El quehacer cotidiano de los investigadores y estudiantes que forman parte de la comunidad académica del Centro de Investigación en Computación (CIC) se traduce en la generación de diversos productos, entre los que destaca la publicación de artículos de investigación de calidad internacional indexados en JCR e ISI, la publicación de libros y capítulos de libros derivados de proyectos de investigación, presentación de trabajos en congresos internacionales, así como la generación de solicitudes de formas de protección de propiedad intelectual, como patentes, derechos de autor, y modelos de utilidad, entre otros.
Título ↨ | Tipo↨ | Subtipo↨ | Descripción↨ | Año↨ |
---|---|---|---|---|
Image compressive sensing cryptographic analysis | Congreso | Memoria | 26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) | 2016 |
Towards a 2-hybrid Android malware detection test framework | Congreso | Indefinido | 26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) | 2016 |
Improving Android mobile application development by dissecting malware analysis data | Congreso | Memoria | 4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) | 2016 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements | Congreso | Memoria | International Summit on Applications for Future Internet, AFI 2016 | 2016 |
Feature selection to detect botnets using machine learning algorithms | Congreso | Memoria | International Conference on Electronics, Communications and Computers (CONIELECOMP) | 2017 |
Possible Keyloggers Without Implementing a Keyboard in Android | Congreso | Memoria | 13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 | 2018 |
Security Oriented Methodology for Designing Internet of Things Systems | Congreso | Memoria | 1st EAI International Conference on Smart Technology, MTYMEX 2017 | 2017 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview | Congreso | Memoria | Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop | 2016 |
IoT Botnets | Congreso | Memoria | 8th International Congress on Telematics and Computing, WITCOM 2019 | 2019 |
Availability vulnerabilities evaluation to lorawan | Congreso | SCOPUS | 9th International Congress on Telematics and Computing, WITCOM 2020 | 2020 |
Machine learning security assessment method based on adversary and attack methods | Congreso | SCOPUS | 9th International Congress on Telematics and Computing, WITCOM 2020 | 2020 |
Reverse engineering with bioinformatics algorithms over a sound android covert channel | Congreso | Memoria | 11th International Conference on Malicious and Unwanted Software, MALWARE 2016 | 2016 |
Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller | Congreso | Memoria | 8th International Congress on Telematics and Computing, WITCOM 2019 | 2019 |