Carlos Mex

Profile Picture of Carlos Mex
Title
Assistant Professor
Institution
Rochester Institute of Technology

Education

Not mentioned yet.

Research Interests

Wireless Sensor Network Energy Model   Performance Metrics   Cybersecurity  

  View all research interests

Biography

Not mentioned yet

Homepages

Contact Information

Not mentioned yet.
Research
Not mentioned yet. (?)
List of Publications (45)
In 2022
45

Monitoring of water quality in a shrimp farm using a FANET. AG Orozco-Lugo, DC McLernon, M Lara, SAR Zaidi, BJ Gonza lez, ... Internet of Things 18, 100170, 2022.

Found on Publication Page
In 2021
44

The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis. AF Marti nez-Herrera, C Mex-Perera, C Mancillas-Lo pez, C Del-Valle-Soto, ... Computers & Electrical Engineering 94, 107311, 2021.

Found on Publication Page
43

A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, A Rodri guez, ... Sensors 21 (4), 1179, 2021.

Found on Publication Page
In 2020
42

Wireless sensor network energy model and its use in the optimization of routing protocols. C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Vela zquez, ... Energies 13 (3), 728, 2020.

Found on Publication Page
In 2019
41

New detection paradigms to improve wireless sensor network performance under jamming attacks. C Del-Valle-Soto, C Mex-Perera, I Aldaya, F Lezama, JA Nolazco-Flores, ... Sensors 19 (11), 2489, 2019.

Found on Publication Page
In 2018
40

Monitoring a Grid of Sensors by Performance Metrics for Internet of Things Applications. C Del-Valle-Soto, C Mex-Perera, J Rodriguez SMART ACCESSIBILITY 2018, 72-77, 2018.

Found on Publication Page
In 2017
39

Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach. IS Razo-Zapata, G Castan o n, C Mex-Perera Photonic Network Communications 34 (3), 307-322, 2017.

Found on Publication Page
38

MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks. C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 17 (7), 1573, 2017.

Found on Publication Page
37

CML-WSN: a configurable multi-layer wireless sensor network simulator. C Del-Valle-Soto, F Lezama, J Rodriguez, C Mex-Perera, EM Cote Applications for Future Internet, 91-102, 2017.

Found on Publication Page
In 2016
36

GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier. AF Marti nez-Herrera, C Mancillas-Lo pez, C Mex-Perera Microprocessors and Microsystems 45, 129-140, 2016.

Found on Publication Page
In 2015
35

On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks. C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 15 (4), 7619-7649, 2015.

Found on Publication Page
34

Merging the Camellia, SMS4 and AES S-Boxes in a single S-Box with composite bases. AF Marti nez-Herrera, C Mex-Perera, J Nolazco-Flores Information Security, 209-217, 2015.

Found on Publication Page
In 2014
33

On the MAC/Network/Energy performance evaluation of wireless sensor networks: Contrasting MPH, AODV, DSR and ZTR routing protocols. C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ... Sensors 14 (12), 22811-22847, 2014.

Found on Publication Page
32

An efficient multi-parent hierarchical routing protocol for WSNs. C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galva n-Tejada, ... 2014 Wireless Telecommunications Symposium, 1-8, 2014.

Found on Publication Page
31

Self-healing in transparent optical packet switching mesh networks: A reinforcement learning perspective. IS Razo-Zapata, G Castan o n, C Mex-Perera Computer Networks 60, 129-146, 2014.

Found on Publication Page
In 2013
30

Lightpath requests processing in flexible packet switching optical networks using reinforcement learning. IS Razo-Zapata, G Castan on, C Mex-Perera 2013 15th International Conference on Transparent Optical Networks (ICTON), 1-4, 2013.

Found on Publication Page
In 2012
29

Analyzing log files for postmortem intrusion detection. KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and ..., 2012.

Found on Publication Page
28

Some Representations of the S-Box of Camellia in GF(((22)2)2). AF Marti nez-Herrera, JC Mex-Perera, JA Nolazco-Flores International Conference on Cryptology and Network Security, 296-309, 2012.

Found on Publication Page
27

Masquerade attacks based on user's profile. IS Razo-Zapata, C Mex-Perera, R Monroy Journal of Systems and Software 85 (11), 2640-2651, 2012.

Found on Publication Page
26

Self-Healing on Transparent Optical Packet Switching Mesh Networks. IS Razo-Zapata, G Castan o n, C Mex-Perera .

Found on Publication Page
25

Self-healing on Transparent Optical Packet Switching Mesh Networks: Overcoming Failures and Attacks. IS Razo-Zapata, G Castan o n, C Mex-Perera Resilient Optical Network Design: Advances in Fault-Tolerant Methodologies ..., 2012.

Found on Publication Page
In 2011
24

On self-healing for transparent optical packet switching networks: An approach to security. IS Razo-Zapata, G Castano n, C Mex-Perera 15th International Conference on Optical Network Design and Modeling-ONDM ..., 2011.

Found on Publication Page
In 2010
23

Resource allocation for contention-resolution strategies in OPS. C Mex-Perera, J Mozo-Olea, G Castan o n, I Razo-Zapata 2010 12th International Conference on Transparent Optical Networks, 1-4, 2010.

