Raúl Monroy

Orcid: 0000-0002-3465-995X

According to our database1, Raúl Monroy authored at least 90 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field.
Intell. Syst. Appl., March, 2024

Integrating Knowledge Graph Data with Large Language Models for Explainable Inference.
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024

2023
Zero-Knowledge Proofs for Questionnaire Result Verification in Smart Contracts.
CoRR, 2023

Comparing Automated Machine Learning Against an Off-the-Shelf Pattern-Based Classifier in a Class Imbalance Problem: Predicting University Dropout.
IEEE Access, 2023

An Experimental Protocol for Neural Architecture Search in Super-Resolution.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
FT4cip: A new functional tree for classification in class imbalance problems.
Knowl. Based Syst., 2022

A secure and robust indexing algorithm for distorted fingerprints and latent palmprints.
Expert Syst. Appl., 2022

A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities.
ACM Comput. Surv., 2022

2021
COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems.
Swarm Evol. Comput., 2021

The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures Against Intentional Attacks.
IEEE Syst. J., 2021

RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root.
Sensors, 2021

An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification.
Pattern Anal. Appl., 2021

The adaptable Pareto set problem for facility location: A video game approach.
Expert Syst. Appl., 2021

A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print.
Expert Syst. Appl., 2021

A Video Game-Crowdsourcing Approach to Discover a Player's Strategy for Problem Solution to Housing Development.
IEEE Access, 2021

An Indexing Algorithm Based on Clustering of Minutia Cylinder Codes for Fast Latent Fingerprint Identification.
IEEE Access, 2021

A Review and Experimental Comparison of Multivariate Decision Trees.
IEEE Access, 2021

2020
A one-class classification approach for bot detection on Twitter.
Comput. Secur., 2020

An Explainable Artificial Intelligence Model for Clustering Numerical Databases.
IEEE Access, 2020

Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
A Pattern-Based Approach for Detecting Pneumatic Failures on Temporary Immersion Bioreactors.
Sensors, 2019

New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019

Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection.
Mach. Vis. Appl., 2019

Fusing pattern discovery and visual analytics approaches in tweet propagation.
Inf. Fusion, 2019

A survey on minutiae-based palmprint feature representations, and a full analysis of palmprint feature representation role in latent identification performance.
Expert Syst. Appl., 2019

Cluster validation in clustering-based one-class classification.
Expert Syst. J. Knowl. Eng., 2019

A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.
IEEE Access, 2019

DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks.
IEEE Access, 2019

Contrast Pattern-Based Classification for Bot Detection on Twitter.
IEEE Access, 2019

Classification Based on Multivariate Contrast Patterns.
IEEE Access, 2019

Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2019

2018
FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness.
IEEE Trans. Affect. Comput., 2018

Cluster validation using an ensemble of supervised classifiers.
Knowl. Based Syst., 2018

Some features speak loud, but together they all speak louder: A study on the correlation between classification error and feature usage in decision-tree classification ensembles.
Eng. Appl. Artif. Intell., 2018

An Approach Based on Contrast Patterns for Bot Detection on Web Log Files.
Proceedings of the Advances in Soft Computing, 2018

2017
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects.
Soft Comput., 2017

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Sensors, 2017

PBC4cip: A new contrast pattern-based classifier for class imbalance problems.
Knowl. Based Syst., 2017

Online personal risk detection based on behavioural and physiological patterns.
Inf. Sci., 2017

A Model Checker for the Verification of Browser Based Protocols.
Computación y Sistemas, 2017

2016
Temporal and Spatial Locality: An Abstraction for Masquerade Detection.
IEEE Trans. Inf. Forensics Secur., 2016

Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensor Data.
Sensors, 2016

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.
Sensors, 2016

On the Phase Transition of Finding a Biclique in a larger Bipartite Graph.
CoRR, 2016

Maintaining strong mutual visibility of an evader moving over the reduced visibility graph.
Auton. Robots, 2016

2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015

Hacia la construcción de una herramienta para la creación de bitácoras para Android.
Res. Comput. Sci., 2015

2014
The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms.
Expert Syst. Appl., 2014

Towards a Masquerade Detection System Based on User's Tasks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Es NP-completo calcular la comunidad entre los objetos sobre los que una colección de agentes ha realizado una acción.
Computación y Sistemas, 2013

Strand-Based Approach to Patch Security Protocols.
CoRR, 2013

2012
Analyzing Log Files for Postmortem Intrusion Detection.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Editorial.
Polibits, 2012

Masquerade attacks based on user's profile.
J. Syst. Softw., 2012

2011
Towards Building a Masquerade Detection Method Based on User File System Navigation.
Proceedings of the Advances in Artificial Intelligence, 2011

Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents.
Proceedings of the Digital Information Processing and Communications, 2011

2010
Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.
Proceedings of the Advances in Artificial Intelligence, 2010

Evader surveillance under incomplete information.
Proceedings of the IEEE International Conference on Robotics and Automation, 2010

2009
On Process Equivalence = Equation Solving in CCS.
J. Autom. Reason., 2009

On the Automated Correction of Protocols with Improper Message Encoding.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2008
Formal Support to Security Protocol Development: A Survey.
Computación y Sistemas, 2008

A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

2007
On the Automated Correction of Security Protocols Susceptible to a Replay Attack.
Proceedings of the Computer Security, 2007

2006
Planning exploration strategies for simultaneous localization and mapping.
Robotics Auton. Syst., 2006

A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols.
Proceedings of the Workshop on Verification and Debugging, 2006

Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Hybrid Segmentation Method Applied to Color Images and 3D Information.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

A Tool for Managing Security Policies in Organisations.
Proceedings of the Advances in Information and Computer Security, 2006

Web Attack Detection Using ID3.
Proceedings of the Toward Category-Level Object Recognition, 2006

On the Use of Word Networks to Mimicry Attack Detection.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

On the Role of Information Compaction to Intrusion Detection.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005

Audit File Reduction Using N-Gram Models.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
On Modelling an Immune System.
Computación y Sistemas, 2004

Service Discrimination and Audit File Reduction for Effective Intrusion Detection.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Process Algebra Model of the Immune System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals.
Proceedings of the Advances in Artificial Intelligence, 2004

Attribute Reduction for Effective Intrusion Detection.
Proceedings of the Advances in Web Intelligence, 2004

2003
Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm.
Autom. Softw. Eng., 2003

On Automating the Formulation of Security Goals under the Inductive Approach.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Towards a Model for an Immune System.
Proceedings of the MICAI 2002: Advances in Artificial Intelligence, 2002

2001
On the Correction of Faulty Formulae.
Computación y Sistemas, 2001

Concept Formation via Proof Planning Failure.
Proceedings of the Logic for Programming, 2001

2000
Planning Proofs of Equations in CCS.
Autom. Softw. Eng., 2000

Searching for a Solution to Program Verification=Equation Solving in CCS.
Proceedings of the MICAI 2000: Advances in Artificial Intelligence, 2000

The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000

1998
Planning Equational Verification in CCS.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence.
Proceedings of the 13th European Conference on Artificial Intelligence, 1998

1997
Planning proofs of correctness of CCS systems.
PhD thesis, 1997

1994
Proof Plans for the Correction of False Conjectures.
Proceedings of the Logic Programming and Automated Reasoning, 5th International Conference, 1994


  Loading...