Research
Wireless Sensor Network Energy Model
Performance Metrics
Cybersecurity
Internet of Things
Machine Learning
Intrusion Detection
Jamming Attacks
GCM Implementations
Forensic Intrusion
Mobile Ad Hoc Networks
System Logs
Water Quality
Detection Approach
Low Cost
Side Channel Analysis
Sub Key Distinguisher
New Detection Paradigms
Wireless Sensor Network Performance
Configurable Multi Layer
Providing Traffic Tolerance
Wireless Sensor Network Simulator
Reinforcement Learning Perspective
Self Healing
Composite Bases
Protocol Influence
Efficient Multi Parent
Contention Resolution Strategies
Mesh Networks
Transparent Optical Network
Self Organizing Routing
Analyzing Log Files
Overcoming Failures
Attack Avoidance
Emergency Domain
Hybrid Method
Timely Detection
Crypto Key Generation
Cryptographic Key Generation
Parameter Optimization
Evaluation Criteria
Random Numbers
Reduced Round Versions
List of Publications (45)
In 2022
45
Monitoring of water quality in a shrimp farm using a FANET. AG Orozco-Lugo, DC McLernon, M Lara, SAR Zaidi, BJ Gonza lez, ... Internet of Things 18, 100170, 2022.
Found on Publication Page
In 2021
44
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis. AF Marti nez-Herrera, C Mex-Perera, C Mancillas-Lo pez, C Del-Valle-Soto, ... Computers & Electrical Engineering 94, 107311, 2021.
Found on Publication Page
43
A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, A Rodri guez, ... Sensors 21 (4), 1179, 2021.
Found on Publication Page
In 2020
42
Wireless sensor network energy model and its use in the optimization of routing protocols. C Del-Valle-Soto, C Mex-Perera, JA Nolazco-Flores, R Vela zquez, ... Energies 13 (3), 728, 2020.
Found on Publication Page
In 2019
41
New detection paradigms to improve wireless sensor network performance under jamming attacks. C Del-Valle-Soto, C Mex-Perera, I Aldaya, F Lezama, JA Nolazco-Flores, ... Sensors 19 (11), 2489, 2019.
Found on Publication Page
In 2018
40
Monitoring a Grid of Sensors by Performance Metrics for Internet of Things Applications. C Del-Valle-Soto, C Mex-Perera, J Rodriguez SMART ACCESSIBILITY 2018, 72-77, 2018.
Found on Publication Page
In 2017
39
Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach. IS Razo-Zapata, G Castan o n, C Mex-Perera Photonic Network Communications 34 (3), 307-322, 2017.
Found on Publication Page
38
MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks. C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 17 (7), 1573, 2017.
Found on Publication Page
37
CML-WSN: a configurable multi-layer wireless sensor network simulator. C Del-Valle-Soto, F Lezama, J Rodriguez, C Mex-Perera, EM Cote Applications for Future Internet, 91-102, 2017.
Found on Publication Page
In 2016
36
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier. AF Marti nez-Herrera, C Mancillas-Lo pez, C Mex-Perera Microprocessors and Microsystems 45, 129-140, 2016.
Found on Publication Page
In 2015
35
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks. C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 15 (4), 7619-7649, 2015.
Found on Publication Page
34
Merging the Camellia, SMS4 and AES S-Boxes in a single S-Box with composite bases. AF Marti nez-Herrera, C Mex-Perera, J Nolazco-Flores Information Security, 209-217, 2015.
Found on Publication Page
In 2014
33
On the MAC/Network/Energy performance evaluation of wireless sensor networks: Contrasting MPH, AODV, DSR and ZTR routing protocols. C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, M Lara, ... Sensors 14 (12), 22811-22847, 2014.
Found on Publication Page
32
An efficient multi-parent hierarchical routing protocol for WSNs. C Del-Valle-Soto, C Mex-Perera, A Orozco-Lugo, GM Galva n-Tejada, ... 2014 Wireless Telecommunications Symposium, 1-8, 2014.
Found on Publication Page
31
Self-healing in transparent optical packet switching mesh networks: A reinforcement learning perspective. IS Razo-Zapata, G Castan o n, C Mex-Perera Computer Networks 60, 129-146, 2014.
Found on Publication Page
In 2013
30
Lightpath requests processing in flexible packet switching optical networks using reinforcement learning. IS Razo-Zapata, G Castan on, C Mex-Perera 2013 15th International Conference on Transparent Optical Networks (ICTON), 1-4, 2013.
Found on Publication Page
In 2012
29
Analyzing log files for postmortem intrusion detection. KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and ..., 2012.
Found on Publication Page
28
Some Representations of the S-Box of Camellia in GF(((22)2)2). AF Marti nez-Herrera, JC Mex-Perera, JA Nolazco-Flores International Conference on Cryptology and Network Security, 296-309, 2012.
Found on Publication Page
27
Masquerade attacks based on user's profile. IS Razo-Zapata, C Mex-Perera, R Monroy Journal of Systems and Software 85 (11), 2640-2651, 2012.
Found on Publication Page
26
Self-Healing on Transparent Optical Packet Switching Mesh Networks. IS Razo-Zapata, G Castan o n, C Mex-Perera .
Found on Publication Page
25
Self-healing on Transparent Optical Packet Switching Mesh Networks: Overcoming Failures and Attacks. IS Razo-Zapata, G Castan o n, C Mex-Perera Resilient Optical Network Design: Advances in Fault-Tolerant Methodologies ..., 2012.
