var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/15/9059.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/15/9059.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/15/9059.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.\n \n \n \n \n\n\n \n Rodrigues, G. A. P.; Serrano, A. L. M.; Lemos, A. N. L. E.; Canedo, E. D.; de Mendonça, F. L. L.; de Oliveira Albuquerque, R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Data, 9(2): 27. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/data/RodriguesSLCMAO24,\n  author       = {Gabriel Arquelau Pimenta Rodrigues and\n                  Andr{\\'{e}} Luiz Marques Serrano and\n                  Amanda Nunes Lopes Espi{\\~{n}}eira Lemos and\n                  Edna Dias Canedo and\n                  F{\\'{a}}bio L{\\'{u}}cio Lopes de Mendon{\\c{c}}a and\n                  Robson de Oliveira Albuquerque and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Understanding Data Breach from a Global Perspective: Incident Visualization\n                  and Data Protection Law Review},\n  journal      = {Data},\n  volume       = {9},\n  number       = {2},\n  pages        = {27},\n  year         = {2024},\n  url          = {https://doi.org/10.3390/data9020027},\n  doi          = {10.3390/DATA9020027},\n  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/data/RodriguesSLCMAO24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A security framework for Ethereum smart contracts.\n \n \n \n \n\n\n \n Vivar, A. L.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n CoRR, abs/2402.03555. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2402-03555,\n  author       = {Antonio Lopez Vivar and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {A security framework for Ethereum smart contracts},\n  journal      = {CoRR},\n  volume       = {abs/2402.03555},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2402.03555},\n  doi          = {10.48550/ARXIV.2402.03555},\n  eprinttype    = {arXiv},\n  eprint       = {2402.03555},\n  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03555.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Authentication and integrity of smartphone videos through multimedia container structure analysis.\n \n \n \n \n\n\n \n Huamán, C. Q.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n CoRR, abs/2402.06661. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"AuthenticationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2402-06661,\n  author       = {Carlos Quinto Huam{\\'{a}}n and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Authentication and integrity of smartphone videos through multimedia\n                  container structure analysis},\n  journal      = {CoRR},\n  volume       = {abs/2402.06661},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2402.06661},\n  doi          = {10.48550/ARXIV.2402.06661},\n  eprinttype    = {arXiv},\n  eprint       = {2402.06661},\n  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-06661.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Compression effects and scene details on the source camera identification of digital videos.\n \n \n \n \n\n\n \n López, R. R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n CoRR, abs/2402.06669. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"CompressionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2402-06669,\n  author       = {Raquel Ramos L{\\'{o}}pez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Compression effects and scene details on the source camera identification\n                  of digital videos},\n  journal      = {CoRR},\n  volume       = {abs/2402.06669},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2402.06669},\n  doi          = {10.48550/ARXIV.2402.06669},\n  eprinttype    = {arXiv},\n  eprint       = {2402.06669},\n  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-06669.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks.\n \n \n \n \n\n\n \n Vidal, J. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n CoRR, abs/2402.07714. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"AdaptivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2402-07714,\n  author       = {Jorge Maestre Vidal and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Adaptive Artificial Immune Networks for Mitigating DoS flooding Attacks},\n  journal      = {CoRR},\n  volume       = {abs/2402.07714},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2402.07714},\n  doi          = {10.48550/ARXIV.2402.07714},\n  eprinttype    = {arXiv},\n  eprint       = {2402.07714},\n  timestamp    = {Mon, 19 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-07714.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Video Manipulation Detection Technique Based on Compression Algorithms.\n \n \n \n \n\n\n \n Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n CoRR, abs/2403.07891. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2403-07891,\n  author       = {Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Digital Video Manipulation Detection Technique Based on Compression\n                  Algorithms},\n  journal      = {CoRR},\n  volume       = {abs/2403.07891},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2403.07891},\n  doi          = {10.48550/ARXIV.2403.07891},\n  eprinttype    = {arXiv},\n  eprint       = {2403.07891},\n  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-07891.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Agency theory: Forecasting agent remuneration at insurance companies.\n \n \n \n \n\n\n \n García, F. T.; Orozco, A. L. S.; Pineda, M. P. G.; and García-Villalba, L. J.\n\n\n \n\n\n\n Expert Syst. Appl., 215: 119340. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"AgencyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/GarciaOPG23,\n  author       = {Fernando Turrado Garc{\\'{\\i}}a and\n                  Ana Lucila Sandoval Orozco and\n                  M. Pilar Garc{\\'{\\i}}a Pineda and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Agency theory: Forecasting agent remuneration at insurance companies},\n  journal      = {Expert Syst. Appl.},\n  volume       = {215},\n  pages        = {119340},\n  year         = {2023},\n  url          = {https://doi.org/10.1016/j.eswa.2022.119340},\n  doi          = {10.1016/J.ESWA.2022.119340},\n  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/GarciaOPG23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A multi-channel approach for detecting tampering in colour filter images.\n \n \n \n \n\n\n \n Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Expert Syst. Appl., 230: 120498. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/FernandezOG23,\n  author       = {Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {A multi-channel approach for detecting tampering in colour filter\n                  images},\n  journal      = {Expert Syst. Appl.},\n  volume       = {230},\n  pages        = {120498},\n  year         = {2023},\n  url          = {https://doi.org/10.1016/j.eswa.2023.120498},\n  doi          = {10.1016/J.ESWA.2023.120498},\n  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/FernandezOG23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.\n \n \n \n \n\n\n \n Hernandez, L. A. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Future Internet, 15(5): 155. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fi/HernandezOG23,\n  author       = {Luis Alberto Martinez Hernandez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Analysis of Digital Information in Storage Devices Using Supervised\n                  and Unsupervised Natural Language Processing Techniques},\n  journal      = {Future Internet},\n  volume       = {15},\n  number       = {5},\n  pages        = {155},\n  year         = {2023},\n  url          = {https://doi.org/10.3390/fi15050155},\n  doi          = {10.3390/FI15050155},\n  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fi/HernandezOG23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.\n \n \n \n \n\n\n \n Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, L. K.; Meana, H. M. P.; Olivares-Mercado, J.; Portillo-Portillo, J.; Benitez-Garcia, G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Sensors, 23(3): 1231. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ReinforSec:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/HernandezSuarezSTMOPBOG23,\n  author       = {Aldo Hernandez{-}Suarez and\n                  Gabriel Sanchez{-}Perez and\n                  Linda K. Toscano{-}Medina and\n                  H{\\'{e}}ctor M. P{\\'{e}}rez Meana and\n                  Jesus Olivares{-}Mercado and\n                  Jos{\\'{e}} Portillo{-}Portillo and\n                  Gibran Benitez{-}Garcia and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {ReinforSec: An Automatic Generator of Synthetic Malware Samples and\n                  Denial-of-Service Attacks through Reinforcement Learning},\n  journal      = {Sensors},\n  volume       = {23},\n  number       = {3},\n  pages        = {1231},\n  year         = {2023},\n  url          = {https://doi.org/10.3390/s23031231},\n  doi          = {10.3390/S23031231},\n  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/HernandezSuarezSTMOPBOG23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences.\n \n \n \n \n\n\n \n Portillo-Portillo, J.; Sanchez-Perez, G.; Toscano-Medina, L. K.; Hernandez-Suarez, A.; Olivares-Mercado, J.; Meana, H. M. P.; Velarde-Alvarado, P.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Entropy, 24(7): 942. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"FASSVid:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/entropy/Portillo-Portillo22,\n  author       = {Jos{\\'{e}} Portillo{-}Portillo and\n                  Gabriel Sanchez{-}Perez and\n                  Linda K. Toscano{-}Medina and\n                  Aldo Hernandez{-}Suarez and\n                  Jesus Olivares{-}Mercado and\n                  H{\\'{e}}ctor M. P{\\'{e}}rez Meana and\n                  Pablo Velarde{-}Alvarado and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences},\n  journal      = {Entropy},\n  volume       = {24},\n  number       = {7},\n  pages        = {942},\n  year         = {2022},\n  url          = {https://doi.org/10.3390/e24070942},\n  doi          = {10.3390/E24070942},\n  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/entropy/Portillo-Portillo22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.\n \n \n \n \n\n\n \n Cifuentes, J. A.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Multim. Tools Appl., 81(3): 3205–3222. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/CifuentesOG22,\n  author       = {Jenny Alexandra Cifuentes and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {A survey of artificial intelligence strategies for automatic detection\n                  of sexually explicit videos},\n  journal      = {Multim. Tools Appl.