Routing protocols in wireless sensor networks LJG Villalba, ALS Orozco, AT Cabrera, CJB Abbas Sensors 9 (11), 8399-8421, 2009 | 410 | 2009 |
The 51% attack on blockchains: A mining behavior study FA Aponte-Novoa, ALS Orozco, R Villanueva-Polanco, P Wightman IEEE access 9, 140549-140564, 2021 | 95 | 2021 |
Adaptive artificial immune networks for mitigating DoS flooding attacks JM Vidal, ALS Orozco, LJG Villalba Swarm and Evolutionary Computation 38, 94-108, 2018 | 93 | 2018 |
Analysis of the GPS spoofing vulnerability in the drone 3DR solo SP Arteaga, LAM Hernández, GS Pérez, ALS Orozco, LJG Villalba IEEE Access 7, 51782-51789, 2019 | 86 | 2019 |
Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets D Gonzalez-Cuautle, A Hernandez-Suarez, G Sanchez-Perez, ... Applied Sciences 10 (3), 794, 2020 | 70 | 2020 |
An analysis of smart contracts security threats alongside existing solutions AL Vivar, AT Castedo, ALS Orozco, LJG Villalba Entropy 22 (2), 2020 | 56 | 2020 |
Smartphone image clustering LJG Villalba, ALS Orozco, JR Corripio Expert Systems with Applications 42 (4), 1927-1940, 2015 | 54 | 2015 |
Auto-Configuration Protocols in Mobile Ad Hoc Networks LJG Villalba, JG Matesanz, ALS Orozco, JDM Díaz Sensors 11 (4), 3652-3666, 2011 | 54 | 2011 |
Bio-inspired routing protocol for mobile ad hoc networks LJG Villalba, DR Cañas, ALS Orozco IET communications 4 (18), 2187-2195, 2010 | 49 | 2010 |
Distributed dynamic host configuration protocol (D2HCP) LJG Villalba, JG Matesanz, ALS Orozco, JDM Díaz Sensors 11 (4), 4438-4461, 2011 | 46 | 2011 |
A security framework for Ethereum smart contracts AL Vivar, ALS Orozco, LJG Villalba Computer Communications 172, 119-129, 2021 | 40 | 2021 |
Source smartphone identification using sensor pattern noise and wavelet transform JR Corripio, DMA González, ALS Orozco, LJG Villalba, ... IET Digital Library, 2013 | 39 | 2013 |
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols JJC Gondim, R de Oliveira Albuquerque, ALS Orozco Future Generation Computer Systems 108, 68-81, 2020 | 37 | 2020 |
Copy-move forgery detection technique based on discrete cosine transform blocks features EA Armas Vega, E González Fernández, AL Sandoval Orozco, ... Neural Computing and Applications 33, 4713-4727, 2021 | 36 | 2021 |
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques LJG Villalba, ALS Orozco, JR Corripio, J Hernandez-Castro Future generation computer systems 76, 418-427, 2017 | 35 | 2017 |
A layered trust information security architecture R de Oliveira Albuquerque, LJ García Villalba, AL Sandoval Orozco, ... Sensors 14 (12), 22754-22772, 2014 | 35 | 2014 |
Techniques for source camera identification ALS Orozco, DMA González, JR Corripio, LJG Villalba, ... Proceedings of the 6th international conference on information technology, 1-9, 2013 | 35 | 2013 |
Alert correlation framework for malware detection by anomaly-based packet payload analysis JM Vidal, ALS Orozco, LJG Villalba Journal of Network and Computer Applications 97, 11-22, 2017 | 34 | 2017 |
Leveraging information security and computational trust for cybersecurity R de Oliveira Albuquerque, LJ Garcia Villalba, AL Sandoval Orozco, ... The Journal of Supercomputing 72, 3729-3763, 2016 | 34 | 2016 |
A machine learning forensics technique to detect post-processing in digital videos ALS Orozco, CQ Huamán, DP Álvarez, LJG Villalba Future Generation Computer Systems 111, 199-212, 2020 | 33 | 2020 |