Found on Publication Page
In 2009
22

Transparent optical network dimensioning for self-organizing routing. G Castan o n, I Razo-Zapata, J Mozo, C Mex 2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009.

Found on Publication Page
In 2008
21

Security in all-optical networks: Failure and attack avoidance using self-organization. G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz 2008 2nd ICTON Mediterranean Winter, 1-5, 2008.

Found on Publication Page
20

Towards an Emergency Domain Name System based on a peer-to-peer network. CMP C Del Valle-Soto, Razo-Zapata Research in Computing Science 39, 2008.

Found on Publication Page
In 2006
19

Hybrid method for detecting masqueraders using session folding and hidden markov models. R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores Mexican International Conference on Artificial Intelligence, 622-631, 2006.

Found on Publication Page
18

On the Timely Detection of Mimicry Attacks. R Monroy, R Go mez, N Sa nchez, L Trejo Departamento deficiencias computacionales, Campus Estado de Me xico del ..., 2006.

Found on Publication Page
17

An improved non-negative matrix factorization method for masquerade detection. C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo Proceedings of the 1st Mexican international conference on informatics ..., 2006.

Found on Publication Page
In 2005
16

Phoneme spotting for speech-based crypto-key generation. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera Iberoamerican Congress on Pattern Recognition, 770-777, 2005.

Found on Publication Page
15

Cryptographic-speech-key generation architecture improvements. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera Iberian Conference on Pattern Recognition and Image Analysis, 579-585, 2005.

Found on Publication Page
14

Parameter optimization in a text-dependent cryptographic-speech-key generation task. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera International Conference on Nonlinear Analyses and Algorithms for Speech ..., 2005.

Found on Publication Page
13

Multi-speaker voice cryptographic key generation. LP Garci a-Perera, JC Mex-Perera, JA Nolazco-Flores The 3rd ACS/IEEE International Conference onComputer Systems and ..., 2005.

Found on Publication Page
12

A phoneme-space-representation heuristic to improve the performance in a cryptographic-speech-key generation task. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera ISCA Tutorial and Research Workshop (ITRW) on Non-Linear Speech Processing, 2005.

Found on Publication Page
In 2004
11

Instituto Tecnol* ogico y de Estudios Superiores de Monterrey Campus Monterrey Graduate Program in Computing, Information and Communications. R Monroy, D Hutter, L Giles, JA Nolazco, C Mex, DAG Salazar Computing, 2004.

Found on Publication Page
10

SVM applied to the generation of biometric speech key. LP Garci a-Perera, C Mex-Perera, JA Nolazco-Flores Iberoamerican Congress on Pattern Recognition, 637-644, 2004.

Found on Publication Page
9

Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space. PL Garci a-Perera, C Mex-Perera, JA Nolazco-Flores International School on Neural Networks, Initiated by IIASS and EMFCSC, 370-374, 2004.

Found on Publication Page
In 2003
8

Distinguishing TEA from a Random Permutation. JC Herna ndez, JM Sierra, A Ribagorda, B Ramos Cryptography and Coding: 8th IMA International Conference Cirencester, UK ..., 2003.

Found on Publication Page
7

Characterization of Eban Numbers. JC Hernandez, C Mex-Perera, SJ Shepherd JOURNAL OF RECREATIONAL MATHEMATICS 31 (3), 197-200, 2003.

Found on Publication Page
In 2002
6

Cryptanalysis of a summation generator with 2-bit memory. JC Mex-Perera, SJ Shepherd Signal processing 82 (12), 2025-2028, 2002.

Found on Publication Page
In 2001
5

Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers. JC Herna ndez, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera IMA International Conference on Cryptography and Coding, 374-377, 2001.

Found on Publication Page
4

Using classifiers to predict linear feedback shift registers. JC Herna ndez, P Isasi, JM Sierra, C Mex-Perera, B Ramos Proceedings IEEE 35th Annual 2001 International Carnahan Conference on ..., 2001.

Found on Publication Page
In 2000
3

Using the general next bit predictor like an evaluation criteria. JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi proceedings of NESSIE workshop, Leuven, Belgium, 2000.

Found on Publication Page
Unspecified
2

Intrusion Detection for Mobile Ad-Hoc Networks Based on a Non-Negative Matrix Factorization Method. CMPJ Zamora-Elizondo, R Monroy Advances in Artificial Intelligence: Algorithms and Applications, 131, 0.

Found on Publication Page
1

Forensic Intrusion Detection on System Logs. KA Garc a-Gamboa, E Aguirre-Bermudez, R Monroy, C Mex-Perera .

Found on Publication Page
Search Profiles
Colleagues
Profile Picture of Hwan Shim
Rochester Institute of Technology
Profile Picture of Elise Adams
Rochester Institute of Technology
Profile Picture of Elliot Reza Emadian
Rochester Institute of Technology
People Also Viewed
Profile Picture of Michael Smith
University of Illinois Urbana-Champaign
Profile Picture of Jerrie Hsieh
Rochester Institute of Technology
Recommended Grants