Ángel Martín del Rey

According to our database1, Ángel Martín del Rey authored at least 78 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings.
Future Gener. Comput. Syst., 2020

Bidirectional-Pass Algorithm for Interictal Event Detection.
Proceedings of the Practical Applications of Computational Biology & Bioinformatics, 2020

Quaternion Neural Networks: State-of-the-Art and Research Challenges.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020

The Reversibility of Cellular Automata on Trees with Loops.
Proceedings of the Distributed Computing and Artificial Intelligence, 2020

Simulating Malware Propagation with Different Infection Rates.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Smart Buildings IoT Networks Accuracy Evolution Prediction to Improve Their Reliability Using a Lotka-Volterra Ecosystem Model.
Sensors, 2019

Mathematical Models for Malware Propagation.
Secur. Commun. Networks, 2019

Study of the malware SCIRS model with different incidence rates.
Log. J. IGPL, 2019

A closed formula for the inverse of a reversible cellular automaton with (2R+1)-cyclic rule.
Appl. Math. Comput., 2019

Security Countermeasures of a SCIRAS Model for Advanced Malware Propagation.
IEEE Access, 2019

Modeling the Spread of Malware on Complex Networks.
Proceedings of the Distributed Computing and Artificial Intelligence, 2019

Proposed Models for Advanced Persistent Threat Detection: A Review.
Proceedings of the Distributed Computing and Artificial Intelligence, 2019

A Review of SEIR-D Agent-Based Model.
Proceedings of the Distributed Computing and Artificial Intelligence, 2019

2018
Variable step length algorithms with high-order extrapolated non-standard finite difference schemes for a SEIR model.
J. Comput. Appl. Math., 2018

Modeling malware propagation using a carrier compartment.
Commun. Nonlinear Sci. Numer. Simul., 2018

Teaching and assessing discrete mathematics.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Higher-order nonstandard finite difference schemes for a MSEIR model for a malware propagation.
J. Comput. Appl. Math., 2017

New Approaches of Epidemic Models to Simulate Malware Propagation.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

A SEIR Model for Computer Virus Spreading Based on Cellular Automata.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

New Perspectives in the Study of Advanced Persistent Threats.
Proceedings of the Trends in Cyber-Physical Multi-Agent Systems. The PAAMS Collection, 2017

Malware Propagation Software for Wireless Sensor Networks.
Proceedings of the Trends in Cyber-Physical Multi-Agent Systems. The PAAMS Collection, 2017

Chaotic Encryption of 3D Objects.
Proceedings of the Biomedical Applications Based on Natural and Artificial Computing, 2017

2016
A method for malware propagation in industrial critical infrastructures.
Integr. Comput. Aided Eng., 2016

3D medical data security protection.
Expert Syst. Appl., 2016

Case study: Malware propagation models for undergraduate engineering students.
Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca, Spain, November 02, 2016

A SCIRS Model for Malware Propagation in Wireless Networks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

An Individual-Based Model for Malware Propagation in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Artificial Intelligence, 2016

Modeling Malware Propagation in Wireless Sensor Networks with Individual-Based Models.
Proceedings of the Advances in Artificial Intelligence, 2016

2015
Mathematical modeling of the propagation of malware: a review.
Secur. Commun. Networks, 2015

A protocol to encrypt digital images using chaotic maps and memory cellular automata.
Log. J. IGPL, 2015

A multi-secret sharing scheme for 3D solid objects.
Expert Syst. Appl., 2015

Using technology in mathematical courses: some possibilities.
ACM Commun. Comput. Algebra, 2015

A Cellular Automata Model for Mobile Worm Propagation.
Proceedings of the Bioinspired Computation in Artificial Systems, 2015

How Engineers Deal with Mathematics Solving Differential Equation.
Proceedings of the International Conference on Computational Science, 2015

A Method to Encrypt 3D Solid Objects Based on Three-Dimensional Cellular Automata.
Proceedings of the Hybrid Artificial Intelligent Systems - 10th International Conference, 2015