},\n  volume       = {81},\n  number       = {3},\n  pages        = {3205--3222},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/s11042-021-10628-2},\n  doi          = {10.1007/S11042-021-10628-2},\n  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/mta/CifuentesOG22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers.\n \n \n \n \n\n\n \n Aponte-Novoa, F. A.; Álvarez, D. P.; Villanueva-Polanco, R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Sensors, 22(23): 9219. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Aponte-NovoaAVO22,\n  author       = {Fredy Andres Aponte{-}Novoa and\n                  Daniel Povedano {\\'{A}}lvarez and\n                  Ricardo Villanueva{-}Polanco and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers},\n  journal      = {Sensors},\n  volume       = {22},\n  number       = {23},\n  pages        = {9219},\n  year         = {2022},\n  url          = {https://doi.org/10.3390/s22239219},\n  doi          = {10.3390/S22239219},\n  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/Aponte-NovoaAVO22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Video Manipulation Detection Technique Based on Compression Algorithms.\n \n \n \n \n\n\n \n Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Trans. Intell. Transp. Syst., 23(3): 2596–2605. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tits/FernandezOG22,\n  author       = {Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Digital Video Manipulation Detection Technique Based on Compression\n                  Algorithms},\n  journal      = {{IEEE} Trans. Intell. Transp. Syst.},\n  volume       = {23},\n  number       = {3},\n  pages        = {2596--2605},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/TITS.2021.3132227},\n  doi          = {10.1109/TITS.2021.3132227},\n  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tits/FernandezOG22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of MP4 Videos in 5G Using SDN.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Fernández, J. A. P.; and Orozco, A. L. S.\n\n\n \n\n\n\n IEEE Trans. Intell. Transp. Syst., 23(3): 2668–2677. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tits/Garcia-Villalba22,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jes{\\'{u}}s Antonio Puente Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Analysis of {MP4} Videos in 5G Using {SDN}},\n  journal      = {{IEEE} Trans. Intell. Transp. Syst.},\n  volume       = {23},\n  number       = {3},\n  pages        = {2668--2677},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/TITS.2022.3143159},\n  doi          = {10.1109/TITS.2022.3143159},\n  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tits/Garcia-Villalba22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.\n \n \n \n \n\n\n \n Alonso-Lupez, J. A.; Hernández, L. A. M.; Arteaga, S. P.; Orozco, A. L. S.; García-Villalba, L. J.; Pastor, A.; and García, D. L.\n\n\n \n\n\n\n In 1st International Conference on 6G Networking, 6GNet 2022, Paris, France, July 6-8, 2022, pages 1–4, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"LevelPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/6gnet/Alonso-LupezHAO22,\n  author       = {Jes{\\'{u}}s A. Alonso{-}Lupez and\n                  Luis Alberto Martinez Hern{\\'{a}}ndez and\n                  Sandra P{\\'{e}}rez Arteaga and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Antonio Pastor and\n                  Diego L{\\'{o}}pez Garc{\\'{\\i}}a},\n  title        = {Level of Trust and Privacy Management in 6G Intent-based Networks\n                  for Vertical Scenarios},\n  booktitle    = {1st International Conference on 6G Networking, 6GNet 2022, Paris,\n                  France, July 6-8, 2022},\n  pages        = {1--4},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/6GNet54646.2022.9830323},\n  doi          = {10.1109/6GNET54646.2022.9830323},\n  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/6gnet/Alonso-LupezHAO22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Agency Theory: Designing Optimal Incentives in the Insurance Sector.\n \n \n \n \n\n\n \n García, F. T.; Orozco, A. L. S.; Pineda, M. P. G.; and García-Villalba, L. J.\n\n\n \n\n\n\n In Hassanien, A. E.; Snásel, V.; Tang, M.; Sung, T.; and Chang, K., editor(s), Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, AISI 2022, Cairo, Egypt, 20-22 November, 2022, volume 152, of Lecture Notes on Data Engineering and Communications Technologies, pages 150–159, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AgencyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/aisi/GarciaOPG22,\n  author       = {Fernando Turrado Garc{\\'{\\i}}a and\n                  Ana Lucila Sandoval Orozco and\n                  M. Pilar Garc{\\'{\\i}}a Pineda and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  editor       = {Aboul Ella Hassanien and\n                  V{\\'{a}}clav Sn{\\'{a}}sel and\n                  Mincong Tang and\n                  Tien{-}Wen Sung and\n                  Kuo{-}Chi Chang},\n  title        = {Agency Theory: Designing Optimal Incentives in the Insurance Sector},\n  booktitle    = {Proceedings of the 8th International Conference on Advanced Intelligent\n                  Systems and Informatics, {AISI} 2022, Cairo, Egypt, 20-22 November,\n                  2022},\n  series       = {Lecture Notes on Data Engineering and Communications Technologies},\n  volume       = {152},\n  pages        = {150--159},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-3-031-20601-6\\_12},\n  doi          = {10.1007/978-3-031-20601-6\\_12},\n  timestamp    = {Thu, 18 Apr 2024 08:28:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/aisi/GarciaOPG22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The 51% Attack on Blockchains: A Mining Behavior Study.\n \n \n \n \n\n\n \n Aponte-Novoa, F. A.; Orozco, A. L. S.; Villanueva-Polanco, R.; and Wightman, P. M.\n\n\n \n\n\n\n IEEE Access, 9: 140549–140564. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/Aponte-NovoaOVW21,\n  author       = {Fredy Andres Aponte{-}Novoa and\n                  Ana Lucila Sandoval Orozco and\n                  Ricardo Villanueva{-}Polanco and\n                  Pedro M. Wightman},\n  title        = {The 51{\\%} Attack on Blockchains: {A} Mining Behavior Study},\n  journal      = {{IEEE} Access},\n  volume       = {9},\n  pages        = {140549--140564},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/ACCESS.2021.3119291},\n  doi          = {10.1109/ACCESS.2021.3119291},\n  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/access/Aponte-NovoaOVW21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A security framework for Ethereum smart contracts.\n \n \n \n \n\n\n \n Vivar, A. L.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Comput. Commun., 172: 119–129. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/comcom/VivarOG21,\n  author       = {Antonio Lopez Vivar and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {A security framework for Ethereum smart contracts},\n  journal      = {Comput. Commun.},\n  volume       = {172},\n  pages        = {119--129},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.comcom.2021.03.008},\n  doi          = {10.1016/J.COMCOM.2021.03.008},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/comcom/VivarOG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Compression effects and scene details on the source camera identification of digital videos.\n \n \n \n \n\n\n \n López, R. R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Expert Syst. Appl., 170: 114515. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"CompressionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/LopezOG21,\n  author       = {Raquel Ramos L{\\'{o}}pez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Compression effects and scene details on the source camera identification\n                  of digital videos},\n  journal      = {Expert Syst. Appl.},\n  volume       = {170},\n  pages        = {114515},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.eswa.2020.114515},\n  doi          = {10.1016/J.ESWA.2020.114515},\n  timestamp    = {Mon, 22 Mar 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/eswa/LopezOG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Copy-move forgery detection technique based on discrete cosine transform blocks features.\n \n \n \n \n\n\n \n Vega, E. A. A.; Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Neural Comput. Appl., 33(10): 4713–4727. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Copy-movePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/nca/VegaFOG21,\n  author       = {Esteban Alejandro Armas Vega and\n                  Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Copy-move forgery detection technique based on discrete cosine transform\n                  blocks features},\n  journal      = {Neural Comput. Appl.},\n  volume       = {33},\n  number       = {10},\n  pages        = {4713--4727},\n  year         = {2021},\n  url          = {https://doi.org/10.1007/s00521-020-05433-1},\n  doi          = {10.1007/S00521-020-05433-1},\n  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/nca/VegaFOG21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.\n \n \n \n \n\n\n \n Vega, E. A. A.; Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 8: 11815–11823. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"PassivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/VegaFOG20,\n  author       = {Esteban Alejandro Armas Vega and\n                  Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Passive Image Forgery Detection Based on the Demosaicing Algorithm\n                  and {JPEG} Compression},\n  journal      = {{IEEE} Access},\n  volume       = {8},\n  pages        = {11815--11823},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/ACCESS.2020.2964516},\n  doi          = {10.1109/ACCESS.2020.2964516},\n  timestamp    = {Sat, 08 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/VegaFOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Video Source Identification Based on Container's Structure Analysis.\n \n \n \n \n\n\n \n López, R. R.; Luengo, E. A.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 8: 36363–36375. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/LopezLOG20,\n  author       = {Raquel Ramos L{\\'{o}}pez and\n                  Elena Almaraz Luengo and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Digital Video Source Identification Based on Container's Structure\n                  Analysis},\n  journal      = {{IEEE} Access},\n  volume       = {8},\n  pages        = {36363--36375},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/ACCESS.2020.2971785},\n  doi          = {10.1109/ACCESS.2020.2971785},\n  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/LopezLOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension.\n \n \n \n \n\n\n \n Rodrigues, G. A. P.; de Oliveira Albuquerque, R.; Alves, G. D. O.; de Mendonça, F. L. L.; Giozza, W. F.; de Sousa Jr., R. T.; and Orozco, A. L. S.\n\n\n \n\n\n\n IEEE Access, 8: 95137–95152. