关注
Ana Lucila Sandoval Orozco
Ana Lucila Sandoval Orozco
Investigador Post-Doctoral Contratado, Facultad de Informática, Universidad Complutense de Madrid
在 fdi.ucm.es 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Routing protocols in wireless sensor networks
LJG Villalba, ALS Orozco, AT Cabrera, CJB Abbas
Sensors 9 (11), 8399-8421, 2009
4102009
The 51% attack on blockchains: A mining behavior study
FA Aponte-Novoa, ALS Orozco, R Villanueva-Polanco, P Wightman
IEEE access 9, 140549-140564, 2021
952021
Adaptive artificial immune networks for mitigating DoS flooding attacks
JM Vidal, ALS Orozco, LJG Villalba
Swarm and Evolutionary Computation 38, 94-108, 2018
932018
Analysis of the GPS spoofing vulnerability in the drone 3DR solo
SP Arteaga, LAM Hernández, GS Pérez, ALS Orozco, LJG Villalba
IEEE Access 7, 51782-51789, 2019
862019
Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets
D Gonzalez-Cuautle, A Hernandez-Suarez, G Sanchez-Perez, ...
Applied Sciences 10 (3), 794, 2020
702020
An analysis of smart contracts security threats alongside existing solutions
AL Vivar, AT Castedo, ALS Orozco, LJG Villalba
Entropy 22 (2), 2020
562020
Smartphone image clustering
LJG Villalba, ALS Orozco, JR Corripio
Expert Systems with Applications 42 (4), 1927-1940, 2015
542015
Auto-Configuration Protocols in Mobile Ad Hoc Networks
LJG Villalba, JG Matesanz, ALS Orozco, JDM Díaz
Sensors 11 (4), 3652-3666, 2011
542011
Bio-inspired routing protocol for mobile ad hoc networks
LJG Villalba, DR Cañas, ALS Orozco
IET communications 4 (18), 2187-2195, 2010
492010
Distributed dynamic host configuration protocol (D2HCP)
LJG Villalba, JG Matesanz, ALS Orozco, JDM Díaz
Sensors 11 (4), 4438-4461, 2011
462011
A security framework for Ethereum smart contracts
AL Vivar, ALS Orozco, LJG Villalba
Computer Communications 172, 119-129, 2021
402021
Source smartphone identification using sensor pattern noise and wavelet transform
JR Corripio, DMA González, ALS Orozco, LJG Villalba, ...
IET Digital Library, 2013
392013
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols
JJC Gondim, R de Oliveira Albuquerque, ALS Orozco
Future Generation Computer Systems 108, 68-81, 2020
372020
Copy-move forgery detection technique based on discrete cosine transform blocks features
EA Armas Vega, E González Fernández, AL Sandoval Orozco, ...
Neural Computing and Applications 33, 4713-4727, 2021
362021
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques
LJG Villalba, ALS Orozco, JR Corripio, J Hernandez-Castro
Future generation computer systems 76, 418-427, 2017
352017
A layered trust information security architecture
R de Oliveira Albuquerque, LJ García Villalba, AL Sandoval Orozco, ...
Sensors 14 (12), 22754-22772, 2014
352014
Techniques for source camera identification
ALS Orozco, DMA González, JR Corripio, LJG Villalba, ...
Proceedings of the 6th international conference on information technology, 1-9, 2013
352013
Alert correlation framework for malware detection by anomaly-based packet payload analysis
JM Vidal, ALS Orozco, LJG Villalba
Journal of Network and Computer Applications 97, 11-22, 2017
342017
Leveraging information security and computational trust for cybersecurity
R de Oliveira Albuquerque, LJ Garcia Villalba, AL Sandoval Orozco, ...
The Journal of Supercomputing 72, 3729-3763, 2016
342016
A machine learning forensics technique to detect post-processing in digital videos
ALS Orozco, CQ Huamán, DP Álvarez, LJG Villalba
Future Generation Computer Systems 111, 199-212, 2020
332020
系统目前无法执行此操作,请稍后再试。
文章 1–20