Alexander Perez-Pons

According to our database1, Alexander Perez-Pons authored at least 41 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Anomaly Detection in Embedded Devices Through Hardware Introspection.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

SDN-based GTP-U Traffic Analysis for 5G Networks.
Proceedings of the NOMS 2023, 2023

Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source Framework.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly Detection.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Design and Analysis of an Open-Source SDN-based 5G Standalone Testbed.
Proceedings of the IEEE INFOCOM 2023, 2023

Denial-of Service (DoS) Attack Detection Using Edge Machine Learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications.
Proceedings of the IEEE International Conference on Industrial Technology, 2023

2021
Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle.
Future Internet, 2021

AG-SGD: Angle-Based Stochastic Gradient Descent.
IEEE Access, 2021

Virtual Assistant for Forensics Recovery of IoT Devices.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices.
Proceedings of the Intelligent Computing, 2020

Optimizing Stochastic Gradient Descent Using the Angle Between Gradients.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems.
ACM Comput. Surv., 2019

Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
Windows Virtualization Architecture For Cyber Threats Detection.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Security and privacy implications of 'do not track'.
Int. J. Inf. Priv. Secur. Integr., 2017

Design of Virtualization Framework to Detect Cyber Threats in Linux Environment.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Building a Platform for Software-Defined Networking Cybersecurity Applications.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

HMM-Based Intrusion Detection System for Software Defined Networking.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

2015
A Generic Framework for EEG-Based Biometric Authentication.
Proceedings of the 12th International Conference on Information Technology, 2015

2009
Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology.
IEEE Trans. Inf. Technol. Biomed., 2009

Personality, Mood and Music Listening of Computer Information Systems Developers: Implications for Quality-of-Work.
Inf. Resour. Manag. J., 2009

2008
Understanding user perspectives on biometric technology.
Commun. ACM, 2008

2007
A Practical System to Manage and Control Digital Media.
J. Comput. Inf. Syst., 2007

2006
Semantic prefetching objects of slower web site pages.
J. Syst. Softw., 2006

Object prefetching using semantic links.
Data Base, 2006

MIS Research Involving Human Subjects: Processes and IRB Requirements.
Commun. Assoc. Inf. Syst., 2006

Biometric marketing: targeting the online consumer.
Commun. ACM, 2006

2005
Improving the performance of client Web object retrieval.
J. Syst. Softw., 2005

Evaluating the Teaching Effectiveness of Various Data Modeling Notations.
J. Comput. Inf. Syst., 2005

2003
Web-application centric object prefetching.
J. Syst. Softw., 2003

Database Tuning and its Role in Information Technology Education.
J. Inf. Syst. Educ., 2003

Data Protection Using Watermarking in E-Business.
J. Database Manag., 2003

Enhancing the Quality-Of-Service for Application Service Providers.
J. Comput. Inf. Syst., 2003

E-commerce and Arab intra-trade.
Inf. Technol. People, 2003

Global e-commerce: a framework for understanding and overcoming the trust barrier.
Inf. Manag. Comput. Secur., 2003

The furniture company: deductive databases and the scheduling problem.
Int. J. Inf. Manag., 2003

IP Traceback using header compression.
Comput. Secur., 2003

2002
Temporal abstract classes and virtual temporal specifications for real-time systems.
ACM Trans. Softw. Eng. Methodol., 2002

2001
The Estimation of the WCET in Super-Scalar Real-Time System.
Scalable Comput. Pract. Exp., 2001

1999
Using Pipeline for Tight Estimation of Worst-Case Execution Time in a Real-Time System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...