Multi-sensor fusion for activity recognition—A survey AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo Sensors 19 (17), 3808, 2019 | 95 | 2019 |
Analyzing log files for postmortem intrusion detection KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012 | 65 | 2012 |
Choosing the best sensor fusion method: A machine-learning approach RF Brena, AA Aguileta, LA Trejo, E Molino-Minero-Re, O Mayora Sensors 20 (8), 2350, 2020 | 42 | 2020 |
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms JB Camina, C Hernández-Gracidas, R Monroy, L Trejo Expert systems with applications 41 (3), 919-930, 2014 | 38 | 2014 |
Towards building a masquerade detection method based on user file system navigation B Camiña, R Monroy, LA Trejo, E Sánchez Advances in Artificial Intelligence: 10th Mexican International Conference …, 2011 | 25 | 2011 |
Online personal risk detection based on behavioural and physiological patterns AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy, JB Camiña, ... Information Sciences 384, 281-297, 2017 | 24 | 2017 |
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data J Rodríguez, AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy Sensors 16 (10), 1619, 2016 | 24 | 2016 |
Temporal and spatial locality: an abstraction for masquerade detection JB Camiña, R Monroy, LA Trejo, MA Medina-Pérez IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016 | 24 | 2016 |
DNS-ADVP: A machine learning anomaly detection and visual platform to protect top-level domain name servers against DDoS attacks LA Trejo, V Ferman, MA Medina-Pérez, FMA Giacinti, R Monroy, ... IEEE Access 7, 116358-116369, 2019 | 21 | 2019 |
FiToViz: A visualisation approach for real-time risk situation awareness A López-Cuevas, MA Medina-Pérez, R Monroy, JE Ramirez-Marquez, ... IEEE Transactions on Affective Computing 9 (3), 372-382, 2017 | 21 | 2017 |
On the detection of low-rate denial of service attacks at transport and application layers V Vedula, P Lama, RV Boppana, LA Trejo Electronics 10 (17), 2105, 2021 | 15 | 2021 |
Programming environment for phase-reconfigurable parallel programming on SuperNode JM Adamo, L Trejo Journal of Parallel and Distributed Computing 23 (3), 278-292, 1994 | 15 | 1994 |
Mining IP to domain name interactions to detect DNS flood attacks on recursive DNS servers R Alonso, R Monroy, LA Trejo Sensors 16 (8), 1311, 2016 | 14 | 2016 |
Toward the protection of iot networks: Introducing the latam-ddos-iot dataset JG Almaraz-Rivera, JA Perez-Diaz, JA Cantoral-Ceballos, JF Botero, ... IEEE Access 10, 106909-106920, 2022 | 12 | 2022 |
Virtual sensors for optimal integration of human activity data AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo Sensors 19 (9), 2017, 2019 | 12 | 2019 |
Spanning Tree Protocol and Ethernet PAUSE Frames DDoS Attacks: Their Efficient Mitigation LA Trejo, R Monroy, RL Monsalvo Zitiert auf, 20, 2006 | 9 | 2006 |
Improving back-propagation: Epsilon-back-propagation LA Trejo, C Sandoval International Workshop on Artificial Neural Networks, 427-432, 1995 | 9 | 1995 |
The C_NET programming environment: An overview JM Adamo, C Bonello, L Trejo International Conference on Vector and Parallel Processing, 115-120, 1992 | 9 | 1992 |
Developing a high level programming environment for Supernode JM Adamo, J Bonneville, C Bonello, P Moukeli, N Alhafez, L Trejo Proceedings of Transputer Application-Glasgow,(UK), 632-637, 1991 | 8 | 1991 |
An improved non-negative matrix factorization method for masquerade detection C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo Proceedings of the 1st Mexican international conference on informatics …, 2006 | 7 | 2006 |