Mobile personal health monitoring for automated classification of electrocardiogram signals in elderly LJ Mena, VG Félix, A Ochoa, R Ostos, E González, J Aspuru, P Velarde, ... Computational and mathematical methods in medicine 2018 (1), 9128054, 2018 | 42 | 2018 |
PEAL: Power efficient and adaptive latency hierarchical routing protocol for cluster-based WSN F Hidoussi, H Toral-Cruz, DE Boubiche, R Martínez-Peláez, ... Wireless Personal Communications 96, 4929-4945, 2017 | 31 | 2017 |
Classification of network anomalies in flow level network traffic using Bayesian networks MJ Vargas-Muñoz, R Martínez-Peláez, P Velarde-Alvarado, ... 2018 International Conference on Electronics, Communications and Computers …, 2018 | 27 | 2018 |
Detecting anomalies in network traffic using the method of remaining elements P Velarde-Alvarado, C Vargas-Rosales, D Torres-Roman, ... IEEE Communications Letters 13 (6), 462-464, 2009 | 20 | 2009 |
An unsupervised approach for traffic trace sanitization based on the entropy spaces P Velarde-Alvarado, C Vargas-Rosales, R Martinez-Pelaez, H Toral-Cruz, ... Telecommunication Systems 61, 609-626, 2016 | 16 | 2016 |
P2PM-pay: Person to person mobile payment scheme controlled by expiration date R Martínez-Peláez, H Toral-Cruz, J Ruiz, P Velarde-Alvarado Wireless Personal Communications 85, 289-304, 2015 | 12 | 2015 |
Detecting anomalies in network traffic using Entropy and Mahalanobis distance J Santiago-Paz, D Torres-Roman, P Velarde-Alvarado CONIELECOMP 2012, 22nd International Conference on Electrical Communications …, 2012 | 10 | 2012 |
Entropy based analysis of worm attacks in a local network P Velarde-Alvarado, C Vargas-Rosales, D Torres-Román, ... Research in Computing Science 34, 225-235, 2008 | 7 | 2008 |
Entropy-based profiles for intrusion detection in LAN traffic P Velarde-Alvarado, C Vargas-Rosales, D Torres-Román, ... Advances in Artificial Intelligence: Algorithms and Applications, Research …, 2008 | 7 | 2008 |
A novel framework for generating personalized network datasets for nids based on traffic aggregation P Velarde-Alvarado, H Gonzalez, R Martínez-Peláez, LJ Mena, ... Sensors 22 (5), 1847, 2022 | 6 | 2022 |
Information theory and data-mining techniques for network traffic profiling for intrusion detection P Velarde-Alvarado, R Martinez-Pelaez, J Ruiz-Ibarra, V Morales-Rocha Journal of Computer and Communications 2 (11), 24-30, 2014 | 6 | 2014 |
Evaluación de firewalls basados en software libre A Iriarte, P Velarde, A Aguirre, LJ Mena, R Martínez, AM Ochoa Pistas Educativas 130 (40), 2018 | 5 | 2018 |
Security improvement of two dynamic ID-based authentication schemes by Sood-Sarje-Singh R Martínez-Pelaez, F Rico-Novella, J Forné, P Velarde-Alvarado Journal of applied research and technology 11 (5), 755-763, 2013 | 5 | 2013 |
Entropy and flow-based approach for anomalous traffic filtering R Zempoaltecatl-Piedras, P Velarde-Alvarado, D Torres-Roman Procedia Technology 7, 360-369, 2013 | 4 | 2013 |
My personal images as my graphical password PAS Valles, JG Villalobos-Serrano, R Martínez-Peláez, V García, ... IEEE Latin America Transactions 16 (5), 1516-1523, 2018 | 3 | 2018 |
Cryptanalysis and improvement of Chen-Hsiang-Shih's remote user authentication scheme using smart cards R Martínez-Peláez, F Rico-Novella, P Velarde-Alvarado Revista Facultad de Ingeniería Universidad de Antioquia, 27-35, 2013 | 2 | 2013 |
Privacy, Intrusion Detection, and Response P Kabiri IGI Global, 2012 | 2 | 2012 |
Using entropy spaces and mixtures of gaussian distributions to characterize traffic anomalies P Velarde-Alvarado, AF Martínez-Herrera, A Iriarte-Solis Procedia Technology 3, 97-108, 2012 | 2 | 2012 |
An Architecture for Intrusion Detection Based on an Extension of the Method of Remaining Elements P Velarde-Alvarado, C Vargas-Rosales, D Torres-Roman, ... Journal of applied research and technology 8 (2), 159-174, 2010 | 2 | 2010 |
FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences J Portillo-Portillo, G Sanchez-Perez, LK Toscano-Medina, ... Entropy 24 (7), 942, 2022 | 1 | 2022 |