L. Javier García-Villalba

According to our database1, L. Javier García-Villalba authored at least 153 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.
Sensors, 2019

QoS Management and Flexible Traffic Detection Architecture for 5G Mobile Networks.
Sensors, 2019

Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation.
Sensors, 2019

A traffic analysis attack to compute social network measures.
Multimedia Tools Appl., 2019

Locating similar names through locality sensitive hashing and graph theory.
Multimedia Tools Appl., 2019

A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multimedia Tools Appl., 2019

Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019

Set of Usability Heuristics for Quality Assessment of Mobile Applications on Smartphones.
IEEE Access, 2019

Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo.
IEEE Access, 2019

Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019

EBVBF: Energy Balanced Vector Based Forwarding Protocol.
IEEE Access, 2019

2018
Analyzing the traffic of penetration testing tools with an IDS.
The Journal of Supercomputing, 2018

An algorithm to find relationships between web vulnerabilities.
The Journal of Supercomputing, 2018

Enlargement of vulnerable web applications for testing.
The Journal of Supercomputing, 2018

Adaptive artificial immune networks for mitigating DoS flooding attacks.
Swarm and Evolutionary Computation, 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Clustering and Flow Conservation Monitoring Tool for Software Defined Networks.
Sensors, 2018

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
Sensors, 2018

New DoS Defense Method Based on Strong Designated Verifier Signatures.
Sensors, 2018

A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences.
Knowl.-Based Syst., 2018

Orchestration of use-case driven analytics in 5G scenarios.
J. Ambient Intelligence and Humanized Computing, 2018

Distributed One Time Password Infrastructure for Linux Environments.
Entropy, 2018

Software Defined Networks in Wireless Sensor Architectures.
Entropy, 2018

Ransomware Automatic Data Acquisition Tool.
IEEE Access, 2018

Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
BATCP: Bandwidth-Aggregation Transmission Control Protocol.
Symmetry, 2017

Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017

Reasoning and Knowledge Acquisition Framework for 5G Network Analytics.
Sensors, 2017

Distributed Data Service for Data Management in Internet of Things Middleware.
Sensors, 2017

Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.
Sensors, 2017

A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Sensors, 2017

Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Network and Computer Applications, 2017

Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
ISPRS Int. J. Geo-Information, 2017

An optimisation framework for monitoring of SDN/OpenFlow networks.
IJAHUC, 2017

Towards Incidence Management in 5G Based on Situational Awareness.
Future Internet, 2017

Key Technologies in the Context of Future Networks: Operational and Management Requirements.
Future Internet, 2017

Advanced Payload Analyzer Preprocessor.
Future Generation Comp. Syst., 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Generation Comp. Syst., 2017

Entropy-Based Economic Denial of Sustainability Detection.
Entropy, 2017

An Approach to Data Analysis in 5G Networks.
Entropy, 2017

Future mode of operations for 5G - The SELFNET approach enabled by SDN/NFV.
Computer Standards & Interfaces, 2017

2016
Design and Evaluation of a Services Interface for the Internet of Things.
Wireless Personal Communications, 2016

Disclosing user relationships in email networks.
The Journal of Supercomputing, 2016

Leveraging information security and computational trust for cybersecurity.
The Journal of Supercomputing, 2016

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016

Image source acquisition identification of mobile devices based on the use of features.
Multimedia Tools Appl., 2016

On multiple burst-correcting MDS codes.
J. Computational Applied Mathematics, 2016

Advances on Software Defined Sensor, Mobile, and Fixed Networks.
IJDSN, 2016

Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.
IJAHUC, 2016

SELFNET Framework self-healing capabilities for 5G mobile networks.
Trans. Emerging Telecommunications Technologies, 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

Online masquerade detection resistant to mimicry.
Expert Syst. Appl., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

2015
Network Intrusion Detection Systems in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015

Privacy in Data Centers: A Survey of Attacks and Countermeasures.
Proceedings of the Handbook on Data Centers, 2015

Monitoring of Data Centers using Wireless Sensor Networks.
Proceedings of the Handbook on Data Centers, 2015

Extracting Association Patterns in Network Communications.
Sensors, 2015

Solving technological isolation to build virtual learning communities.
Multimedia Tools Appl., 2015

Virtual learning communities: unsolved troubles.
Multimedia Tools Appl., 2015

Analysis of errors in exif metadata on mobile devices.
Multimedia Tools Appl., 2015

Web from preprocessor for crawling.
Multimedia Tools Appl., 2015

Trends on virtualisation with software defined networking and network function virtualisation.
IET Networks, 2015

Guest Editorial.
IET Networks, 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Computer Vision, 2015

Smartphone image clustering.
Expert Syst. Appl., 2015

Framework for optimized multimedia routing over software defined networks.
Computer Networks, 2015

Optimum shortened cyclic codes for multiple burst-error correction.
ACM Comm. Computer Algebra, 2015

2014
A Layered Trust Information Security Architecture.
Sensors, 2014

Advanced Technologies and Communication Solutions for Internet of Things.
IJDSN, 2014

SDN: Evolution and Opportunities in the Development IoT Applications.
IJDSN, 2014

A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
IJDSN, 2014

GTrust: Group Extension for Trust Models in Distributed Systems.
IJDSN, 2014

Design and evaluation of a decentralised information service architecture for IEEE 802.21 networks.
IJAHUC, 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

E-D2HCP: enhanced distributed dynamic host configuration protocol.
Computing, 2014