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"SecuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/RodriguesAAMGSO20,\n  author       = {Gabriel Arquelau Pimenta Rodrigues and\n                  Robson de Oliveira Albuquerque and\n                  Gabriel De Oliveira Alves and\n                  F{\\'{a}}bio L{\\'{u}}cio Lopes de Mendon{\\c{c}}a and\n                  William Ferreira Giozza and\n                  Rafael T. de Sousa Jr. and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Securing Instant Messages With Hardware-Based Cryptography and Authentication\n                  in Browser Extension},\n  journal      = {{IEEE} Access},\n  volume       = {8},\n  pages        = {95137--95152},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/ACCESS.2020.2993774},\n  doi          = {10.1109/ACCESS.2020.2993774},\n  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/RodriguesAAMGSO20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Analysis of Smart Contracts Security Threats Alongside Existing Solutions.\n \n \n \n \n\n\n \n Vivar, A. L.; Castedo, A. T.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Entropy, 22(2): 203. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/entropy/VivarCOG20,\n  author       = {Antonio Lopez Vivar and\n                  Alberto Tur{\\'{e}}gano Castedo and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {An Analysis of Smart Contracts Security Threats Alongside Existing\n                  Solutions},\n  journal      = {Entropy},\n  volume       = {22},\n  number       = {2},\n  pages        = {203},\n  year         = {2020},\n  url          = {https://doi.org/10.3390/e22020203},\n  doi          = {10.3390/E22020203},\n  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/entropy/VivarCOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Image tampering detection by estimating interpolation patterns.\n \n \n \n \n\n\n \n Vega, E. A. A.; Fernández, E. G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 107: 229–237. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"ImagePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/VegaFOG20,\n  author       = {Esteban Alejandro Armas Vega and\n                  Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Image tampering detection by estimating interpolation patterns},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {107},\n  pages        = {229--237},\n  year         = {2020},\n  url          = {https://doi.org/10.1016/j.future.2020.01.016},\n  doi          = {10.1016/J.FUTURE.2020.01.016},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/VegaFOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Authentication and integrity of smartphone videos through multimedia container structure analysis.\n \n \n \n \n\n\n \n Huamán, C. Q.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 108: 15–33. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"AuthenticationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/HuamanOG20,\n  author       = {Carlos Quinto Huam{\\'{a}}n and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Authentication and integrity of smartphone videos through multimedia\n                  container structure analysis},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {108},\n  pages        = {15--33},\n  year         = {2020},\n  url          = {https://doi.org/10.1016/j.future.2020.02.044},\n  doi          = {10.1016/J.FUTURE.2020.02.044},\n  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/HuamanOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols.\n \n \n \n \n\n\n \n Gondim, J. J. C.; de Oliveira Albuquerque, R.; and Orozco, A. L. S.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 108: 68–81. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"MirrorPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/GondimAO20,\n  author       = {Jo{\\~{a}}o J. C. Gondim and\n                  Robson de Oliveira Albuquerque and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Mirror saturation in amplified reflection Distributed Denial of Service:\n                  {A} case of study using SNMP, SSDP, {NTP} and {DNS} protocols},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {108},\n  pages        = {68--81},\n  year         = {2020},\n  url          = {https://doi.org/10.1016/j.future.2020.01.024},\n  doi          = {10.1016/J.FUTURE.2020.01.024},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/GondimAO20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A machine learning forensics technique to detect post-processing in digital videos.\n \n \n \n \n\n\n \n Orozco, A. L. S.; Huamán, C. Q.; Álvarez, D. P.; and García-Villalba, L. J.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 111: 199–212. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/OrozcoHAG20,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Carlos Quinto Huam{\\'{a}}n and\n                  Daniel Povedano {\\'{A}}lvarez and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {A machine learning forensics technique to detect post-processing in\n                  digital videos},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {111},\n  pages        = {199--212},\n  year         = {2020},\n  url          = {https://doi.org/10.1016/j.future.2020.04.041},\n  doi          = {10.1016/J.FUTURE.2020.04.041},\n  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/OrozcoHAG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.\n \n \n \n \n\n\n \n de Oliveira Júnior, G. A.; de Oliveira Albuquerque, R.; de Andrade, C. A. B.; de Sousa Júnior, R. T.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Sensors, 20(16): 4557. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"AnonymousPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/JuniorAAJOG20,\n  author       = {Gild{\\'{a}}sio Antonio de Oliveira J{\\'{u}}nior and\n                  Robson de Oliveira Albuquerque and\n                  C{\\'{e}}sar Augusto Borges de Andrade and\n                  Rafael Tim{\\'{o}}teo de Sousa J{\\'{u}}nior and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Anonymous Real-Time Analytics Monitoring Solution for Decision Making\n                  Supported by Sentiment Analysis},\n  journal      = {Sensors},\n  volume       = {20},\n  number       = {16},\n  pages        = {4557},\n  year         = {2020},\n  url          = {https://doi.org/10.3390/s20164557},\n  doi          = {10.3390/S20164557},\n  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/JuniorAAJOG20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.\n \n \n \n \n\n\n \n Arteaga, S. P.; Hernandez, L. A. M.; Sanchez-Perez, G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 7: 51782–51789. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/ArteagaHSOG19,\n  author       = {Sandra P{\\'{e}}rez Arteaga and\n                  Luis Alberto Martinez Hernandez and\n                  Gabriel Sanchez{-}Perez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Analysis of the {GPS} Spoofing Vulnerability in the Drone 3DR Solo},\n  journal      = {{IEEE} Access},\n  volume       = {7},\n  pages        = {51782--51789},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ACCESS.2019.2911526},\n  doi          = {10.1109/ACCESS.2019.2911526},\n  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/ArteagaHSOG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.\n \n \n \n \n\n\n \n Hernandez, L. A. M.; Arteaga, S. P.; Sanchez-Perez, G.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 7: 52052–52059. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"OutdoorPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/HernandezASOG19,\n  author       = {Luis Alberto Martinez Hernandez and\n                  Sandra P{\\'{e}}rez Arteaga and\n                  Gabriel Sanchez{-}Perez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Outdoor Location of Mobile Devices Using Trilateration Algorithms\n                  for Emergency Services},\n  journal      = {{IEEE} Access},\n  volume       = {7},\n  pages        = {52052--52059},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ACCESS.2019.2911058},\n  doi          = {10.1109/ACCESS.2019.2911058},\n  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/HernandezASOG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n EBVBF: Energy Balanced Vector Based Forwarding Protocol.\n \n \n \n \n\n\n \n Abbas, C. J. B.; Montandon, R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 7: 54273–54284. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"EBVBF:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/AbbasMOG19,\n  author       = {Cl{\\'{a}}udia Jacy Barenco Abbas and\n                  Raphael Montandon and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {{EBVBF:} Energy Balanced Vector Based Forwarding Protocol},\n  journal      = {{IEEE} Access},\n  volume       = {7},\n  pages        = {54273--54284},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ACCESS.2019.2913026},\n  doi          = {10.1109/ACCESS.2019.2913026},\n  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/access/AbbasMOG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.\n \n \n \n \n\n\n \n Amaral, D. M.; Gondim, J. J. C.; de Oliveira Albuquerque, R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 7: 90082–90093. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Hy-SAIL:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/AmaralGAOG19,\n  author       = {Dino Macedo Amaral and\n                  Jo{\\~{a}}o J. C. Gondim and\n                  Robson de Oliveira Albuquerque and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud\n                  Storage Systems},\n  journal      = {{IEEE} Access},\n  volume       = {7},\n  pages        = {90082--90093},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ACCESS.2019.2925735},\n  doi          = {10.1109/ACCESS.2019.2925735},\n  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/AmaralGAOG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.\n \n \n \n \n\n\n \n Orozco, A. L. S.; Huamán, C. Q.; Cifuentes, J. A.; and García-Villalba, L. J.\n\n\n \n\n\n\n IEEE Access, 7: 157363–157373. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/OrozcoHCG19,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Carlos Quinto Huam{\\'{a}}n and\n                  Jenny Alexandra Cifuentes and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Digital Video Source Acquisition Forgery Technique Based on Pattern\n                  Sensor Noise Extraction},\n  journal      = {{IEEE} Access},\n  volume       = {7},\n  pages        = {157363--157373},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ACCESS.2019.2949839},\n  doi          = {10.1109/ACCESS.2019.2949839},\n  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/OrozcoHCG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A traffic analysis attack to compute social network measures.\n \n \n \n \n\n\n \n Trujillo, A. G. S.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n Multim. Tools Appl., 78(21): 29731–29745. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/TrujilloOGK19,\n  author       = {Alejandra Guadalupe Silva Trujillo and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  title        = {A traffic analysis attack to compute social network measures},\n  journal      = {Multim. Tools Appl.},\n  volume       = {78},\n  number       = {21},\n  pages        = {29731--29745},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/s11042-018-6217-9},\n  doi          = {10.1007/S11042-018-6217-9},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/mta/TrujilloOGK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A comparison of learning methods over raw data: forecasting cab services market share in New York City.\n \n \n \n \n\n\n \n García, F. T.; García-Villalba, L. J.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Multim. Tools Appl., 78(21): 29783–29804. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/GarciaGOK19,\n  author       = {Fernando Turrado Garc{\\'{\\i}}a and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {A comparison of learning methods over raw data: forecasting cab services\n                  market share in New York City},\n  journal      = {Multim. Tools Appl.},\n  volume       = {78},\n  number       = {21},\n  pages        = {29783--29804},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/s11042-018-6285-x},\n  doi          = {10.1007/S11042-018-6285-X},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/mta/GarciaGOK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Locating similar names through locality sensitive hashing and graph theory.\n \n \n \n \n\n\n \n García, F. T.; García-Villalba, L. J.; Orozco, A. L. S.; Ruiz, F. D. A.; Juárez, A. A.; and Kim, T.\n\n\n \n\n\n\n Multim. Tools Appl., 78(21): 29853–29866. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"LocatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/GarciaGORJK19,\n  author       = {Fernando Turrado Garc{\\'{\\i}}a and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Francisco Dami{\\'{a}}n Aranda Ruiz and\n                  Andr{\\'{e}}s Aguirre Ju{\\'{a}}rez and\n                  Tai{-}Hoon Kim},\n  title        = {Locating similar names through locality sensitive hashing and graph\n                  theory},\n  journal      = {Multim. Tools Appl.},\n  volume       = {78},\n  number       = {21},\n  pages        = {29853--29866},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/s11042-018-6375-9},\n  doi          = {10.1007/S11042-018-6375-9},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/mta/GarciaGORJK19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.\n \n \n \n \n\n\n \n Rosas-Arias, L.; Portillo-Portillo, J.; Hernandez-Suarez, A.; Olivares-Mercado, J.; Sanchez-Perez, G.; Toscano-Medina, K.; Meana, H. M. P.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Sensors, 19(13): 2848. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"VehiclePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Rosas-AriasPHOS19,\n  author       = {Leonel Rosas{-}Arias and\n                  Jos{\\'{e}} Portillo{-}Portillo and\n                  Aldo Hernandez{-}Suarez and\n                  Jesus Olivares{-}Mercado and\n                  Gabriel Sanchez{-}Perez and\n                  Karina Toscano{-}Medina and\n                  H{\\'{e}}ctor M. P{\\'{e}}rez Meana and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Vehicle Counting in Video Sequences: An Incremental Subspace Learning\n                  Approach},\n  journal      = {Sensors},\n  volume       = {19},\n  number       = {13},\n  pages        = {2848},\n  year         = {2019},\n  url          = {https://doi.org/10.3390/s19132848},\n  doi          = {10.3390/S19132848},\n  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/Rosas-AriasPHOS19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Ransomware Automatic Data Acquisition Tool.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; Vivar, A. L.; Vega, E. A. A.; and Kim, T.\n\n\n \n\n\n\n IEEE Access, 6: 55043–55052. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"RansomwarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/Garcia-Villalba18,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Antonio Lopez Vivar and\n                  Esteban Alejandro Armas Vega and\n                  Tai{-}Hoon Kim},\n  title        = {Ransomware Automatic Data Acquisition Tool},\n  journal      = {{IEEE} Access},\n  volume       = {6},\n  pages        = {55043--55052},\n  year         = {2018},\n  url          = {https://doi.org/10.1109/ACCESS.2018.2868885},\n  doi          = {10.1109/ACCESS.2018.2868885},\n  timestamp    = {Wed, 26 Dec 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/Garcia-Villalba18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed One Time Password Infrastructure for Linux Environments.\n \n \n \n \n\n\n \n Peral, A. B.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n Entropy, 20(5): 319. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/entropy/PeralOGK18,\n  author       = {Alberto Benito Peral and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  title        = {Distributed One Time Password Infrastructure for Linux Environments},\n  journal      = {Entropy},\n  volume       = {20},\n  number       = {5},\n  pages        = {319},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/e20050319},\n  doi          = {10.3390/E20050319},\n  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/entropy/PeralOGK18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.\n \n \n \n \n\n\n \n Fernández, E. G.; Orozco, A. L. S.; García-Villalba, L. J.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n Sensors, 18(9): 2804. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/FernandezOGH18,\n  author       = {Edgar Gonz{\\'{a}}lez Fern{\\'{a}}ndez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C. Hernandez{-}Castro},\n  title        = {Digital Image Tamper Detection Technique Based on Spectrum Analysis\n                  of {CFA} Artifacts},\n  journal      = {Sensors},\n  volume       = {18},\n  number       = {9},\n  pages        = {2804},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/s18092804},\n  doi          = {10.3390/S18092804},\n  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/FernandezOGH18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.\n \n \n \n \n\n\n \n Vega, E. A. A.; Orozco, A. L. S.; García-Villalba, L. J.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n Sensors, 18(10): 3372. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/VegaOGH18,\n  author       = {Esteban Alejandro Armas Vega and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C. Hernandez{-}Castro},\n  title        = {Digital Images Authentication Technique Based on DWT, {DCT} and Local\n                  Binary Patterns},\n  journal      = {Sensors},\n  volume       = {18},\n  number       = {10},\n  pages        = {3372},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/s18103372},\n  doi          = {10.3390/S18103372},\n  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/VegaOGH18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adaptive artificial immune networks for mitigating DoS flooding attacks.\n \n \n \n \n\n\n \n Vidal, J. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Swarm Evol. Comput., 38: 94–108. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"AdaptivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/swevo/VidalOG18,\n  author       = {Jorge Maestre Vidal and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Adaptive artificial immune networks for mitigating DoS flooding attacks},\n  journal      = {Swarm Evol. Comput.},\n  volume       = {38},\n  pages        = {94--108},\n  year         = {2018},\n  url          = {https://doi.org/10.1016/j.swevo.2017.07.002},\n  doi          = {10.1016/J.SWEVO.2017.07.002},\n  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/swevo/VidalOG18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; Corripio, J. R.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 76: 418–427. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Garcia-Villalba17,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Jocelin Rosales Corripio and\n                  Julio C. Hernandez{-}Castro},\n  title        = {A PRNU-based counter-forensic method to manipulate smartphone image\n                  source identification techniques},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {76},\n  pages        = {418--427},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.future.2016.11.007},\n  doi          = {10.1016/J.FUTURE.2016.11.007},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Garcia-Villalba17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Advanced Payload Analyzer Preprocessor.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; and Vidal, J. M.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 76: 474–485. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"AdvancedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Garcia-Villalba17a,\n  author       = {L. Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Jorge Maestre Vidal},\n  title        = {Advanced Payload Analyzer Preprocessor},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {76},\n  pages        = {474--485},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.future.2016.10.032},\n  doi          = {10.1016/J.FUTURE.2016.10.032},\n  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Garcia-Villalba17a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Alert correlation framework for malware detection by anomaly-based packet payload analysis.\n \n \n \n \n\n\n \n Vidal, J. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n J. Netw. Comput. Appl., 97: 11–22. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"AlertPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jnca/VidalOG17,\n  author       = {Jorge Maestre Vidal and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Alert correlation framework for malware detection by anomaly-based\n                  packet payload analysis},\n  journal      = {J. Netw. Comput. Appl.},\n  volume       = {97},\n  pages        = {11--22},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.jnca.2017.08.010},\n  doi          = {10.1016/J.JNCA.2017.08.010},\n  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jnca/VidalOG17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n Sensors, 17(5): 1179. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/CanasOGK17,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  title        = {A Family of {ACO} Routing Protocols for Mobile Ad Hoc Networks},\n  journal      = {Sensors},\n  volume       = {17},\n  number       = {5},\n  pages        = {1179},\n  year         = {2017},\n  url          = {https://doi.org/10.3390/s17051179},\n  doi          = {10.3390/S17051179},\n  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/CanasOGK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.\n \n \n \n \n\n\n \n Forain, I.; de Oliveira Albuquerque, R.