Titulo |
Descripción |
Año |
System identification for the Hammerhead autonomous underwater vehicle |
International Conference on Innovation, Entrepreneurship and Technology (ICONIET) |
2015 |
Internet de las Cosas: 50 Mil Millones de Puntos Inseguros |
Centro de Ciencias Aplicadas y Desarrollo Tecnológico, CCADET; SOMI XXX Congreso de Instrumentación |
2015 |
Employing Fuzzy Logic Systems to improve Call Admission Control in ATM Networks |
Centro de Ciencias Aplicadas y Desarrollo Tecnológico, CCADET; SOMI XXX Congreso de Instrumentación |
2015 |
Improving Android mobile application development by dissecting malware analysis data |
4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) |
2016 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements |
International Summit on Applications for Future Internet, AFI 2016 |
2016 |
Possible Keyloggers Without Implementing a Keyboard in Android |
13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 |
2018 |
Security Oriented Methodology for Designing Internet of Things Systems |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview |
Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop |
2016 |
IoT Botnets |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
IPN Sustainability Program: Solar Photovoltaic Electricity Generation and Consumption Reduction |
2nd Ibero-American Congress of Smart Cities, ICSC-CITIES 2019 |
2019 |
Availability vulnerabilities evaluation to lorawan |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Reverse engineering with bioinformatics algorithms over a sound android covert channel |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016 |
2016 |
Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements |
2020 IEEE Colombian Conference on Communications and Computing, COLCOM 2020 |
2020 |
Evolution of COVID-19 patients in Mexico city using markov chains |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
A bio-inspired cybersecurity schemeto protect a swarm of robots |
17th Mexican International Conference on Artificial Intelligence, MICAI 2018 |
2018 |
Accelerometer based body area network sensor authentication |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
IoTsec: UML extension for internet of things systems security modelling |
2017 International Conference on Mechatronics, Electronics, and Automotive Engineering, ICMEAE 2017 |
2017 |
Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers |
11th International Conference on Malicious and Unwanted Software, MALWARE 2016 |
2016 |
Short range, >100Kbits/s, visible light communication protocol design for high-gamma smartphones |
20th Annual Conference for Novel Optical Systems Design and Optimization |
2017 |
Hybrid methodologies for modal parameters extraction for structural health monitoring |
2016 IEEE Colombian Conference on Communications and Computing, COLCOM 2016 |
2016 |
Página 2 de 3, Viendo 20 registros de 47 en total, Registro inicial 21, registro final 40.