Luis A. Trejo
Luis A. Trejo
Tecnologico de Monterrey
Verified email at - Homepage
Cited by
Cited by
Multi-sensor fusion for activity recognition—A survey
AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo
Sensors 19 (17), 3808, 2019
Analyzing log files for postmortem intrusion detection
KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
Choosing the best sensor fusion method: A machine-learning approach
RF Brena, AA Aguileta, LA Trejo, E Molino-Minero-Re, O Mayora
Sensors 20 (8), 2350, 2020
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
JB Camina, C Hernández-Gracidas, R Monroy, L Trejo
Expert systems with applications 41 (3), 919-930, 2014
Towards building a masquerade detection method based on user file system navigation
B Camiña, R Monroy, LA Trejo, E Sánchez
Advances in Artificial Intelligence: 10th Mexican International Conference …, 2011
Online personal risk detection based on behavioural and physiological patterns
AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy, JB Camiña, ...
Information Sciences 384, 281-297, 2017
Ensemble of one-class classifiers for personal risk detection based on wearable sensor data
J Rodríguez, AY Barrera-Animas, LA Trejo, MA Medina-Pérez, R Monroy
Sensors 16 (10), 1619, 2016
Temporal and spatial locality: an abstraction for masquerade detection
JB Camiña, R Monroy, LA Trejo, MA Medina-Pérez
IEEE transactions on information Forensics and Security 11 (9), 2036-2051, 2016
DNS-ADVP: A machine learning anomaly detection and visual platform to protect top-level domain name servers against DDoS attacks
LA Trejo, V Ferman, MA Medina-Pérez, FMA Giacinti, R Monroy, ...
IEEE Access 7, 116358-116369, 2019
FiToViz: A visualisation approach for real-time risk situation awareness
A López-Cuevas, MA Medina-Pérez, R Monroy, JE Ramirez-Marquez, ...
IEEE Transactions on Affective Computing 9 (3), 372-382, 2017
On the detection of low-rate denial of service attacks at transport and application layers
V Vedula, P Lama, RV Boppana, LA Trejo
Electronics 10 (17), 2105, 2021
Programming environment for phase-reconfigurable parallel programming on SuperNode
JM Adamo, L Trejo
Journal of Parallel and Distributed Computing 23 (3), 278-292, 1994
Mining IP to domain name interactions to detect DNS flood attacks on recursive DNS servers
R Alonso, R Monroy, LA Trejo
Sensors 16 (8), 1311, 2016
Virtual sensors for optimal integration of human activity data
AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re, LA Trejo
Sensors 19 (9), 2017, 2019
Toward the protection of iot networks: Introducing the latam-ddos-iot dataset
JG Almaraz-Rivera, JA Perez-Diaz, JA Cantoral-Ceballos, JF Botero, ...
IEEE Access 10, 106909-106920, 2022
Spanning Tree Protocol and Ethernet PAUSE Frames DDoS Attacks: Their Efficient Mitigation
LA Trejo, R Monroy, RL Monsalvo
Zitiert auf, 20, 2006
Improving back-propagation: Epsilon-back-propagation
LA Trejo, C Sandoval
International Workshop on Artificial Neural Networks, 427-432, 1995
The C_NET programming environment: An overview
JM Adamo, C Bonello, L Trejo
International Conference on Vector and Parallel Processing, 115-120, 1992
Developing a high level programming environment for Supernode
JM Adamo, J Bonneville, C Bonello, P Moukeli, N Alhafez, L Trejo
Proceedings of Transputer Application-Glasgow,(UK), 632-637, 1991
An improved non-negative matrix factorization method for masquerade detection
C Mex-Perera, R Posadas, JA Nolazco, R Monroy, A Soberanes, L Trejo
Proceedings of the 1st Mexican international conference on informatics …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20