Alonso, R Monroy, LA Trejo
Sensors 16 (8), 1311, 2016
72016
Spanning tree protocol and ethernet pause frames ddos attacks: Their efficient mitigation
LA Trejo, R Monroy, RL Monsalvo
Zitiert auf, 20, 2006
72006
Multi-Sensor Fusion for Activity Recognition—A Survey
AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo
Sensors 19 (17), 3808, 2019
62019
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican International Conference on Informatics …, 2006
52006
Using cloud computing mapreduce operations to detect ddos attacks on dns servers
LA Trejo, R Alonso, A Ávila, R Monroy, E Sánchez, J Vázquez, M Maqueo
4th Iberian Grid Infrastructure Conference, IBERGRID, 2010
42010
Towards an efficient one-class classifier for mobile devices and wearable sensors on the context of personal risk detection
LA Trejo, AY Barrera-Animas
Sensors 18 (9), 2857, 2018
32018
Virtual Sensors for Optimal Integration of Human Activity Data
AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo
Sensors 19 (9), 2017, 2019
22019
A tool for managing security policies in organisations
AV Álvarez, KA García, R Monroy, LA Trejo, J Vázquez
International Workshop on Security, 378-388, 2006
22006
Experimenting upon the conjugate gradient algorithm within the C_NET programming environment
JM Adamo, L Trejo
LIP, 1992
21992
The system can't perform the operation now. Try again later.
Articles 1–20