Volgen
Raul Monroy
Raul Monroy
Professor of Computer Science, Tecnologico de Monterrey, Campus Estado de Mexico
Geverifieerd e-mailadres voor tec.mx - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Planning exploration strategies for simultaneous localization and mapping
B Tovar, L Munoz-Gómez, R Murrieta-Cid, M Alencastre-Miranda, ...
Robotics and Autonomous Systems 54 (4), 314-331, 2006
1422006
A one-class classification approach for bot detection on Twitter
J Rodríguez-Ruiz, JI Mata-Sánchez, R Monroy, O Loyola-González, ...
Computers & Security 91, 101715, 2020
1292020
Contrast pattern-based classification for bot detection on twitter
O Loyola-González, R Monroy, J Rodríguez, A López-Cuevas, ...
IEEE Access 7, 45800-45817, 2019
842019
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.
D Valdes-Ramirez, MA Medina-Pérez, R Monroy, O Loyola-González, ...
IEEE Access 7 (1), 48484-48499, 2019
812019
PBC4cip: A new contrast pattern-based classifier for class imbalance problems
O Loyola-González, MA Medina-Pérez, JF Martínez-Trinidad, ...
Knowledge-Based Systems 115, 100-109, 2017
812017
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
642012
A complexity result for the pursuit-evasion game of maintaining visibility of a moving evader
R Murrieta-Cid, R Monroy, S Hutchinson, JP Laumond
2008 IEEE International Conference on Robotics and Automation, 2657-2664, 2008
532008
Web attack detection using ID3
VH Garcia, R Monroy, M Quintana
IFIP World Computer Congress, TC 12, 323-332, 2006
472006
An explainable artificial intelligence model for clustering numerical databases
O Loyola-Gonzalez, AE Gutierrez-Rodriguez, MA Medina-Perez, ...
IEEE Access 8, 52370-52384, 2020
382020
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
JB Camina, C Hernández-Gracidas, R Monroy, L Trejo
Expert systems with applications 41 (3), 919-930, 2014
382014
Hybrid method for detecting masqueraders using session folding and hidden markov models
R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores
MICAI 2006: Advances in Artificial Intelligence: 5th Mexican International …, 2006
382006
Cluster validation using an ensemble of supervised classifiers
J Rodríguez, MA Medina-Pérez, AE Gutierrez-Rodríguez, R Monroy, ...
Knowledge-Based Systems 145, 134-144, 2018
342018
Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection
JB Camiña, MA Medina-Pérez, R Monroy, O Loyola-González, ...
Machine vision and applications 30, 959-974, 2019
332019
Proof plans for the correction of false conjectures
R Monroy, A Bundy, A Ireland
Logic Programming and Automated Reasoning: 5th International Conference …, 1994
331994
A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print
J Khodadoust, MA Medina-Pérez, R Monroy, AM Khodadoust, ...
Expert Systems with Applications 176, 114687, 2021
322021
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects
MA Medina-Pérez, R Monroy, JB Camiña, M García-Borroto
Soft Computing 21, 557-569, 2017
312017
Formal support to security protocol development: A survey
JC López Pimentel, R Monroy
Computación y Sistemas 12 (1), 89-108, 2008
312008
Fusing pattern discovery and visual analytics approaches in tweet propagation
O Loyola-González, A López-Cuevas, MA Medina-Pérez, B Camiña, ...
Information Fusion 46, 91-101, 2019
302019
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores
Sensors 15 (4), 7619-7649, 2015
292015
Towards a masquerade detection system based on user’s tasks
JB Camina, J Rodríguez, R Monroy
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
272014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20