Raul Monroy
Raul Monroy
Professor of Computer Science, Tecnologico de Monterrey, Campus Estado de Mexico
Dirección de correo verificada de tec.mx - Página principal
Citado por
Citado por
Planning exploration strategies for simultaneous localization and mapping
B Tovar, L Muñoz-Gómez, R Murrieta-Cid, M Alencastre-Miranda, ...
Robotics and Autonomous Systems 54 (4), 314-331, 2006
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
A complexity result for the pursuit-evasion game of maintaining visibility of a moving evader
R Murrieta-Cid, R Monroy, S Hutchinson, JP Laumond
2008 IEEE International Conference on Robotics and Automation, 2657-2664, 2008
PBC4cip: A new contrast pattern-based classifier for class imbalance problems
O Loyola-González, MA Medina-Pérez, JF Martínez-Trinidad, ...
Knowledge-Based Systems 115, 100-109, 2017
Web attack detection using ID3
VH Garcia, R Monroy, M Quintana
IFIP World Computer Congress, TC 12, 323-332, 2006
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
Mexican International Conference on Artificial Intelligence, 622-631, 2006
Proof plans for the correction of false conjectures
R Monroy, A Bundy, A Ireland
International Conference on Logic for Programming Artificial Intelligence …, 1994
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
JB Camiña, C Hernández-Gracidas, R Monroy, L Trejo
Expert systems with applications 41 (3), 919-930, 2014
Formal support to security protocol development: A survey
JCL Pimentel, R Monroy
Computación y Sistemas 12 (1), 89-108, 2008
Bagging-TPMiner: A classifier ensemble for masquerader detection based on typical objects
MA Medina-Pérez, R Monroy, JB Camiña, M García-Borroto
Soft Computing 21 (3), 557-569, 2017
Towards a masquerade detection system based on user’s tasks
JB Camina, J Rodríguez, R Monroy
International Workshop on Recent Advances in Intrusion Detection, 447-465, 2014
A method for patching interleaving-replay attacks in faulty security protocols
JCL Pimentel, R Monroy, D Hutter
Electronic Notes in Theoretical Computer Science 174 (4), 117-130, 2007
Towards building a masquerade detection method based on user file system navigation
B Camiña, R Monroy, LA Trejo, E Sánchez
Mexican International Conference on Artificial Intelligence, 174-186, 2011
Temporal and spatial locality: An abstraction for masquerade detection
JB Camina, R Monroy, LA Trejo, MA Medina-Pérez
IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data
J Rodríguez, AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy
Sensors 16 (10), 1619, 2016
Proof-directed debugging and repair
LA Dennis, R Monroy, P Nogueira
Seventh Symposium on Trends in Functional Programming 2006, 131-140, 2006
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.
D Valdes-Ramirez, MA Medina-Pérez, R Monroy, O Loyola-González, ...
IEEE Access 7, 48484-48499, 2019
Cluster validation using an ensemble of supervised classifiers
J Rodríguez, MA Medina-Pérez, AE Gutierrez-Rodríguez, R Monroy, ...
Knowledge-Based Systems 145, 134-144, 2018
Online personal risk detection based on behavioural and physiological patterns
AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy, JB Camiña, ...
Information Sciences 384, 281-297, 2017
Masquerade attacks based on user's profile
INS Razo-Zapata, C Mex-Perera, RL Monroy
Journal of Systems and Software 85 (11), 2640-2651, 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20