Wireless sensor network energy model and its use in the optimization of routing protocols C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Velázquez, ... Energies 13 (3), 728, 2020 | 83 | 2020 |
Analyzing log files for postmortem intrusion detection KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012 | 69 | 2012 |
Monitoring of water quality in a shrimp farm using a FANET AG Orozco-Lugo, DC McLernon, M Lara, SAR Zaidi, BJ González, ... Internet of Things 18, 100170, 2022 | 53 | 2022 |
Hybrid method for detecting masqueraders using session folding and hidden markov models R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores MICAI 2006: Advances in Artificial Intelligence: 5th Mexican International …, 2006 | 40 | 2006 |
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 15 (4), 7619-7649, 2015 | 29 | 2015 |
On the MAC/Network/Energy performance evaluation of wireless sensor networks: Contrasting MPH, AODV, DSR and ZTR routing protocols C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ... Sensors 14 (12), 22811-22847, 2014 | 25 | 2014 |
An efficient multi-parent hierarchical routing protocol for WSNs C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galvan-Tejada, ... 2014 Wireless Telecommunications Symposium, 1-8, 2014 | 20 | 2014 |
A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, A Rodríguez, ... Sensors 21 (4), 1179, 2021 | 16 | 2021 |
Masquerade attacks based on user's profile IS Razo-Zapata, C Mex-Perera, R Monroy Journal of Systems and Software 85 (11), 2640-2651, 2012 | 14 | 2012 |
Security in all-optical networks: Failure and attack avoidance using self-organization G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz 2008 2nd ICTON Mediterranean Winter, 1-5, 2008 | 14 | 2008 |
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 17 (7), 1573, 2017 | 13 | 2017 |
Some Representations of the S-Box of Camellia in GF(((22)2)2) AF Martínez-Herrera, JC Mex-Perera, JA Nolazco-Flores Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012 | 11 | 2012 |
Merging the camellia, SMS4 and AES s-boxes in a single s-box with composite bases AF Martínez-Herrera, C Mex-Perera, J Nolazco-Flores Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015 | 9 | 2015 |
New detection paradigms to improve wireless sensor network performance under jamming attacks C Del-Valle-Soto, C Mex-Perera, I Aldaya, F Lezama, JA Nolazco-Flores, ... Sensors 19 (11), 2489, 2019 | 8 | 2019 |
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier AF Martínez-Herrera, C Mancillas-López, C Mex-Perera Microprocessors and Microsystems 45, 129-140, 2016 | 8 | 2016 |
Using the general next bit predictor like an evaluation criteria JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi proceedings of NESSIE workshop, Leuven, Belgium, 2000 | 8 | 2000 |
An improved non-negative matrix factorization method for masquerade detection C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo Proceedings of the 1st Mexican international conference on informatics …, 2006 | 7 | 2006 |
Multi-speaker voice cryptographic key generation LP García-Perera, JC Mex-Perera, JA Nolazco-Flores The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005 | 7 | 2005 |
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers JC Hernández, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera Cryptography and Coding: 8th IMA International Conference Cirencester, UK …, 2001 | 7 | 2001 |
Transparent optical network dimensioning for self-organizing routing G Castañón, I Razo-Zapata, J Mozo, C Mex 2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009 | 6 | 2009 |