Distributing computing in the internet of things: cloud, fog and edge computing overview PJ Escamilla-Ambrosio, A Rodríguez-Mota, E Aguirre-Anaya, ... NEO 2016: Results of the Numerical and Evolutionary Optimization Workshop …, 2018 | 116 | 2018 |
Feature selection to detect botnets using machine learning algorithms FV Alejandre, NC Cortés, EA Anaya 2017 international conference on electronics, communications and computers …, 2017 | 68 | 2017 |
Security controls for Android RJG Vargas, EA Anaya, RG Huerta, AFM Hernandez 2012 Fourth International Conference on Computational Aspects of Social …, 2012 | 33 | 2012 |
Towards a 2-hybrid Android malware detection test framework A Rodriguez-Mota, PJ Escamilla-Ambrosio, S Morales-Ortega, ... 2016 International Conference on Electronics, Communications and Computers …, 2016 | 17 | 2016 |
Network forensics with neurofuzzy techniques EA Anaya, M Nakano-Miyatake, HMP Meana 2009 52nd IEEE International Midwest Symposium on Circuits and Systems, 848-852, 2009 | 14 | 2009 |
A new procedure to detect low interaction honeypots E Aguirre-Anaya, G Gallegos-Garcia, NS Luna, LAV Vargas International Journal of Electrical and Computer Engineering 4 (6), 848, 2014 | 13 | 2014 |
Botnet Detection using Clustering Algorithms. FV Alejandre, NC Cortés, EA Anaya Res. Comput. Sci. 118, 65-75, 2016 | 11 | 2016 |
IoT botnets P Beltrán-García, E Aguirre-Anaya, PJ Escamilla-Ambrosio, ... Telematics and Computing: 8th International Congress, WITCOM 2019, Merida …, 2019 | 10 | 2019 |
GARMDROID: IoT potential security threats analysis through the inference of android applications hardware features requirements A Rodríguez-Mota, PJ Escamilla-Ambrosio, J Happa, E Aguirre-Anaya Applications for Future Internet: International Summit, AFI 2016, Puebla …, 2017 | 8 | 2017 |
Improving android mobile application development by dissecting malware analysis data A Rodríguez-Mota, PJ Escamilla-Ambrosio, E Aguirre-Anaya, ... 2016 4th International Conference in Software Engineering Research and …, 2016 | 7 | 2016 |
Cognitive radio based system for best effort communications in sound-based covert channel for iot environments JE Coyac-Torres, ME Rivero-Angeles, E Aguirre-Anaya Mobile Networks and Applications 26 (4), 1449-1460, 2021 | 6 | 2021 |
Detección de ciberataques a través del análisis de mensajes de redes sociales: revisión del estado del arte. JE Coyac-Torres, G Sidorov, EA Anaya Res. Comput. Sci. 149 (8), 1031-1041, 2020 | 6 | 2020 |
Image compressive sensing cryptographic analysis PJ Escamilla-Ambrosio, M Salinas-Rosales, E Aguirre-Anaya, ... 2016 International Conference on Electronics, Communications and Computers …, 2016 | 6 | 2016 |
Design and implementation of an electronic voting system for choosing the position of advisor student in a university G Gallegos-Garcia, VKR Venegas, AM Silva, EA Anaya 2011 IEEE Electronics, Robotics and Automotive Mechanics Conference, 455-460, 2011 | 6 | 2011 |
Primary user emulation in cognitive radio-enabled WSNs for structural health monitoring: modeling and attack detection HA Alcala’Garrido, ME Rivero-Angeles, EA Anaya Journal of Sensors 2019, 2019 | 5 | 2019 |
Performance analysis of a wireless sensor network with cognitive radio capabilities in structural health monitoring applications: A discrete model HA Alcala Garrido, ME Rivero-Angeles, E Aguirre Anaya, FA Cruz-Perez, ... International Journal of Distributed Sensor Networks 14 (5), 1550147718774001, 2018 | 5 | 2018 |
Security controls for Android R Jonathan, G Vargas, EA Anaya, RG Huerta, A Felix 2012 IEEE Fourth International Conference on Computational Aspects of Social …, 2012 | 5 | 2012 |
Neural network based attack detection algorithm A Barradas-Acosta, EA Anaya, M Nakano-Miyatake, H Perez-Meana WSEAS transactions on Computers 8 (6), 905-915, 2009 | 4 | 2009 |
Cyberattack Detection in Social Network Messages Based on Convolutional Neural Networks and NLP Techniques JE Coyac-Torres, G Sidorov, E Aguirre-Anaya, G Hernández-Oregón Machine Learning and Knowledge Extraction 5 (3), 1132-1148, 2023 | 2 | 2023 |
A survey on information security in cloud computing SD Orantes Jiménez, E Aguirre Anaya Computación y Sistemas 24 (2), 819-833, 2020 | 2 | 2020 |