Planning exploration strategies for simultaneous localization and mapping B Tovar, L Munoz-Gómez, R Murrieta-Cid, M Alencastre-Miranda, ... Robotics and Autonomous Systems 54 (4), 314-331, 2006 | 129 | 2006 |
Absolute cross sections measurement for the 12C+ 12C system at astrophysically relevant energies L Barrón-Palos, EF Aguilera, J Aspiazu, A Huerta, E Martínez-Quiroz, ... Nuclear Physics A 779, 318-332, 2006 | 88 | 2006 |
Analyzing log files for postmortem intrusion detection KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012 | 55 | 2012 |
PBC4cip: A new contrast pattern-based classifier for class imbalance problems O Loyola-González, MA Medina-Pérez, JF Martínez-Trinidad, ... Knowledge-Based Systems 115, 100-109, 2017 | 47 | 2017 |
A complexity result for the pursuit-evasion game of maintaining visibility of a moving evader R Murrieta-Cid, R Monroy, S Hutchinson, JP Laumond 2008 IEEE International Conference on Robotics and Automation, 2657-2664, 2008 | 44 | 2008 |
Hybrid method for detecting masqueraders using session folding and hidden markov models R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores Mexican International Conference on Artificial Intelligence, 622-631, 2006 | 37 | 2006 |
Web attack detection using ID3 VH Garcia, R Monroy, M Quintana IFIP World Computer Congress, TC 12, 323-332, 2006 | 37 | 2006 |
Proof plans for the correction of false conjectures R Monroy, A Bundy, A Ireland International Conference on Logic for Programming Artificial Intelligence …, 1994 | 32 | 1994 |
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation. D Valdes-Ramirez, MA Medina-Pérez, R Monroy, O Loyola-González, ... IEEE Access 7 (1), 48484-48499, 2019 | 23 | 2019 |
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms JB Camina, C Hernández-Gracidas, R Monroy, L Trejo Expert systems with applications 41 (3), 919-930, 2014 | 22 | 2014 |
Formal support to security protocol development: A survey JC López Pimentel, R Monroy Computación y Sistemas 12 (1), 89-108, 2008 | 22 | 2008 |
Bagging-TPMiner: A classifier ensemble for masquerader detection based on typical objects MA Medina-Pérez, R Monroy, JB Camiña, M García-Borroto Soft Computing 21 (3), 557-569, 2017 | 20 | 2017 |
Towards a masquerade detection system based on user’s tasks JB Camina, J Rodríguez, R Monroy International Workshop on Recent Advances in Intrusion Detection, 447-465, 2014 | 19 | 2014 |
Towards building a masquerade detection method based on user file system navigation B Camiña, R Monroy, LA Trejo, E Sánchez Mexican International Conference on Artificial Intelligence, 174-186, 2011 | 19 | 2011 |
Contrast pattern-based classification for bot detection on twitter O Loyola-González, R Monroy, J Rodríguez, A López-Cuevas, ... IEEE Access 7, 45800-45817, 2019 | 18 | 2019 |
Temporal and spatial locality: an abstraction for masquerade detection JB Camina, R Monroy, LA Trejo, MA Medina-Pérez IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016 | 17 | 2016 |
Cluster validation using an ensemble of supervised classifiers J Rodríguez, MA Medina-Pérez, AE Gutierrez-Rodríguez, R Monroy, ... Knowledge-Based Systems 145, 134-144, 2018 | 16 | 2018 |
Proof-directed debugging and repair LA Dennis, R Monroy, P Nogueira Seventh Symposium on Trends in Functional Programming 2006, 131-140, 2006 | 16 | 2006 |
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data J Rodríguez, AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy Sensors 16 (10), 1619, 2016 | 15 | 2016 |
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 15 (4), 7619-7649, 2015 | 15 | 2015 |