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n Symmetry, 9(9): 172. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"EndpointPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/symmetry/ForainAOGK17,\n  author       = {Igor Forain and\n                  Robson de Oliveira Albuquerque and\n                  Ana Lucila Sandoval Orozco and\n                  L. Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  title        = {Endpoint Security in Networks: An OpenMP Approach for Increasing Malware\n                  Detection Speed},\n  journal      = {Symmetry},\n  volume       = {9},\n  number       = {9},\n  pages        = {172},\n  year         = {2017},\n  url          = {https://doi.org/10.3390/sym9090172},\n  doi          = {10.3390/SYM9090172},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/symmetry/ForainAOGK17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Theia: a tool for the forensic analysis of mobile devices pictures.\n \n \n \n \n\n\n \n Orozco, A. L. S.; Corripio, J. R.; González, D. M. A.; García-Villalba, L. J.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n Computing, 98(12): 1251–1286. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Theia:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/computing/OrozcoCGGH16,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Jocelin Rosales Corripio and\n                  David Manuel Arenas Gonz{\\'{a}}lez and\n                  L. Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C. Hernandez{-}Castro},\n  title        = {Theia: a tool for the forensic analysis of mobile devices pictures},\n  journal      = {Computing},\n  volume       = {98},\n  number       = {12},\n  pages        = {1251--1286},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s00607-015-0482-5},\n  doi          = {10.1007/S00607-015-0482-5},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/computing/OrozcoCGGH16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identification of smartphone brand and model via forensic video analysis.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; López, R. R.; and Castro, J. C. H.\n\n\n \n\n\n\n Expert Syst. Appl., 55: 59–69. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"IdentificationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/VillalbaOLC16,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Raquel Ramos L{\\'{o}}pez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Identification of smartphone brand and model via forensic video analysis},\n  journal      = {Expert Syst. Appl.},\n  volume       = {55},\n  pages        = {59--69},\n  year         = {2016},\n  url          = {https://doi.org/10.1016/j.eswa.2016.01.025},\n  doi          = {10.1016/J.ESWA.2016.01.025},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/VillalbaOLC16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Online masquerade detection resistant to mimicry.\n \n \n \n \n\n\n \n Vidal, J. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n Expert Syst. Appl., 61: 162–180. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"OnlinePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/VidalOG16,\n  author       = {Jorge Maestre Vidal and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {Online masquerade detection resistant to mimicry},\n  journal      = {Expert Syst. Appl.},\n  volume       = {61},\n  pages        = {162--180},\n  year         = {2016},\n  url          = {https://doi.org/10.1016/j.eswa.2016.05.036},\n  doi          = {10.1016/J.ESWA.2016.05.036},\n  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/VidalOG16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.\n \n \n \n \n\n\n \n Orozco, A. L. S.; García, D. E.; de Armas, R. G.; Fernández, J. A. P.; García-Villalba, L. J.; and Buiati, F. M.\n\n\n \n\n\n\n Int. J. Ad Hoc Ubiquitous Comput., 21(3): 207–219. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"DynamicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijahuc/OrozcoGAFGB16,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Daniel Espino Garc{\\'{\\i}}a and\n                  Roberto Gonz{\\'{a}}lez de Armas and\n                  Jes{\\'{u}}s Antonio Puente Fern{\\'{a}}ndez and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  F{\\'{a}}bio Mesquita Buiati},\n  title        = {Dynamic {IEEE} 802.21 information server mesh architecture for heterogeneous\n                  networks},\n  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},\n  volume       = {21},\n  number       = {3},\n  pages        = {207--219},\n  year         = {2016},\n  url          = {https://doi.org/10.1504/IJAHUC.2016.075380},\n  doi          = {10.1504/IJAHUC.2016.075380},\n  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ijahuc/OrozcoGAFGB16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Advances on Software Defined Sensor, Mobile, and Fixed Networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Bi, J.; Jayasumana, A. P.; and Orozco, A. L. S.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 12(4): 5153718:1–5153718:2. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"AdvancesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/Garcia-Villalba16,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jun Bi and\n                  Anura P. Jayasumana and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Advances on Software Defined Sensor, Mobile, and Fixed Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {12},\n  number       = {4},\n  pages        = {5153718:1--5153718:2},\n  year         = {2016},\n  url          = {https://doi.org/10.1155/2016/5153718},\n  doi          = {10.1155/2016/5153718},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/Garcia-Villalba16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On multiple burst-correcting MDS codes.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; and Blaum, M.\n\n\n \n\n\n\n J. Comput. Appl. Math., 295: 170–174. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jcam/Garcia-Villalba16,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Mario Blaum},\n  title        = {On multiple burst-correcting {MDS} codes},\n  journal      = {J. Comput. Appl. Math.},\n  volume       = {295},\n  pages        = {170--174},\n  year         = {2016},\n  url          = {https://doi.org/10.1016/j.cam.2014.12.022},\n  doi          = {10.1016/J.CAM.2014.12.022},\n  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jcam/Garcia-Villalba16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Image source acquisition identification of mobile devices based on the use of features.\n \n \n \n \n\n\n \n Orozco, A. L. S.; Corripio, J. R.; García-Villalba, L. J.; and Castro, J. C. H.\n\n\n \n\n\n\n Multim. Tools Appl., 75(12): 7087–7111. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"ImagePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/OrozcoCGC16,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Jocelin Rosales Corripio and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Image source acquisition identification of mobile devices based on\n                  the use of features},\n  journal      = {Multim. Tools Appl.},\n  volume       = {75},\n  number       = {12},\n  pages        = {7087--7111},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s11042-015-2633-2},\n  doi          = {10.1007/S11042-015-2633-2},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/mta/OrozcoCGC16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.\n \n \n \n \n\n\n \n Portela, J.; García-Villalba, L. J.; Trujillo, A. G. S.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Sensors, 16(11): 1832. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"EstimationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/PortelaGTOK16,\n  author       = {Javier Portela and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Alejandra Guadalupe Silva Trujillo and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Estimation of Anonymous Email Network Characteristics through Statistical\n                  Disclosure Attacks},\n  journal      = {Sensors},\n  volume       = {16},\n  number       = {11},\n  pages        = {1832},\n  year         = {2016},\n  url          = {https://doi.org/10.3390/s16111832},\n  doi          = {10.3390/S16111832},\n  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/PortelaGTOK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging information security and computational trust for cybersecurity.\n \n \n \n \n\n\n \n de Oliveira Albuquerque, R.; García-Villalba, L. J.; Orozco, A. L. S.; de Sousa Júnior, R. T.; and Kim, T.\n\n\n \n\n\n\n J. Supercomput., 72(10): 3729–3763. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"LeveragingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tjs/AlbuquerqueGOJK16,\n  author       = {Robson de Oliveira Albuquerque and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Rafael Tim{\\'{o}}teo de Sousa J{\\'{u}}nior and\n                  Tai{-}Hoon Kim},\n  title        = {Leveraging information security and computational trust for cybersecurity},\n  journal      = {J. Supercomput.},\n  volume       = {72},\n  number       = {10},\n  pages        = {3729--3763},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s11227-015-1543-4},\n  doi          = {10.1007/S11227-015-1543-4},\n  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tjs/AlbuquerqueGOJK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Disclosing user relationships in email networks.\n \n \n \n \n\n\n \n Portela, J.; García-Villalba, L. J.; Trujillo, A. G. S.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n J. Supercomput., 72(10): 3787–3800. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"DisclosingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tjs/PortelaGTOK16,\n  author       = {Javier Portela and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Alejandra Guadalupe Silva Trujillo and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Disclosing user relationships in email networks},\n  journal      = {J. Supercomput.},\n  volume       = {72},\n  number       = {10},\n  pages        = {3787--3800},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s11227-015-1524-7},\n  doi          = {10.1007/S11227-015-1524-7},\n  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tjs/PortelaGTOK16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Optimum shortened cyclic codes for multiple burst-error correction.\n \n \n \n \n\n\n \n Orozco, A. L. S.; García-Villalba, L. J.; and Blaum, M.\n\n\n \n\n\n\n ACM Commun. Comput. Algebra, 49(1): 22–23. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"OptimumPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cca/OrozcoGB15,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Mario Blaum},\n  title        = {Optimum shortened cyclic codes for multiple burst-error correction},\n  journal      = {{ACM} Commun. Comput. Algebra},\n  volume       = {49},\n  number       = {1},\n  pages        = {22--23},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2768577.2768610},\n  doi          = {10.1145/2768577.2768610},\n  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/cca/OrozcoGB15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Smartphone image clustering.