Alberto F. Martínez-Herrera

Orcid: 0000-0002-7982-2255

Affiliations:
  • Center for Electronics and Telecommunications, Monterrey, Mexico


According to our database1, Alberto F. Martínez-Herrera authored at least 12 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparative Analysis of Metaheuristics for Solving the Optimal Power Flow With Renewable Sources and Valve-Point Constraints.
IEEE Access, 2024

Comparative Analysis of Nature-Inspired Algorithms for Optimal Power Flow Problem: A Focus on Penalty-Vanishing Terms and Algorithm Performance.
IEEE Access, 2024

2021
A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks.
Sensors, 2021

Solving routing and spectrum allocation problems in flexgrid optical networks using pre-computing strategies.
Photonic Netw. Commun., 2021

The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis.
Comput. Electr. Eng., 2021

2019
Efficient designs of splitter/combiner silicon photonics devices.
Proceedings of the 21st International Conference on Transparent Optical Networks, 2019

2018
Differential evolution algorithm applied to wireless sensor distribution on different geometric shapes with area and energy optimization.
J. Netw. Comput. Appl., 2018

2016
An unsupervised approach for traffic trace sanitization based on the entropy spaces.
Telecommun. Syst., 2016

GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier.
Microprocess. Microsystems, 2016

2013
Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Some Representations of the S-Box of Camellia in <i>GF</i>(((2<sup>2</sup>)<sup>2</sup>)<sup>2</sup>).
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2009
Detecting anomalies in network traffic using the method of remaining elements.
IEEE Commun. Lett., 2009


  Loading...