El quehacer cotidiano de los investigadores y estudiantes que forman parte de la comunidad académica del Centro de Investigación en Computación (CIC) se traduce en la generación de diversos productos, entre los que destaca la publicación de artículos de investigación de calidad internacional indexados en JCR e ISI, la publicación de libros y capítulos de libros derivados de proyectos de investigación, presentación de trabajos en congresos internacionales, así como la generación de solicitudes de formas de protección de propiedad intelectual, como patentes, derechos de autor, y modelos de utilidad, entre otros.
Título ↨ |
Tipo↨ |
Subtipo↨ |
Descripción↨ |
Año↨ |
Study of the Effect of the Primary Network Service Time on a Wireless Sensor Network for Seism Reporting in an Overlay Cognitive Radio System |
Revista |
JCR |
Research in Computing Science |
2017 |
A Survey on Information Security in Cloud Computing |
Revista |
CONACYT |
Computación y Sistemas |
2020 |
Ajuste de filtros wavelet utilizando K-NN para comprensión de imágenes sin perdida |
Revista |
JCR |
Dyna |
2016 |
Performance analysis of a wireless sensor network with cognitive radio capabilities in structural health monitoring applications: A discrete model |
Revista |
JCR |
International Journal of Distributed Sensor Networks |
2018 |
Seism report analysis in a wireless sensor network with cognitive radio capabilities |
Revista |
JCR |
Ad Hoc & Sensor Wireless Networks |
2017 |
Anonymity and Privacy Security Scheme on Location Based Services |
Revista |
CONACYT |
Computación y Sistemas |
2019 |
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments |
Revista |
JCR |
Mobile Networks and Applications |
2021 |
Reassessing Android Malware Analysis: From Apps
to IoT System Modelling |
Revista |
JCR |
EAI Endorsed Transactions
on Future Internet |
2018 |
Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection |
Revista |
JCR |
Journal of Sensors |
2019 |
Analysis of Feature Sets for Malware Family Classification |
Revista |
JCR |
Research in Computing Science |
2017 |
IoT Botnets |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Image compressive sensing cryptographic analysis |
Congreso |
Memoria |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Machine learning security assessment method based on adversary and attack methods |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Availability vulnerabilities evaluation to lorawan |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview |
Congreso |
Memoria |
Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop |
2016 |
Feature selection to detect botnets using machine learning algorithms |
Congreso |
Memoria |
International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2017 |
Security Oriented Methodology for Designing Internet of Things Systems |
Congreso |
Memoria |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements |
Congreso |
Memoria |
International Summit on Applications for Future Internet, AFI 2016 |
2016 |
Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Possible Keyloggers Without Implementing a Keyboard in Android |
Congreso |
Memoria |
13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 |
2018 |
Improving Android mobile application development by dissecting malware analysis data |
Congreso |
Memoria |
4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) |
2016 |
Towards a 2-hybrid Android malware detection test framework
|
Congreso |
Indefinido |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Reverse engineering with bioinformatics algorithms over a sound android covert channel |
Congreso |
Memoria |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016 |
2016 |