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; and Corripio, J. R.\n\n\n \n\n\n\n Expert Syst. Appl., 42(4): 1927–1940. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"SmartphonePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/Garcia-VillalbaOC15,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Jocelin Rosales Corripio},\n  title        = {Smartphone image clustering},\n  journal      = {Expert Syst. Appl.},\n  volume       = {42},\n  number       = {4},\n  pages        = {1927--1940},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.eswa.2014.10.018},\n  doi          = {10.1016/J.ESWA.2014.10.018},\n  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/Garcia-VillalbaOC15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Smartphone image acquisition forensics using sensor fingerprint.\n \n \n \n \n\n\n \n Orozco, A. L. S.; García-Villalba, L. J.; González, D. M. A.; Corripio, J. R.; Hernandez-Castro, J. C.; and Gibson, S. J.\n\n\n \n\n\n\n IET Comput. Vis., 9(5): 723–731. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"SmartphonePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iet-cvi/OrozcoGGCHG15,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  David Manuel Arenas Gonz{\\'{a}}lez and\n                  Jocelin Rosales Corripio and\n                  Julio C. Hernandez{-}Castro and\n                  Stuart James Gibson},\n  title        = {Smartphone image acquisition forensics using sensor fingerprint},\n  journal      = {{IET} Comput. Vis.},\n  volume       = {9},\n  number       = {5},\n  pages        = {723--731},\n  year         = {2015},\n  url          = {https://doi.org/10.1049/iet-cvi.2014.0243},\n  doi          = {10.1049/IET-CVI.2014.0243},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iet-cvi/OrozcoGGCHG15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of errors in exif metadata on mobile devices.\n \n \n \n \n\n\n \n Orozco, A. L. S.; González, D. M. A.; García-Villalba, L. J.; and Castro, J. C. H.\n\n\n \n\n\n\n Multim. Tools Appl., 74(13): 4735–4763. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/mta/OrozcoGGC15,\n  author       = {Ana Lucila Sandoval Orozco and\n                  David Manuel Arenas Gonz{\\'{a}}lez and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Analysis of errors in exif metadata on mobile devices},\n  journal      = {Multim. Tools Appl.},\n  volume       = {74},\n  number       = {13},\n  pages        = {4735--4763},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/s11042-013-1837-6},\n  doi          = {10.1007/S11042-013-1837-6},\n  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/mta/OrozcoGGC15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Extracting Association Patterns in Network Communications.\n \n \n \n \n\n\n \n Portela, J.; García-Villalba, L. J.; Trujillo, A. G. S.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Sensors, 15(2): 4052–4071. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"ExtractingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/PortelaGTOK15,\n  author       = {Javier Portela and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Alejandra Guadalupe Silva Trujillo and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Extracting Association Patterns in Network Communications},\n  journal      = {Sensors},\n  volume       = {15},\n  number       = {2},\n  pages        = {4052--4071},\n  year         = {2015},\n  url          = {https://doi.org/10.3390/s150204052},\n  doi          = {10.3390/S150204052},\n  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/PortelaGTOK15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.\n \n \n \n \n\n\n \n García, F. T.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n In Khan, S. U.; and Zomaya, A. Y., editor(s), Handbook on Data Centers, pages 669–689. Springer, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"BuildingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/sp/GarciaOG15,\n  author       = {Fernando Turrado Garc{\\'{\\i}}a and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  editor       = {Samee U. Khan and\n                  Albert Y. Zomaya},\n  title        = {Building Scalable Software for Data Centers: An Approach to Distributed\n                  Computing at Enterprise Level},\n  booktitle    = {Handbook on Data Centers},\n  pages        = {669--689},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-1-4939-2092-1\\_23},\n  doi          = {10.1007/978-1-4939-2092-1\\_23},\n  timestamp    = {Sat, 30 Sep 2023 10:30:29 +0200},\n  biburl       = {https://dblp.org/rec/reference/sp/GarciaOG15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Monitoring of Data Centers using Wireless Sensor Networks.\n \n \n \n \n\n\n \n Abbas, C. J. B.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n In Khan, S. U.; and Zomaya, A. Y., editor(s), Handbook on Data Centers, pages 1171–1183. Springer, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"MonitoringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/sp/AbbasOG15,\n  author       = {Cl{\\'{a}}udia Jacy Barenco Abbas and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  editor       = {Samee U. Khan and\n                  Albert Y. Zomaya},\n  title        = {Monitoring of Data Centers using Wireless Sensor Networks},\n  booktitle    = {Handbook on Data Centers},\n  pages        = {1171--1183},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-1-4939-2092-1\\_40},\n  doi          = {10.1007/978-1-4939-2092-1\\_40},\n  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/sp/AbbasOG15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Network Intrusion Detection Systems in Data Centers.\n \n \n \n \n\n\n \n Vidal, J. M.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n In Khan, S. U.; and Zomaya, A. Y., editor(s), Handbook on Data Centers, pages 1185–1207. Springer, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"NetworkPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/sp/VidalOG15,\n  author       = {Jorge Maestre Vidal and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  editor       = {Samee U. Khan and\n                  Albert Y. Zomaya},\n  title        = {Network Intrusion Detection Systems in Data Centers},\n  booktitle    = {Handbook on Data Centers},\n  pages        = {1185--1207},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-1-4939-2092-1\\_41},\n  doi          = {10.1007/978-1-4939-2092-1\\_41},\n  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/reference/sp/VidalOG15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n E-D2HCP: enhanced distributed dynamic host configuration protocol.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; Matesanz, J. G.; and Kim, T.\n\n\n \n\n\n\n Computing, 96(9): 777–791. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"E-D2HCP:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/computing/Garcia-VillalbaOMK14,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Tai{-}Hoon Kim},\n  title        = {{E-D2HCP:} enhanced distributed dynamic host configuration protocol},\n  journal      = {Computing},\n  volume       = {96},\n  number       = {9},\n  pages        = {777--791},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s00607-013-0307-3},\n  doi          = {10.1007/S00607-013-0307-3},\n  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/computing/Garcia-VillalbaOMK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Adaptive routing protocol for mobile ad hoc networks.\n \n \n \n \n\n\n \n Cañas, D. R.; García-Villalba, L. J.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Computing, 96(9): 817–827. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"AdaptivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/computing/CanasGOK14,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Adaptive routing protocol for mobile ad hoc networks},\n  journal      = {Computing},\n  volume       = {96},\n  number       = {9},\n  pages        = {817--827},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s00607-013-0310-8},\n  doi          = {10.1007/S00607-013-0310-8},\n  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/computing/CanasGOK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.\n \n \n \n \n\n\n \n Orozco, A. L. S.; González, D. M. A.; Corripio, J. R.; García-Villalba, L. J.; and Castro, J. C. H.\n\n\n \n\n\n\n Computing, 96(9): 829–841. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"SourcePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/computing/OrozcoGCGC14,\n  author       = {Ana Lucila Sandoval Orozco and\n                  David Manuel Arenas Gonz{\\'{a}}lez and\n                  Jocelin Rosales Corripio and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Source identification for mobile devices, based on wavelet transforms\n                  combined with sensor imperfections},\n  journal      = {Computing},\n  volume       = {96},\n  number       = {9},\n  pages        = {829--841},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s00607-013-0313-5},\n  doi          = {10.1007/S00607-013-0313-5},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/computing/OrozcoGCGC14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.\n \n \n \n \n\n\n \n Buiati, F.; García-Villalba, L. J.; Cañas, D. R.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 10. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/BuiatiGCOK14,\n  author       = {F{\\'{a}}bio Buiati and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {A Zone-Based Media Independent Information Service for {IEEE} 802.21\n                  Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {10},\n  year         = {2014},\n  url          = {https://doi.org/10.1155/2014/737218},\n  doi          = {10.1155/2014/737218},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/BuiatiGCOK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Layered Trust Information Security Architecture.\n \n \n \n \n\n\n \n de Oliveira Albuquerque, R.; García-Villalba, L. J.; Orozco, A. L. S.; Buiati, F.; and Kim, T.\n\n\n \n\n\n\n Sensors, 14(12): 22754–22772. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/AlbuquerqueGOBK14,\n  author       = {Robson de Oliveira Albuquerque and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  F{\\'{a}}bio Buiati and\n                  Tai{-}Hoon Kim},\n  title        = {A Layered Trust Information Security Architecture},\n  journal      = {Sensors},\n  volume       = {14},\n  number       = {12},\n  pages        = {22754--22772},\n  year         = {2014},\n  url          = {https://doi.org/10.3390/s141222754},\n  doi          = {10.3390/S141222754},\n  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/AlbuquerqueGOBK14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Parallel approach of a bioinspired routing protocol for MANETs.