- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Advanced Image and Video Retrieval Techniques
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Cryptography and Data Security
- Image Retrieval and Classification Techniques
- Information and Cyber Security
- Privacy, Security, and Data Protection
- Remote Sensing and LiDAR Applications
- Robotics and Sensor-Based Localization
- Media and Digital Communication
- Biometric Identification and Security
- Vehicular Ad Hoc Networks (VANETs)
- Innovation and Knowledge Management
- Constraint Satisfaction and Optimization
- Video Surveillance and Tracking Methods
- Network Packet Processing and Optimization
- Advanced Wireless Communication Techniques
- Cybercrime and Law Enforcement Studies
- Journalism and Media Studies
- Wireless Signal Modulation Classification
Universidad Autónoma de Nayarit
2012-2024
Cultura
2010-2014
Instituto Tecnológico de Costa Rica
2010
Instituto Politécnico Nacional
2008
RWTH Aachen University
2001-2003
This study presents a sustainable digital transformation framework to integrate practices into initiatives within Small and Medium Enterprises (SMEs). The methodology includes literature review, creation, case with passive participation. was structured help industries implement responsible digitalization in five key stages: setting objectives, fostering stakeholder-focused engagement, defining objectives dimensions, creating model, executing the project. Validating proposal context of an SME...
Six preprocessing algorithms for the detection of firearm gunshots are statistically evaluated, using receiver operating characteristic method as a previous feasibility metric their implementation on low-power VLSI circuit. Circuits intended to serve input sensors environmental surveillance network. Some possible implementations evaluated also evaluated. Results indicate that use wavelet bank filters, either discrete or continuous, might be best choice in terms compromise between efficiency...
Mobile electrocardiogram (ECG) monitoring is an emerging area that has received increasing attention in recent years, but still real-life validation for elderly residing low and middle-income countries scarce. We developed a wearable ECG monitor integrated with self-designed wireless sensor signal acquisition. It used native purposely designed smartphone application, based on machine learning techniques, automated classification of captured beats from aged people. When tested 100 older...
Network security is a topical issue today for everyone connected to Internet. However, malicious users try obtain unauthorized access network resources, affecting integrity, confidentiality, and availability. As consequence, researchers, developers administrators have created many mechanisms in order enhance security. Among the solutions that we can find market, Intrusion Detection Systems monitor inbound outbound activity, identifying suspicious traffic. IDS compare typical activity with...
Machine learning for financial risk prediction has garnered substantial interest in recent decades. However, the class imbalance problem and dilemma of accuracy gain by loss interpretability have yet to be widely studied. Symbolic classifiers emerged as a promising solution forecasting banking failures estimating creditworthiness it addresses while maintaining both interpretability. This paper aims evaluate effectiveness REMED, symbolic classifier, context management, focuses on its ability...
Attacks, such as port scans, DDoS and worms, threaten the functionality reliability of IP networks. Early accurate detection is crucial to mitigate their impact. We use Method Remaining Elements (MRE) detect anomalies based on characterization traffic features through a proportional uncertainty measure. MRE has performance abnormal behavior serve foundation for next generation network intrusion systems.
In this paper, we addressed the problem of dataset scarcity for task network intrusion detection. Our main contribution was to develop a framework that provides complete process generating traffic datasets based on aggregation real traces. addition, proposed set tools attribute extraction and labeling sessions. A new with botnet generated by assess our method machine learning algorithms suitable unbalanced data. The performance classifiers evaluated in terms macro-averages F1-score (0.97)...
This paper proposes an Entropy-Mahalanobis-based methodology to detect certain anomalies in IP traffic. The balanced estimator II is used model the normal behavior of two intrinsic traffic features: source and destination addresses. Mahalanobis distance allows describe ellipse that characterizes network entropy, which determine whether a given actual traffic-slot or anomalous. Experimental tests were conducted evaluate performance detection portscan worm attacks deployed campus network,...
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level flow-level are proposed, which can be applied profiling in intrusion detection systems. The empirical analysis our profiles through the rate remaining features at packet-level, as well three-dimensional spaces entropy flow-level, provide a fast intrusions caused by port scanning worm attacks.
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second is Wang etal.’s scheme. both cases, authors claimed that their schemes can resist many attacks. However, we find thatboth have flaws. addition, require verification table time-synchronization,making unfeasible unsecured for electronic services. order to remedy flaws ofSood schemes, propose robust which resists well-known...
Research Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traffic trace data. Traditional datasets present several issues such as: removal of sensitive information (anonymization) and insufficient number or volume attack instances, which limit their quality for the design evaluation A-NIDSs. In this paper, we a method anomalous filtering can be used generating anomaly-free traces. The sanitized dataset to improve computation behaviour profiles during training...
Este estudio sobre audiencias en festivales de cine Chile establece cuatro categorias analiticas audiencia, segun habitos consumo: reales, transitorias, potenciales y especificas. En base a una metodologia mixta -entrevistas profundidad, encuesta observacion participante 6 cine- se arrojaron conclusiones todos los actores del sector audiovisual: publico, industria, realizadores, distribuidores, audiencias. Los resultados dan cuenta la falta un proyecto transversal al sector, destacan las...
This research challenges assumptions about cybersecurity risk factors, revealing that age, gender, and educational background are not significant determinants of employee susceptibility. It highlights the importance inclusive training programs cater to individuals all age groups, dispelling misconception older employees inherently less tech-savvy more susceptible threats. The findings show teams within organizations significantly impact adoption security policies data handling practices...
In 1996, Blonder introduced the first authentication system based on a graphical password. Since then, researchers have proposed several systems in literature enhancing security properties to prevent brute-force, guessing, and shoulder-surfing attacks. However, many were developed using impersonal images, hindering their identification retention. As solution, Takada-Toike, Herzberg-Margulies personal images 2002 2012, respectively. Nonetheless, users require passing stages during phase,...
In this paper, a technique for detecting anomalous behavior traffic in computer network is presented. Entropy space method based on 3D-space built flow-packet level. The complete set of points obtained the can be seen as data cloud. Each 3D point value clusters each slot traffic. selected features are done by applying Pattern Recognition, Principal Component Analysis, and Kernel Density Estimation. At next stage, modelled using Gaussian Mixtures Extreme Generalized Distributions, which...
This paper introduces an Anomaly-based Intrusion Detection architecture based on behavioral traffic profiles created by using our enhanced version of the Method Remaining Elements (MRE). includes: a redefinition exposure threshold through entropy and cardinality residual sequences, dual characterization for two types slots, introduction Anomaly Level Exposure (ALE) that gives better quantification anomalies given slot r-feature, alternative support extends its detection capabilities, new...
Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates theirscheme is still unsecured against different kinds of attacks. In order to enhance the security by Chen-Hsiang-Shih, proposed. achieves following goals: without verification table, each chooses and changes password freely, keeps secret, mutual authentication, establishes session key after...