Name
Affiliation
Papers
ANA LUCILA SANDOVAL OROZCO
Grupo de Análisis, Seguridad y Sistemas (GASS), Departamento de Ingenierí-a del Software e Inteligencia Artificial (DISIA), Facultad de Informática, Despacho 431, Universidad Complu ...
62
Collaborators
Citations 
PageRank 
69
174
26.45
Referers 
Referees 
References 
410
1183
535
Search Limit
1001000
Title
Citations
PageRank
Year
Analysis of MP4 Videos in 5G Using SDN00.342022
Digital Video Manipulation Detection Technique Based on Compression Algorithms00.342022
Copy-Move Forgery Detection Technique Based On Discrete Cosine Transform Blocks Features00.342021
Compression effects and scene details on the source camera identification of digital videos10.362021
Digital Video Source Identification Based On Container'S Structure Analysis00.342020
Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression10.352020
An Analysis of Smart Contracts Security Threats Alongside Existing Solutions.00.342020
Image tampering detection by estimating interpolation patterns10.352020
A machine learning forensics technique to detect post-processing in digital videos.00.342020
Hy-Sail: Hyper-Scalability, Availability And Integrity Layer For Cloud Storage Systems00.342019
A comparison of learning methods over raw data: forecasting cab services market share in New York City10.352019
EBVBF: Energy Balanced Vector Based Forwarding Protocol00.342019
Vehicle Counting in Video Sequences: An Incremental Subspace Learning Approach.00.342019
Locating similar names through locality sensitive hashing and graph theory00.342019
Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services00.342019
A traffic analysis attack to compute social network measures10.352019
Analysis Of The Gps Spoofing Vulnerability In The Drone 3dr Solo00.342019
Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.00.342019
Distributed One Time Password Infrastructure for Linux Environments.00.342018
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.10.342018
Ransomware Automatic Data Acquisition Tool.00.342018
Adaptive artificial immune networks for mitigating DoS flooding attacks.60.492018
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.00.342018
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.50.452017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.00.342017
Alert correlation framework for malware detection by anomaly-based packet payload analysis.40.442017
Advanced Payload Analyzer Preprocessor.10.362017
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.10.372017
Theia: a tool for the forensic analysis of mobile devices pictures.00.342016
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.00.342016
Online masquerade detection resistant to mimicry.20.372016
Identification of smartphone brand and model via forensic video analysis.40.412016
Leveraging information security and computational trust for cybersecurity20.382016
Disclosing user relationships in email networks10.352016
Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks.00.342016
Advances on Software Defined Sensor, Mobile, and Fixed Networks.00.342016
On multiple burst-correcting MDS codes00.342016
Analysis of errors in exif metadata on mobile devices40.402015
Optimum shortened cyclic codes for multiple burst-error correction00.342015
A layered trust information security architecture.20.402014
Adaptive routing protocol for mobile ad hoc networks10.372014
E-D2HCP: enhanced distributed dynamic host configuration protocol.50.482014
A Zone-Based Media Independent Information Service For Ieee 802.21 Networks20.502014
Parallel approach of a bioinspired routing protocol for MANETs20.412013
Hybrid Aco Routing Protocol For Mobile Ad Hoc Networks50.452013
Multiple Interface Parallel Approach Of Bioinspired Routing Protocol For Mobile Ad Hoc Networks10.372012
A distributed QoS mechanism for ad hoc network30.382012
Technique to Neutralize Link Failures for an ACO-Based Routing Algorithm.00.342012
Security Issues In Mobile Ad Hoc Networks10.352012
Malware detection system by payload analysis of network traffic (poster abstract)50.742012
  • 1
  • 2