Gerardo Rodríguez Sánchez

Orcid: 0000-0001-5551-0612

Affiliations:
  • University of Salamanca, Spain


According to our database1, Gerardo Rodríguez Sánchez authored at least 37 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Study of the malware SCIRS model with different incidence rates.
Log. J. IGPL, 2019

Rules \_ Math: Establishing Assessment Standards.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

2018
Variable step length algorithms with high-order extrapolated non-standard finite difference schemes for a SEIR model.
J. Comput. Appl. Math., 2018

Basic mathematics assessment in engineering degrees: Case study.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Teaching and assessing discrete mathematics.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
Higher-order nonstandard finite difference schemes for a MSEIR model for a malware propagation.
J. Comput. Appl. Math., 2017

2016
A method for malware propagation in industrial critical infrastructures.
Integr. Comput. Aided Eng., 2016

3D medical data security protection.
Expert Syst. Appl., 2016

Case study: Malware propagation models for undergraduate engineering students.
Proceedings of the Fourth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca, Spain, November 02, 2016

A SCIRS Model for Malware Propagation in Wireless Networks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

An Individual-Based Model for Malware Propagation in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Artificial Intelligence, 2016

Modeling Malware Propagation in Wireless Sensor Networks with Individual-Based Models.
Proceedings of the Advances in Artificial Intelligence, 2016

2015
A protocol to encrypt digital images using chaotic maps and memory cellular automata.
Log. J. IGPL, 2015

A Cellular Automata Model for Mobile Worm Propagation.
Proceedings of the Bioinspired Computation in Artificial Systems, 2015

How Engineers Deal with Mathematics Solving Differential Equation.
Proceedings of the International Conference on Computational Science, 2015

Spatio-Temporal Spreading of Mobile Malware: A Model Based on Difference Equations.
Proceedings of the International Joint Conference, 2015

2013
On the invertible cellular automata 150 over <i>F</i><sub><i>p</i></sub>.
Appl. Math. Comput., 2013

A CA Model for Mobile Malware Spreading Based on Bluetooth Connections.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

A Mathematical Model to Study the Meningococcal Meningitis.
Proceedings of the International Conference on Computational Science, 2013

2012
On the boolean partial derivatives and their composition.
Appl. Math. Lett., 2012

A Graph Cellular Automata Model to Study the Spreading of an Infectious Disease.
Proceedings of the Advances in Artificial Intelligence, 2012

Encrypting Digital Images Using Cellular Automata.
Proceedings of the Hybrid Artificial Intelligent Systems - 7th International Conference, 2012

2011
Cryptographic properties of Boolean functions defining elementary cellular automata.
Int. J. Comput. Math., 2011

Reversibility of linear cellular automata.
Appl. Math. Comput., 2011

2010
Civil-Comp special issue.
Adv. Eng. Softw., 2010

2009
Selling multiple secrets to a single buyer.
Inf. Sci., 2009

A Secret Sharing Scheme for Digital Images Based on Cellular Automata and Boolean Functions.
Proceedings of the Bio-Inspired Systems: Computational and Ambient Intelligence, 2009

A SIS Epidemiological Model Based on Cellular Automata on Graphs.
Proceedings of the Distributed Computing, 2009

2008
On the Security of ''Golden'' Cryptography.
Int. J. Netw. Secur., 2008

Cryptographic Properties of Second-Order Memory Elementary Cellular Automata.
Proceedings of the The Third International Conference on Availability, 2008

2007
Modeling epidemics using cellular automata.
Appl. Math. Comput., 2007

Simulation of forest fire fronts using cellular automata.
Adv. Eng. Softw., 2007

A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

2006
A Model Based on Cellular Automata to Simulate Epidemic Diseases.
Proceedings of the Cellular Automata, 2006

2005
A secret sharing scheme based on cellular automata.
Appl. Math. Comput., 2005

2004
The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography.
Neural Parallel Sci. Comput., 2004

2003
Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003


  Loading...