El quehacer cotidiano de los investigadores y estudiantes que forman parte de la comunidad académica del Centro de Investigación en Computación (CIC) se traduce en la generación de diversos productos, entre los que destaca la publicación de artículos de investigación de calidad internacional indexados en JCR e ISI, la publicación de libros y capítulos de libros derivados de proyectos de investigación, presentación de trabajos en congresos internacionales, así como la generación de solicitudes de formas de protección de propiedad intelectual, como patentes, derechos de autor, y modelos de utilidad, entre otros.
Título ↨ |
Tipo↨ |
Subtipo↨ |
Descripción↨ |
Año↨ |
Analysis of Feature Sets for Malware Family Classification |
Revista |
JCR |
Research in Computing Science |
2017 |
Study of the Effect of the Primary Network Service Time on a Wireless Sensor Network for Seism Reporting in an Overlay Cognitive Radio System |
Revista |
JCR |
Research in Computing Science |
2017 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview |
Congreso |
Memoria |
Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop |
2016 |
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments |
Revista |
JCR |
Mobile Networks and Applications |
2021 |
Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection |
Revista |
JCR |
Journal of Sensors |
2019 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements |
Congreso |
Memoria |
International Summit on Applications for Future Internet, AFI 2016 |
2016 |
Performance analysis of a wireless sensor network with cognitive radio capabilities in structural health monitoring applications: A discrete model |
Revista |
JCR |
International Journal of Distributed Sensor Networks |
2018 |
Feature selection to detect botnets using machine learning algorithms |
Congreso |
Memoria |
International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2017 |
Reassessing Android Malware Analysis: From Apps
to IoT System Modelling |
Revista |
JCR |
EAI Endorsed Transactions
on Future Internet |
2018 |
Ajuste de filtros wavelet utilizando K-NN para comprensión de imágenes sin perdida |
Revista |
JCR |
Dyna |
2016 |
Anonymity and Privacy Security Scheme on Location Based Services |
Revista |
CONACYT |
Computación y Sistemas |
2019 |
A Survey on Information Security in Cloud Computing |
Revista |
CONACYT |
Computación y Sistemas |
2020 |
Seism report analysis in a wireless sensor network with cognitive radio capabilities |
Revista |
JCR |
Ad Hoc & Sensor Wireless Networks |
2017 |
Machine learning security assessment method based on adversary and attack methods |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Availability vulnerabilities evaluation to lorawan |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
IoT Botnets |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Improving Android mobile application development by dissecting malware analysis data |
Congreso |
Memoria |
4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) |
2016 |
Image compressive sensing cryptographic analysis |
Congreso |
Memoria |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Towards a 2-hybrid Android malware detection test framework
|
Congreso |
Indefinido |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Security Oriented Methodology for Designing Internet of Things Systems |
Congreso |
Memoria |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
Possible Keyloggers Without Implementing a Keyboard in Android |
Congreso |
Memoria |
13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 |
2018 |
Reverse engineering with bioinformatics algorithms over a sound android covert channel |
Congreso |
Memoria |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016 |
2016 |