Pablo Velarde-Alvarado

ORCID: 0000-0002-1211-1061
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Anomaly Detection Techniques and Applications
  • Advanced Authentication Protocols Security
  • Advanced Image and Video Retrieval Techniques
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Cryptography and Data Security
  • Image Retrieval and Classification Techniques
  • Information and Cyber Security
  • Privacy, Security, and Data Protection
  • Remote Sensing and LiDAR Applications
  • Robotics and Sensor-Based Localization
  • Media and Digital Communication
  • Biometric Identification and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Innovation and Knowledge Management
  • Constraint Satisfaction and Optimization
  • Video Surveillance and Tracking Methods
  • Network Packet Processing and Optimization
  • Advanced Wireless Communication Techniques
  • Cybercrime and Law Enforcement Studies
  • Journalism and Media Studies
  • Wireless Signal Modulation Classification

Universidad Autónoma de Nayarit
2012-2024

Cultura
2010-2014

Instituto Tecnológico de Costa Rica
2010

Instituto Politécnico Nacional
2008

RWTH Aachen University
2001-2003

This study presents a sustainable digital transformation framework to integrate practices into initiatives within Small and Medium Enterprises (SMEs). The methodology includes literature review, creation, case with passive participation. was structured help industries implement responsible digitalization in five key stages: setting objectives, fostering stakeholder-focused engagement, defining objectives dimensions, creating model, executing the project. Validating proposal context of an SME...

10.3390/su16114447 article EN Sustainability 2024-05-24

Six preprocessing algorithms for the detection of firearm gunshots are statistically evaluated, using receiver operating characteristic method as a previous feasibility metric their implementation on low-power VLSI circuit. Circuits intended to serve input sensors environmental surveillance network. Some possible implementations evaluated also evaluated. Results indicate that use wavelet bank filters, either discrete or continuous, might be best choice in terms compromise between efficiency...

10.1109/tcsi.2010.2072052 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2010-11-10

Mobile electrocardiogram (ECG) monitoring is an emerging area that has received increasing attention in recent years, but still real-life validation for elderly residing low and middle-income countries scarce. We developed a wearable ECG monitor integrated with self-designed wireless sensor signal acquisition. It used native purposely designed smartphone application, based on machine learning techniques, automated classification of captured beats from aged people. When tested 100 older...

10.1155/2018/9128054 article EN cc-by Computational and Mathematical Methods in Medicine 2018-05-29

Network security is a topical issue today for everyone connected to Internet. However, malicious users try obtain unauthorized access network resources, affecting integrity, confidentiality, and availability. As consequence, researchers, developers administrators have created many mechanisms in order enhance security. Among the solutions that we can find market, Intrusion Detection Systems monitor inbound outbound activity, identifying suspicious traffic. IDS compare typical activity with...

10.1109/conielecomp.2018.8327205 article EN 2018-02-01

Machine learning for financial risk prediction has garnered substantial interest in recent decades. However, the class imbalance problem and dilemma of accuracy gain by loss interpretability have yet to be widely studied. Symbolic classifiers emerged as a promising solution forecasting banking failures estimating creditworthiness it addresses while maintaining both interpretability. This paper aims evaluate effectiveness REMED, symbolic classifier, context management, focuses on its ability...

10.1057/s41599-024-04047-5 article EN cc-by-nc-nd Humanities and Social Sciences Communications 2024-11-14

Attacks, such as port scans, DDoS and worms, threaten the functionality reliability of IP networks. Early accurate detection is crucial to mitigate their impact. We use Method Remaining Elements (MRE) detect anomalies based on characterization traffic features through a proportional uncertainty measure. MRE has performance abnormal behavior serve foundation for next generation network intrusion systems.

10.1109/lcomm.2009.090689 article EN IEEE Communications Letters 2009-06-01

In this paper, we addressed the problem of dataset scarcity for task network intrusion detection. Our main contribution was to develop a framework that provides complete process generating traffic datasets based on aggregation real traces. addition, proposed set tools attribute extraction and labeling sessions. A new with botnet generated by assess our method machine learning algorithms suitable unbalanced data. The performance classifiers evaluated in terms macro-averages F1-score (0.97)...