Found on Publication Page
In 2011
24
On self-healing for transparent optical packet switching networks: An approach to security. IS Razo-Zapata, G Castano n, C Mex-Perera 15th International Conference on Optical Network Design and Modeling-ONDM ..., 2011.
Found on Publication Page
In 2010
23
Resource allocation for contention-resolution strategies in OPS. C Mex-Perera, J Mozo-Olea, G Castan o n, I Razo-Zapata 2010 12th International Conference on Transparent Optical Networks, 1-4, 2010.
Found on Publication Page
In 2009
22
Transparent optical network dimensioning for self-organizing routing. G Castan o n, I Razo-Zapata, J Mozo, C Mex 2009 3rd ICTON Mediterranean Winter Conference (ICTON-MW), 1-6, 2009.
Found on Publication Page
In 2008
21
Security in all-optical networks: Failure and attack avoidance using self-organization. G Castanon, I Razo-Zapata, C Mex, R Ramirez-Velarde, O Tonguz 2008 2nd ICTON Mediterranean Winter, 1-5, 2008.
Found on Publication Page
20
Towards an Emergency Domain Name System based on a peer-to-peer network. CMP C Del Valle-Soto, Razo-Zapata Research in Computing Science 39, 2008.
Found on Publication Page
In 2006
19
Hybrid method for detecting masqueraders using session folding and hidden markov models. R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores Mexican International Conference on Artificial Intelligence, 622-631, 2006.
Found on Publication Page
18
On the Timely Detection of Mimicry Attacks. R Monroy, R Go mez, N Sa nchez, L Trejo Departamento deficiencias computacionales, Campus Estado de Me xico del ..., 2006.
Found on Publication Page
17
An improved non-negative matrix factorization method for masquerade detection. C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo Proceedings of the 1st Mexican international conference on informatics ..., 2006.
Found on Publication Page
In 2005
16
Phoneme spotting for speech-based crypto-key generation. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera Iberoamerican Congress on Pattern Recognition, 770-777, 2005.
Found on Publication Page
15
Cryptographic-speech-key generation architecture improvements. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera Iberian Conference on Pattern Recognition and Image Analysis, 579-585, 2005.
Found on Publication Page
14
Parameter optimization in a text-dependent cryptographic-speech-key generation task. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera International Conference on Nonlinear Analyses and Algorithms for Speech ..., 2005.
Found on Publication Page
13
Multi-speaker voice cryptographic key generation. LP Garci a-Perera, JC Mex-Perera, JA Nolazco-Flores The 3rd ACS/IEEE International Conference onComputer Systems and ..., 2005.
Found on Publication Page
12
A phoneme-space-representation heuristic to improve the performance in a cryptographic-speech-key generation task. LP Garci a-Perera, JA Nolazco-Flores, C Mex-Perera ISCA Tutorial and Research Workshop (ITRW) on Non-Linear Speech Processing, 2005.
Found on Publication Page
In 2004
11
Instituto Tecnol* ogico y de Estudios Superiores de Monterrey Campus Monterrey Graduate Program in Computing, Information and Communications. R Monroy, D Hutter, L Giles, JA Nolazco, C Mex, DAG Salazar Computing, 2004.
Found on Publication Page
10
SVM applied to the generation of biometric speech key. LP Garci a-Perera, C Mex-Perera, JA Nolazco-Flores Iberoamerican Congress on Pattern Recognition, 637-644, 2004.
Found on Publication Page
9
Cryptographic-speech-key generation using the SVM technique over the lp-cepstral speech space. PL Garci a-Perera, C Mex-Perera, JA Nolazco-Flores International School on Neural Networks, Initiated by IIASS and EMFCSC, 370-374, 2004.
Found on Publication Page
In 2003
8
Distinguishing TEA from a Random Permutation. JC Herna ndez, JM Sierra, A Ribagorda, B Ramos Cryptography and Coding: 8th IMA International Conference Cirencester, UK ..., 2003.
Found on Publication Page
7
Characterization of Eban Numbers. JC Hernandez, C Mex-Perera, SJ Shepherd JOURNAL OF RECREATIONAL MATHEMATICS 31 (3), 197-200, 2003.
Found on Publication Page
In 2002
6
Cryptanalysis of a summation generator with 2-bit memory. JC Mex-Perera, SJ Shepherd Signal processing 82 (12), 2025-2028, 2002.
Found on Publication Page
In 2001
5
Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers. JC Herna ndez, JM Sierra, A Ribagorda, B Ramos, JC Mex-Perera IMA International Conference on Cryptography and Coding, 374-377, 2001.
Found on Publication Page
4
Using classifiers to predict linear feedback shift registers. JC Herna ndez, P Isasi, JM Sierra, C Mex-Perera, B Ramos Proceedings IEEE 35th Annual 2001 International Carnahan Conference on ..., 2001.
Found on Publication Page
In 2000
3
Using the general next bit predictor like an evaluation criteria. JC Hernandez, JM Sierra, C Mex-Perera, D Borrajo, A Ribagorda, P Isasi proceedings of NESSIE workshop, Leuven, Belgium, 2000.
Found on Publication Page
Unspecified
2
Intrusion Detection for Mobile Ad-Hoc Networks Based on a Non-Negative Matrix Factorization Method. CMPJ Zamora-Elizondo, R Monroy Advances in Artificial Intelligence: Algorithms and Applications, 131, 0.
Found on Publication Page
1
Forensic Intrusion Detection on System Logs. KA Garc a-Gamboa, E Aguirre-Bermudez, R Monroy, C Mex-Perera .
Found on Publication Page