El quehacer cotidiano de los investigadores y estudiantes que forman parte de la comunidad académica del Centro de Investigación en Computación (CIC) se traduce en la generación de diversos productos, entre los que destaca la publicación de artículos de investigación de calidad internacional indexados en JCR e ISI, la publicación de libros y capítulos de libros derivados de proyectos de investigación, presentación de trabajos en congresos internacionales, así como la generación de solicitudes de formas de protección de propiedad intelectual, como patentes, derechos de autor, y modelos de utilidad, entre otros.
Título ↨ |
Tipo↨ |
Subtipo↨ |
Descripción↨ |
Año↨ |
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments |
Revista |
JCR |
Mobile Networks and Applications |
2021 |
Machine learning security assessment method based on adversary and attack methods |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Availability vulnerabilities evaluation to lorawan |
Congreso |
SCOPUS |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
A Survey on Information Security in Cloud Computing |
Revista |
CONACYT |
Computación y Sistemas |
2020 |
IoT Botnets |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller |
Congreso |
Memoria |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Anonymity and Privacy Security Scheme on Location Based Services |
Revista |
CONACYT |
Computación y Sistemas |
2019 |
Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection |
Revista |
JCR |
Journal of Sensors |
2019 |
Possible Keyloggers Without Implementing a Keyboard in Android |
Congreso |
Memoria |
13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 |
2018 |
Performance analysis of a wireless sensor network with cognitive radio capabilities in structural health monitoring applications: A discrete model |
Revista |
JCR |
International Journal of Distributed Sensor Networks |
2018 |
Reassessing Android Malware Analysis: From Apps
to IoT System Modelling |
Revista |
JCR |
EAI Endorsed Transactions
on Future Internet |
2018 |
Seism report analysis in a wireless sensor network with cognitive radio capabilities |
Revista |
JCR |
Ad Hoc & Sensor Wireless Networks |
2017 |
Analysis of Feature Sets for Malware Family Classification |
Revista |
JCR |
Research in Computing Science |
2017 |
Study of the Effect of the Primary Network Service Time on a Wireless Sensor Network for Seism Reporting in an Overlay Cognitive Radio System |
Revista |
JCR |
Research in Computing Science |
2017 |
Security Oriented Methodology for Designing Internet of Things Systems |
Congreso |
Memoria |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
Feature selection to detect botnets using machine learning algorithms |
Congreso |
Memoria |
International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2017 |
Reverse engineering with bioinformatics algorithms over a sound android covert channel |
Congreso |
Memoria |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016 |
2016 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview |
Congreso |
Memoria |
Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop |
2016 |
Ajuste de filtros wavelet utilizando K-NN para comprensión de imágenes sin perdida |
Revista |
JCR |
Dyna |
2016 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements |
Congreso |
Memoria |
International Summit on Applications for Future Internet, AFI 2016 |
2016 |
Improving Android mobile application development by dissecting malware analysis data |
Congreso |
Memoria |
4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) |
2016 |
Image compressive sensing cryptographic analysis |
Congreso |
Memoria |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Towards a 2-hybrid Android malware detection test framework
|
Congreso |
Indefinido |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |