Ana Lucila Sandoval Orozco

According to our database1, Ana Lucila Sandoval Orozco authored at least 62 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.
Sensors, 2019

A traffic analysis attack to compute social network measures.
Multimedia Tools Appl., 2019

Locating similar names through locality sensitive hashing and graph theory.
Multimedia Tools Appl., 2019

A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multimedia Tools Appl., 2019

Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.
IEEE Access, 2019

Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019

EBVBF: Energy Balanced Vector Based Forwarding Protocol.
IEEE Access, 2019

2018
Adaptive artificial immune networks for mitigating DoS flooding attacks.
Swarm and Evolutionary Computation, 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Network and Computer Applications, 2017

Advanced Payload Analyzer Preprocessor.
Future Generation Comp. Syst., 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Generation Comp. Syst., 2017

2016
Disclosing user relationships in email networks.
The Journal of Supercomputing, 2016

Leveraging information security and computational trust for cybersecurity.
The Journal of Supercomputing, 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

Image source acquisition identification of mobile devices based on the use of features.
Multimedia Tools Appl., 2016

On multiple burst-correcting MDS codes.
J. Computational Applied Mathematics, 2016

Advances on Software Defined Sensor, Mobile, and Fixed Networks.
IJDSN, 2016

Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.
IJAHUC, 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

Online masquerade detection resistant to mimicry.
Expert Syst. Appl., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

2015
Network Intrusion Detection Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015

Monitoring of Data Centers using Wireless Sensor Networks.
Proceedings of the Handbook on Data Centers, 2015

Extracting Association Patterns in Network Communications.
Sensors, 2015

Analysis of errors in exif metadata on mobile devices.
Multimedia Tools Appl., 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Computer Vision, 2015

Smartphone image clustering.
Expert Syst. Appl., 2015

Optimum shortened cyclic codes for multiple burst-error correction.
ACM Comm. Computer Algebra, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
IJDSN, 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

2013
Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2013

Parallel approach of a bioinspired routing protocol for MANETs.
IJAHUC, 2013

2012
Security Issues in Mobile Ad Hoc Networks.
IJDSN, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

A distributed QoS mechanism for ad hoc network.
IJAHUC, 2012

An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Communications Letters, 2012

Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012

2011
Distributed Dynamic Host Configuration Protocol (D2HCP).
Sensors, 2011

Auto-Configuration Protocols in Mobile Ad Hoc Networks.
Sensors, 2011

An Extension Proposal of D2HCP for Network Merging.
JUSPN, 2011

An Extension Proposal of AntOR for Parallel Computing.
JUSPN, 2011

Secure extension to the optimised link state routing protocol.
IET Information Security, 2011

Efficient Shortened Cyclic Codes Correcting Either Random Errors or Bursts.
IEEE Communications Letters, 2011

Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011

Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2010
Bio-inspired routing protocol for mobile ad hoc networks.
IET Communications, 2010

2009
Routing Protocols in Wireless Sensor Networks.
Sensors, 2009


  Loading...