10.3390/s22051847 article EN cc-by Sensors 2022-02-26

This paper proposes an Entropy-Mahalanobis-based methodology to detect certain anomalies in IP traffic. The balanced estimator II is used model the normal behavior of two intrinsic traffic features: source and destination addresses. Mahalanobis distance allows describe ellipse that characterizes network entropy, which determine whether a given actual traffic-slot or anomalous. Experimental tests were conducted evaluate performance detection portscan worm attacks deployed campus network,...

10.1109/conielecomp.2012.6189887 article EN 2012-02-01

In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level flow-level are proposed, which can be applied profiling in intrusion detection systems. The empirical analysis our profiles through the rate remaining features at packet-level, as well three-dimensional spaces entropy flow-level, provide a fast intrusions caused by port scanning worm attacks.

10.4236/jcc.2014.211003 article EN Journal of Computer and Communications 2014-01-01

In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second is Wang etal.’s scheme. both cases, authors claimed that their schemes can resist many attacks. However, we find thatboth have flaws. addition, require verification table time-synchronization,making unfeasible unsecured for electronic services. order to remedy flaws ofSood schemes, propose robust which resists well-known...

10.1016/s1665-6423(13)71583-9 article EN Journal of Applied Research and Technology 2013-10-01

Research Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traffic trace data. Traditional datasets present several issues such as: removal of sensitive information (anonymization) and insufficient number or volume attack instances, which limit their quality for the design evaluation A-NIDSs. In this paper, we a method anomalous filtering can be used generating anomaly-free traces. The sanitized dataset to improve computation behaviour profiles during training...

10.1016/j.protcy.2013.04.045 article EN Procedia Technology 2013-01-01

Este estudio sobre audiencias en festivales de cine Chile establece cuatro categorias analiticas audiencia, segun habitos consumo: reales, transitorias, potenciales y especificas. En base a una metodologia mixta -entrevistas profundidad, encuesta observacion participante 6 cine- se arrojaron conclusiones todos los actores del sector audiovisual: publico, industria, realizadores, distribuidores, audiencias. Los resultados dan cuenta la falta un proyecto transversal al sector, destacan las...

10.5354/rcm.v0i30.31610 article ES Comunicación y Medios 2014-01-01

This research challenges assumptions about cybersecurity risk factors, revealing that age, gender, and educational background are not significant determinants of employee susceptibility. It highlights the importance inclusive training programs cater to individuals all age groups, dispelling misconception older employees inherently less tech-savvy more susceptible threats. The findings show teams within organizations significantly impact adoption security policies data handling practices...

10.4018/ijisp.359412 article EN cc-by International Journal of Information Security and Privacy 2024-11-10

In 1996, Blonder introduced the first authentication system based on a graphical password. Since then, researchers have proposed several systems in literature enhancing security properties to prevent brute-force, guessing, and shoulder-surfing attacks. However, many were developed using impersonal images, hindering their identification retention. As solution, Takada-Toike, Herzberg-Margulies personal images 2002 2012, respectively. Nonetheless, users require passing stages during phase,...

10.1109/tla.2018.8408449 article EN IEEE Latin America Transactions 2018-05-01

In this paper, a technique for detecting anomalous behavior traffic in computer network is presented. Entropy space method based on 3D-space built flow-packet level. The complete set of points obtained the can be seen as data cloud. Each 3D point value clusters each slot traffic. selected features are done by applying Pattern Recognition, Principal Component Analysis, and Kernel Density Estimation. At next stage, modelled using Gaussian Mixtures Extreme Generalized Distributions, which...

10.1016/j.protcy.2012.03.011 article EN Procedia Technology 2012-01-01

This paper introduces an Anomaly-based Intrusion Detection architecture based on behavioral traffic profiles created by using our enhanced version of the Method Remaining Elements (MRE). includes: a redefinition exposure threshold through entropy and cardinality residual sequences, dual characterization for two types slots, introduction Anomaly Level Exposure (ALE) that gives better quantification anomalies given slot r-feature, alternative support extends its detection capabilities, new...

10.22201/icat.16656423.2010.8.02.465 article EN Journal of Applied Research and Technology 2010-08-01

Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates theirscheme is still unsecured against different kinds of attacks. In order to enhance the security by Chen-Hsiang-Shih, proposed. achieves following goals: without verification table, each chooses and changes password freely, keeps secret, mutual authentication, establishes session key after...

10.17533/udea.redin.17038 article EN cc-by-nc-sa Revista Facultad de Ingeniería Universidad de Antioquia 2013-10-18
Coming Soon ...