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cañas, D. R.; and Orozco, A. L. S.\n\n\n \n\n\n\n Int. J. Ad Hoc Ubiquitous Comput., 12(3): 141–146. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"ParallelPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijahuc/Garcia-VillalbaCO13,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Parallel approach of a bioinspired routing protocol for MANETs},\n  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},\n  volume       = {12},\n  number       = {3},\n  pages        = {141--146},\n  year         = {2013},\n  url          = {https://doi.org/10.1504/IJAHUC.2013.052410},\n  doi          = {10.1504/IJAHUC.2013.052410},\n  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ijahuc/Garcia-VillalbaCO13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; García-Villalba, L. J.; and Hong, P.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 9. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"HybridPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/CanasOGH13,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  P.{-}S. Hong},\n  title        = {Hybrid {ACO} Routing Protocol for Mobile Ad Hoc Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {9},\n  year         = {2013},\n  url          = {https://doi.org/10.1155/2013/265485},\n  doi          = {10.1155/2013/265485},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/CanasOGH13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Source smartphone identification using sensor pattern noise and wavelet transform.\n \n \n \n \n\n\n \n Corripio, J. R.; González, D. M. A.; Orozco, A. L. S.; García-Villalba, L. J.; Hernandez-Castro, J. C.; and Gibson, S. J.\n\n\n \n\n\n\n In 5th International Conference on Imaging for Crime Detection and Prevention, ICDP 2013, London, UK, 16-17 December 2013, pages 1–6, 2013. IET / IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SourcePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdp/CorripioGOGHG13,\n  author       = {Jocelin Rosales Corripio and\n                  David Manuel Arenas Gonz{\\'{a}}lez and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Julio C. Hernandez{-}Castro and\n                  Stuart James Gibson},\n  title        = {Source smartphone identification using sensor pattern noise and wavelet\n                  transform},\n  booktitle    = {5th International Conference on Imaging for Crime Detection and Prevention,\n                  {ICDP} 2013, London, UK, 16-17 December 2013},\n  pages        = {1--6},\n  publisher    = {{IET} / {IEEE}},\n  year         = {2013},\n  url          = {https://doi.org/10.1049/ic.2013.0267},\n  doi          = {10.1049/IC.2013.0267},\n  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icdp/CorripioGOGHG13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cortez, J. R. F.; Orozco, A. L. S.; and Blaum, M.\n\n\n \n\n\n\n IEEE Commun. Lett., 16(1): 89–91. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/icl/Garcia-VillalbaCOB12,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jos{\\'{e}} Ren{\\'{e}} Fuentes Cortez and\n                  Ana Lucila Sandoval Orozco and\n                  Mario Blaum},\n  title        = {An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting\n                  Codes},\n  journal      = {{IEEE} Commun. Lett.},\n  volume       = {16},\n  number       = {1},\n  pages        = {89--91},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/LCOMM.2011.111011.112186},\n  doi          = {10.1109/LCOMM.2011.111011.112186},\n  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/icl/Garcia-VillalbaCOB12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A distributed QoS mechanism for ad hoc network.\n \n \n \n \n\n\n \n Abbas, C. J. B.; García-Villalba, L. J.; and Orozco, A. L. S.\n\n\n \n\n\n\n Int. J. Ad Hoc Ubiquitous Comput., 11(1): 25–33. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijahuc/AbbasGO12,\n  author       = {Cl{\\'{a}}udia Jacy Barenco Abbas and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco},\n  title        = {A distributed QoS mechanism for ad hoc network},\n  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},\n  volume       = {11},\n  number       = {1},\n  pages        = {25--33},\n  year         = {2012},\n  url          = {https://doi.org/10.1504/IJAHUC.2012.049282},\n  doi          = {10.1504/IJAHUC.2012.049282},\n  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ijahuc/AbbasGO12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cañas, D. R.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 8. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"RestrictivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/Garcia-VillalbaCOK12,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile\n                  Ad Hoc Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {8},\n  year         = {2012},\n  url          = {https://doi.org/10.1155/2012/956146},\n  doi          = {10.1155/2012/956146},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/Garcia-VillalbaCOK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cañas, D. R.; Orozco, A. L. S.; and Kim, T.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 8. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"MultiplePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/Garcia-VillalbaCOK12a,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Tai{-}Hoon Kim},\n  title        = {Multiple Interface Parallel Approach of Bioinspired Routing Protocol\n                  for Mobile Ad Hoc Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {8},\n  year         = {2012},\n  url          = {https://doi.org/10.1155/2012/532572},\n  doi          = {10.1155/2012/532572},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/Garcia-VillalbaCOK12a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security Issues in Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n Orozco, A. L. S.; Matesanz, J. G.; García-Villalba, L. J.; Díaz, J. D. M.; and Kim, T.\n\n\n \n\n\n\n Int. J. Distributed Sens. Networks, 8. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsn/OrozcoMGDK12,\n  author       = {Ana Lucila Sandoval Orozco and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jos{\\'{e}} Duv{\\'{a}}n M{\\'{a}}rquez D{\\'{\\i}}az and\n                  Tai{-}Hoon Kim},\n  title        = {Security Issues in Mobile Ad Hoc Networks},\n  journal      = {Int. J. Distributed Sens. Networks},\n  volume       = {8},\n  year         = {2012},\n  url          = {https://doi.org/10.1155/2012/818054},\n  doi          = {10.1155/2012/818054},\n  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijdsn/OrozcoMGDK12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n In Pavón, J.; Duque-Méndez, N. D.; and Fuentes-Fernández, R., editor(s), Advances in Artificial Intelligence - IBERAMIA 2012 - 13th Ibero-American Conference on AI, Cartagena de Indias, Colombia, November 13-16, 2012. Proceedings, volume 7637, of Lecture Notes in Computer Science, pages 251–260, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"TechniquePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iberamia/CanasOG12,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  editor       = {Juan Pav{\\'{o}}n and\n                  N{\\'{e}}stor D. Duque{-}M{\\'{e}}ndez and\n                  Rub{\\'{e}}n Fuentes{-}Fern{\\'{a}}ndez},\n  title        = {Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm},\n  booktitle    = {Advances in Artificial Intelligence - {IBERAMIA} 2012 - 13th Ibero-American\n                  Conference on AI, Cartagena de Indias, Colombia, November 13-16, 2012.\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7637},\n  pages        = {251--260},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-34654-5\\_26},\n  doi          = {10.1007/978-3-642-34654-5\\_26},\n  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},\n  biburl       = {https://dblp.org/rec/conf/iberamia/CanasOG12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).\n \n \n \n \n\n\n \n García-Villalba, L. J.; Castro, J. D. M.; Orozco, A. L. S.; and Puentes, J. M.\n\n\n \n\n\n\n In Balzarotti, D.; Stolfo, S. J.; and Cova, M., editor(s), Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings, volume 7462, of Lecture Notes in Computer Science, pages 397–398, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"MalwarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/raid/Garcia-VillalbaCOP12,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jaime Daniel Mej{\\'{\\i}}a Castro and\n                  Ana Lucila Sandoval Orozco and\n                  Javier Mart{\\'{\\i}}nez Puentes},\n  editor       = {Davide Balzarotti and\n                  Salvatore J. Stolfo and\n                  Marco Cova},\n  title        = {Malware Detection System by Payload Analysis of Network Traffic (Poster\n                  Abstract)},\n  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International\n                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,\n                  2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7462},\n  pages        = {397--398},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-33338-5\\_30},\n  doi          = {10.1007/978-3-642-33338-5\\_30},\n  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/raid/Garcia-VillalbaCOP12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Efficient Shortened Cyclic Codes Correcting Either Random Errors or Bursts.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cortez, J. R. F.; Orozco, A. L. S.; and Blaum, M.\n\n\n \n\n\n\n IEEE Commun. Lett., 15(7): 749–751. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/icl/Garcia-VillalbaCOB11,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jos{\\'{e}} Ren{\\'{e}} Fuentes Cortez and\n                  Ana Lucila Sandoval Orozco and\n                  Mario Blaum},\n  title        = {Efficient Shortened Cyclic Codes Correcting Either Random Errors or\n                  Bursts},\n  journal      = {{IEEE} Commun. Lett.},\n  volume       = {15},\n  number       = {7},\n  pages        = {749--751},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/LCOMM.2011.060111.110338},\n  doi          = {10.1109/LCOMM.2011.060111.110338},\n  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/icl/Garcia-VillalbaCOB11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure extension to the optimised link state routing protocol.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Matesanz, J. G.; Cañas, D. R.; and Orozco, A. L. S.\n\n\n \n\n\n\n IET Inf. Secur., 5(3): 163–169. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iet-ifs/Garcia-VillalbaMCO11,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Secure extension to the optimised link state routing protocol},\n  journal      = {{IET} Inf. Secur.},\n  volume       = {5},\n  number       = {3},\n  pages        = {163--169},\n  year         = {2011},\n  url          = {https://doi.org/10.1049/iet-ifs.2010.0085},\n  doi          = {10.1049/IET-IFS.2010.0085},\n  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iet-ifs/Garcia-VillalbaMCO11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Extension Proposal of D2HCP for Network Merging.