Adaptive routing protocol for mobile ad hoc networks.
Computing, 2014

2013
Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2013

Parallel approach of a bioinspired routing protocol for MANETs.
IJAHUC, 2013

Data model extension for security event notification with dynamic risk assessment purpose.
SCIENCE CHINA Information Sciences, 2013

Evolution and Challenges of Software Defined Networking.
Proceedings of the IEEE SDN for Future Networks and Services, 2013

2012
Security Issues in Mobile Ad Hoc Networks.
IJDSN, 2012

Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
IJDSN, 2012

A distributed QoS mechanism for ad hoc network.
IJAHUC, 2012

An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Communications Letters, 2012

Intelligent system for time series classification using support vector machines applied to supply-chain.
Expert Syst. Appl., 2012

Concurrency Optimization for NIDS (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012

2011
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks.
Sensors, 2011

Distributed Dynamic Host Configuration Protocol (D2HCP).
Sensors, 2011

Auto-Configuration Protocols in Mobile Ad Hoc Networks.
Sensors, 2011

An Extension Proposal of D2HCP for Network Merging.
JUSPN, 2011

An Extension Proposal of AntOR for Parallel Computing.
JUSPN, 2011

Secure extension to the optimised link state routing protocol.
IET Information Security, 2011

Advantages of identity certificate segregation in P2PSIP systems.
IET Communications, 2011

IEEE 802.21 Information services deployment for heterogeneous mobile environments.
IET Communications, 2011

Efficient Shortened Cyclic Codes Correcting Either Random Errors or Bursts.
IEEE Communications Letters, 2011

Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011

Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Grid of Learning Resources in E-learning Communities.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Comparing AntOR-Disjoint Node Routing Protocol with Its Parallel Extension.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
On the efficiency of shortened cyclic single-burst-correcting codes.
IEEE Trans. Information Theory, 2010

Dynamic multi-objective routing algorithm: a multi-objective routing algorithm for the simple hybrid routing protocol on wireless sensor networks.
IET Communications, 2010

Bio-inspired routing protocol for mobile ad hoc networks.
IET Communications, 2010

Hierarchical Neighbor Discovery Scheme for Handover Optimization.
IEEE Communications Letters, 2010

Likelihood that a pseudorandom sequence generator has optimal properties
CoRR, 2010

2009
Routing Protocols in Wireless Sensor Networks.
Sensors, 2009

2008
A proposal of a wireless sensor network routing protocol.
Telecommunication Systems, 2008

Enhancing an Integer Challenge-Response Protocol.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
A proposal of a Wireless Sensor Network Routing Protocol.
Proceedings of the Personal Wireless Communications, 2007

Implementation and Attacks Analysis of a Honeypot.
Proceedings of the Computational Science and Its Applications, 2007

2006
Evaluation of the Dynamic Reconfiguration of Mobile IPv4 Agents in MANET.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments.
Proceedings of the Personal Wireless Communications, 2006

Survivable Mechanism for IEEE 802.11 WLAN Improvements.
Proceedings of the Computational Science and Its Applications, 2006

Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases.
Proceedings of the Computational Science and Its Applications, 2006

A New Proposal of TCP for IEEE 802.11 Wireless Networks.
Proceedings of the High Performance Computing and Communications, 2006

Performance Evaluation of Mobile IP Agents' Auto-reconfiguration Mechanisms in MANET.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
Proceedings of the Security in Information Systems, 2005

SisBrAV - Brazilian Vulnerability Alert System.
Proceedings of the Security in Information Systems, 2005

A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network.
Proceedings of the Security in Information Systems, 2005

2004
Hiding Data in Games.
ICGA Journal, 2004

Security in the Management of Networks with SNMPv3.
Proceedings of the Security In Information Systems, 2004

Beyond Boosting: Recursive ECOC Learning Machines.
Proceedings of the Multiple Classifier Systems, 5th International Workshop, 2004

On multiple burst-correcting shortened cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Use of Spectral Techniques in the Design of Symmetrical Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2004

Load Balancing and Survivability for Network Services Based on Intelligent Agents.
Proceedings of the Computational Science and Its Applications, 2004

Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A Simulation-Based Performance Analysis of Dynamic Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Authentication and Autoconfiguration for MANET Nodes.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
Good Error Correcting Output Codes for Adaptive Multiclass Learning.
Proceedings of the Multiple Classifier Systems, 4th International Workshop, 2003

Network Dependability: An Availability Measure in N-Tier Client/Server Architecture.
Proceedings of the Computer and Information Sciences, 2003

Why Not RSVP over DTM?
Proceedings of the Web Engineering, International Conference, 2003

A Modular Architecture for Distributed IDS in MANET.
Proceedings of the Computational Science and Its Applications, 2003

On the Number of Equivalence Classes in Certain Stream Ciphers.
Proceedings of the Computational Science and Its Applications, 2003

On MARS's s-boxes Strength against Linear Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2003

2002
Scalable QoS Approach in a Core Internet Network.
Proceedings of the 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 2002

2001
An efficient algorithm to generate binary sequences for cryptographic purposes.
Theor. Comput. Sci., 2001

A family of keystream generators with large linear complexity.
Appl. Math. Lett., 2001

Recursive Adaptive ECOC Models.
Proceedings of the Progress in Artificial Intelligence, 2001

Computing the Genus of a Class of Curves.
Proceedings of the Applied Algebra, 2001

2000
On the linear complexity of the sequences generated by nonlinear filterings.
Inf. Process. Lett., 2000

1999
On the General Classification of Nonlinear Filters of m-Sequences.
Inf. Process. Lett., 1999


  Loading...