Ana Lucila Sandoval Orozco

Orcid: 0000-0002-2846-9017

According to our database1, Ana Lucila Sandoval Orozco authored at least 89 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.
Data, 2024

2023
A multi-channel approach for detecting tampering in colour filter images.
Expert Syst. Appl., November, 2023

Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.
Future Internet, May, 2023

Agency theory: Forecasting agent remuneration at insurance companies.
Expert Syst. Appl., April, 2023

ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.
Sensors, February, 2023

2022
Analysis of MP4 Videos in 5G Using SDN.
IEEE Trans. Intell. Transp. Syst., 2022

Digital Video Manipulation Detection Technique Based on Compression Algorithms.
IEEE Trans. Intell. Transp. Syst., 2022

On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers.
Sensors, 2022

A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.
Multim. Tools Appl., 2022

FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences.
Entropy, 2022

Agency Theory: Designing Optimal Incentives in the Insurance Sector.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.
Proceedings of the 1st International Conference on 6G Networking, 2022

2021
Copy-move forgery detection technique based on discrete cosine transform blocks features.
Neural Comput. Appl., 2021

Compression effects and scene details on the source camera identification of digital videos.
Expert Syst. Appl., 2021

A security framework for Ethereum smart contracts.
Comput. Commun., 2021

The 51% Attack on Blockchains: A Mining Behavior Study.
IEEE Access, 2021

2020
Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
Sensors, 2020

Image tampering detection by estimating interpolation patterns.
Future Gener. Comput. Syst., 2020

A machine learning forensics technique to detect post-processing in digital videos.
Future Gener. Comput. Syst., 2020

Authentication and integrity of smartphone videos through multimedia container structure analysis.
Future Gener. Comput. Syst., 2020

Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols.
Future Gener. Comput. Syst., 2020

An Analysis of Smart Contracts Security Threats Alongside Existing Solutions.
Entropy, 2020

Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.
IEEE Access, 2020

Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension.
IEEE Access, 2020

Digital Video Source Identification Based on Container's Structure Analysis.
IEEE Access, 2020

2019
Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.
Sensors, 2019

A traffic analysis attack to compute social network measures.
Multim. Tools Appl., 2019

Locating similar names through locality sensitive hashing and graph theory.
Multim. Tools Appl., 2019

A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019

Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.
IEEE Access, 2019

Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.
IEEE Access, 2019

Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019

EBVBF: Energy Balanced Vector Based Forwarding Protocol.
IEEE Access, 2019

2018
Adaptive artificial immune networks for mitigating DoS flooding attacks.
Swarm Evol. Comput., 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Netw. Comput. Appl., 2017

Advanced Payload Analyzer Preprocessor.
Future Gener. Comput. Syst., 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017

2016
Disclosing user relationships in email networks.
J. Supercomput., 2016

Leveraging information security and computational trust for cybersecurity.
J. Supercomput., 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016

On multiple burst-correcting MDS codes.
J. Comput. Appl. Math., 2016

Advances on Software Defined Sensor, Mobile, and Fixed Networks.
Int. J. Distributed Sens. Networks, 2016

Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

Online masquerade detection resistant to mimicry.
Expert Syst. Appl., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

2015
Network Intrusion Detection Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015

Monitoring of Data Centers using Wireless Sensor Networks.
Proceedings of the Handbook on Data Centers, 2015

Extracting Association Patterns in Network Communications.
Sensors, 2015

Analysis of errors in exif metadata on mobile devices.
Multim. Tools Appl., 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Comput. Vis., 2015

Smartphone image clustering.
Expert Syst. Appl., 2015

Optimum shortened cyclic codes for multiple burst-error correction.
ACM Commun. Comput. Algebra, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
Int. J. Distributed Sens. Networks, 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

2013
Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2013

Parallel approach of a bioinspired routing protocol for MANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Source smartphone identification using sensor pattern noise and wavelet transform.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

2012
Security Issues in Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012

A distributed QoS mechanism for ad hoc network.
Int. J. Ad Hoc Ubiquitous Comput., 2012

An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Commun. Lett., 2012

Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012

2011
Distributed Dynamic Host Configuration Protocol (D2HCP).
Sensors, 2011

Auto-Configuration Protocols in Mobile <i>Ad Hoc</i> Networks.
Sensors, 2011

An Extension Proposal of D2HCP for Network Merging.
J. Ubiquitous Syst. Pervasive Networks, 2011

An Extension Proposal of AntOR for Parallel Computing.
J. Ubiquitous Syst. Pervasive Networks, 2011

Secure extension to the optimised link state routing protocol.
IET Inf. Secur., 2011

Efficient Shortened Cyclic Codes Correcting Either Random Errors or Bursts.
IEEE Commun. Lett., 2011

Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011

Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2010
Bio-inspired routing protocol for mobile ad hoc networks.
IET Commun., 2010

2009
Routing Protocols in Wireless Sensor Networks.
Sensors, 2009


  Loading...