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Matesanz, J. G.; Orozco, A. L. S.; and Cortez, J. R. F.\n\n\n \n\n\n\n J. Ubiquitous Syst. Pervasive Networks, 3(1): 35–40. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/juspn/Garcia-VillalbaMOC11,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Ana Lucila Sandoval Orozco and\n                  Jos{\\'{e}} Ren{\\'{e}} Fuentes Cortez},\n  title        = {An Extension Proposal of {D2HCP} for Network Merging},\n  journal      = {J. Ubiquitous Syst. Pervasive Networks},\n  volume       = {3},\n  number       = {1},\n  pages        = {35--40},\n  year         = {2011},\n  url          = {https://doi.org/10.5383/JUSPN.03.01.007},\n  doi          = {10.5383/JUSPN.03.01.007},\n  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/juspn/Garcia-VillalbaMOC11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Extension Proposal of AntOR for Parallel Computing.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; and García-Villalba, L. J.\n\n\n \n\n\n\n J. Ubiquitous Syst. Pervasive Networks, 3(2): 67–72. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/juspn/CanasOG11,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba},\n  title        = {An Extension Proposal of AntOR for Parallel Computing},\n  journal      = {J. Ubiquitous Syst. Pervasive Networks},\n  volume       = {3},\n  number       = {2},\n  pages        = {67--72},\n  year         = {2011},\n  url          = {https://doi.org/10.5383/JUSPN.03.02.005},\n  doi          = {10.5383/JUSPN.03.02.005},\n  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/juspn/CanasOG11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Auto-Configuration Protocols in Mobile \\emphAd Hoc Networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Matesanz, J. G.; Orozco, A. L. S.; and Díaz, J. D. M.\n\n\n \n\n\n\n Sensors, 11(4): 3652–3666. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Auto-ConfigurationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Garcia-Villalba11,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Ana Lucila Sandoval Orozco and\n                  Jos{\\'{e}} Duv{\\'{a}}n M{\\'{a}}rquez D{\\'{\\i}}az},\n  title        = {Auto-Configuration Protocols in Mobile \\emph{Ad Hoc} Networks},\n  journal      = {Sensors},\n  volume       = {11},\n  number       = {4},\n  pages        = {3652--3666},\n  year         = {2011},\n  url          = {https://doi.org/10.3390/s110403652},\n  doi          = {10.3390/S110403652},\n  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/Garcia-Villalba11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed Dynamic Host Configuration Protocol (D2HCP).\n \n \n \n \n\n\n \n García-Villalba, L. J.; Matesanz, J. G.; Orozco, A. L. S.; and Díaz, J. D. M.\n\n\n \n\n\n\n Sensors, 11(4): 4438–4461. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Garcia-Villalba11a,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Juli{\\'{a}}n Garc{\\'{\\i}}a Matesanz and\n                  Ana Lucila Sandoval Orozco and\n                  Jos{\\'{e}} Duv{\\'{a}}n M{\\'{a}}rquez D{\\'{\\i}}az},\n  title        = {Distributed Dynamic Host Configuration Protocol {(D2HCP)}},\n  journal      = {Sensors},\n  volume       = {11},\n  number       = {4},\n  pages        = {4438--4461},\n  year         = {2011},\n  url          = {https://doi.org/10.3390/s110404438},\n  doi          = {10.3390/S110404438},\n  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/Garcia-Villalba11a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n In Kim, T.; Adeli, H.; Grosky, W. I.; Pissinou, N.; Shih, T. K.; Rothwell, E. J.; Kang, B. H.; and Shin, S., editor(s), Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II, volume 263, of Communications in Computer and Information Science, pages 300–304, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fgit/CanasOGK11,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  editor       = {Tai{-}Hoon Kim and\n                  Hojjat Adeli and\n                  William I. Grosky and\n                  Niki Pissinou and\n                  Timothy K. Shih and\n                  Edward J. Rothwell and\n                  Byeong Ho Kang and\n                  Seung{-}Jung Shin},\n  title        = {A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint\n                  Link Routing for Mobile Ad Hoc Networks},\n  booktitle    = {Multimedia, Computer Graphics and Broadcasting - International Conference,\n                  MulGraB 2011, Held as Part of the Future Generation Information Technology\n                  Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island,\n                  Korea, December 8-10, 2011. Proceedings, Part {II}},\n  series       = {Communications in Computer and Information Science},\n  volume       = {263},\n  pages        = {300--304},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-27186-1\\_40},\n  doi          = {10.1007/978-3-642-27186-1\\_40},\n  timestamp    = {Mon, 04 Nov 2019 12:36:13 +0100},\n  biburl       = {https://dblp.org/rec/conf/fgit/CanasOGK11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.\n \n \n \n \n\n\n \n Cañas, D. R.; Orozco, A. L. S.; García-Villalba, L. J.; and Kim, T.\n\n\n \n\n\n\n In Kim, T.; Adeli, H.; Grosky, W. I.; Pissinou, N.; Shih, T. K.; Rothwell, E. J.; Kang, B. H.; and Shin, S., editor(s), Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II, volume 263, of Communications in Computer and Information Science, pages 305–309, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ComparingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fgit/CanasOGK11a,\n  author       = {Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco and\n                  Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Tai{-}Hoon Kim},\n  editor       = {Tai{-}Hoon Kim and\n                  Hojjat Adeli and\n                  William I. Grosky and\n                  Niki Pissinou and\n                  Timothy K. Shih and\n                  Edward J. Rothwell and\n                  Byeong Ho Kang and\n                  Seung{-}Jung Shin},\n  title        = {Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension},\n  booktitle    = {Multimedia, Computer Graphics and Broadcasting - International Conference,\n                  MulGraB 2011, Held as Part of the Future Generation Information Technology\n                  Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island,\n                  Korea, December 8-10, 2011. Proceedings, Part {II}},\n  series       = {Communications in Computer and Information Science},\n  volume       = {263},\n  pages        = {305--309},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-27186-1\\_41},\n  doi          = {10.1007/978-3-642-27186-1\\_41},\n  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/fgit/CanasOGK11a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cortez, J. R. F.; Orozco, A. L. S.; and Blaum, M.\n\n\n \n\n\n\n In Kuleshov, A.; Blinovsky, V. M.; and Ephremides, A., editor(s), 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011, St. Petersburg, Russia, July 31 - August 5, 2011, pages 1186–1189, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"UsePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isit/Garcia-VillalbaCOB11,\n  author       = {L. Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jos{\\'{e}} Ren{\\'{e}} Fuentes Cortez and\n                  Ana Lucila Sandoval Orozco and\n                  Mario Blaum},\n  editor       = {Alexander Kuleshov and\n                  Vladimir M. Blinovsky and\n                  Anthony Ephremides},\n  title        = {Use of Gray codes for optimizing the search of (shortened) cyclic\n                  single burst-correcting codes},\n  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,\n                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},\n  pages        = {1186--1189},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/ISIT.2011.6033720},\n  doi          = {10.1109/ISIT.2011.6033720},\n  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/isit/Garcia-VillalbaCOB11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cortez, J. R. F.; Orozco, A. L. S.; and Blaum, M.\n\n\n \n\n\n\n CoRR, abs/1101.5411. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"EfficientPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1101-5411,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Jos{\\'{e}} Ren{\\'{e}} Fuentes Cortez and\n                  Ana Lucila Sandoval Orozco and\n                  Mario Blaum},\n  title        = {Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting\n                  Codes},\n  journal      = {CoRR},\n  volume       = {abs/1101.5411},\n  year         = {2011},\n  url          = {http://arxiv.org/abs/1101.5411},\n  eprinttype    = {arXiv},\n  eprint       = {1101.5411},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-5411.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Bio-inspired routing protocol for mobile ad hoc networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Cañas, D. R.; and Orozco, A. L. S.\n\n\n \n\n\n\n IET Commun., 4(18): 2187–2195. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"Bio-inspiredPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iet-com/Garcia-VillalbaCO10,\n  author       = {L. Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Delf{\\'{\\i}}n Rup{\\'{e}}rez Ca{\\~{n}}as and\n                  Ana Lucila Sandoval Orozco},\n  title        = {Bio-inspired routing protocol for mobile ad hoc networks},\n  journal      = {{IET} Commun.},\n  volume       = {4},\n  number       = {18},\n  pages        = {2187--2195},\n  year         = {2010},\n  url          = {https://doi.org/10.1049/iet-com.2009.0826},\n  doi          = {10.1049/IET-COM.2009.0826},\n  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iet-com/Garcia-VillalbaCO10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Routing Protocols in Wireless Sensor Networks.\n \n \n \n \n\n\n \n García-Villalba, L. J.; Orozco, A. L. S.; Triviño-Cabrera, A.; and Abbas, C. J. B.\n\n\n \n\n\n\n Sensors, 9(11): 8399–8421. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"RoutingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Garcia-Villalba09,\n  author       = {Luis Javier Garc{\\'{\\i}}a{-}Villalba and\n                  Ana Lucila Sandoval Orozco and\n                  Alicia Trivi{\\~{n}}o{-}Cabrera and\n                  Cl{\\'{a}}udia Jacy Barenco Abbas},\n  title        = {Routing Protocols in Wireless Sensor Networks},\n  journal      = {Sensors},\n  volume       = {9},\n  number       = {11},\n  pages        = {8399--8421},\n  year         = {2009},\n  url          = {https://doi.org/10.3390/s91108399},\n  doi          = {10.3390/S91108399},\n  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/Garcia-Villalba09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);