Spatio-Temporal Spreading of Mobile Malware: A Model Based on Difference Equations.
Proceedings of the International Joint Conference, 2015

2014
Changing assessment methods: New rules, new roles.
J. Symb. Comput., 2014

CA-Based Model for Hantavirus Disease between Host Rodents.
Proceedings of the Hybrid Artificial Intelligence Systems - 9th International Conference, 2014

A Threshold Scheme for 3D Objects Based on Cellular Automata.
Proceedings of the Distributed Computing and Artificial Intelligence, 2014

2013
On the invertible cellular automata 150 over <i>F</i><sub><i>p</i></sub>.
Appl. Math. Comput., 2013

A CA Model for Mobile Malware Spreading Based on Bluetooth Connections.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Yes, We Can - (Can We Change the Evaluation Methods in Mathematics?).
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

A Mathematical Model to Study the Meningococcal Meningitis.
Proceedings of the International Conference on Computational Science, 2013

A SIR e-Epidemic Model for Computer Worms Based on Cellular Automata.
Proceedings of the Advances in Artificial Intelligence, 2013

2012
On the boolean partial derivatives and their composition.
Appl. Math. Lett., 2012

A Graph Cellular Automata Model to Study the Spreading of an Infectious Disease.
Proceedings of the Advances in Artificial Intelligence, 2012

Encrypting Digital Images Using Cellular Automata.
Proceedings of the Hybrid Artificial Intelligent Systems - 7th International Conference, 2012

2011
Cryptographic properties of Boolean functions defining elementary cellular automata.
Int. J. Comput. Math., 2011

Reversibility of linear cellular automata.
Appl. Math. Comput., 2011

2010
A Virtual Collaborative Environment Helps University Students to Learn Maths.
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010

Virtual and Collaborative Environment for Learning Maths.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010

2009
Selling multiple secrets to a single buyer.
Inf. Sci., 2009

A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions.
Proceedings of the Bio-Inspired Systems: Computational and Ambient Intelligence, 2009

A Computer Virus Spread Model Based on Cellular Automata on Graphs.
Proceedings of the Distributed Computing, 2009

A SIS Epidemiological Model Based on Cellular Automata on Graphs.
Proceedings of the Distributed Computing, 2009

2008
A multisecret sharing scheme for color images based on cellular automata.
Inf. Sci., 2008

On the Security of ''Golden'' Cryptography.
Int. J. Netw. Secur., 2008

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes.
Int. J. Netw. Secur., 2008

A Secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata.
Proceedings of the Combinatorial Image Analysis, 12th International Workshop, 2008

A Matrix-Based Secret Sharing Scheme for Images.
Proceedings of the Progress in Pattern Recognition, 2008

Cryptographic Properties of Second-Order Memory Elementary Cellular Automata.
Proceedings of the The Third International Conference on Availability, 2008

2007
Modeling epidemics using cellular automata.
Appl. Math. Comput., 2007

Inverse rules of ECA with rule number 150.
Appl. Math. Comput., 2007

Simulation of forest fire fronts using cellular automata.
Adv. Eng. Softw., 2007

A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

Message Authentication Protocol Based on Cellular Automata.
Proceedings of the Applications of Evolutinary Computing, 2007

2006
A Model Based on Cellular Automata to Simulate Epidemic Diseases.
Proceedings of the Cellular Automata, 2006

A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.
Proceedings of the Cellular Automata, 2006

2005
Characterization of several classes of second-order ODEs by using differential invariants.
Int. J. Math. Math. Sci., 2005

Faa' di Bruno's formula, lattices, and partitions.
Discret. Appl. Math., 2005

A secure scheme to share secret color images.
Comput. Phys. Commun., 2005

A secret sharing scheme based on cellular automata.
Appl. Math. Comput., 2005

Design of a Cryptosystem Based on Reversible Memory Cellular Automata.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

2004
The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography.
Neural Parallel Sci. Comput., 2004

2003
Sharing secret color images using cellular automata with memory
CoRR, 2003

Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003


  Loading...