Ana Lucila Sandoval Orozco
Orcid: 0000-0002-2846-9017
According to our database1,
Ana Lucila Sandoval Orozco
authored at least 89 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
3
1
4
5
4
9
9
5
5
10
5
5
2
5
7
1
1
2
1
2
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.
Data, 2024
2023
Expert Syst. Appl., November, 2023
Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques.
Future Internet, May, 2023
Expert Syst. Appl., April, 2023
ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning.
Sensors, February, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Sensors, 2022
A survey of artificial intelligence strategies for automatic detection of sexually explicit videos.
Multim. Tools Appl., 2022
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
Level of Trust and Privacy Management in 6G Intent-based Networks for Vertical Scenarios.
Proceedings of the 1st International Conference on 6G Networking, 2022
2021
Copy-move forgery detection technique based on discrete cosine transform blocks features.
Neural Comput. Appl., 2021
Compression effects and scene details on the source camera identification of digital videos.
Expert Syst. Appl., 2021
2020
Anonymous Real-Time Analytics Monitoring Solution for Decision Making Supported by Sentiment Analysis.
Sensors, 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Authentication and integrity of smartphone videos through multimedia container structure analysis.
Future Gener. Comput. Syst., 2020
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols.
Future Gener. Comput. Syst., 2020
Entropy, 2020
Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression.
IEEE Access, 2020
Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension.
IEEE Access, 2020
IEEE Access, 2020
2019
Sensors, 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A comparison of learning methods over raw data: forecasting cab services market share in New York City.
Multim. Tools Appl., 2019
Digital Video Source Acquisition Forgery Technique Based on Pattern Sensor Noise Extraction.
IEEE Access, 2019
Outdoor Location of Mobile Devices Using Trilateration Algorithms for Emergency Services.
IEEE Access, 2019
Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems.
IEEE Access, 2019
2018
Swarm Evol. Comput., 2018
Sensors, 2018
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018
2017
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
Symmetry, 2017
Alert correlation framework for malware detection by anomaly-based packet payload analysis.
J. Netw. Comput. Appl., 2017
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017
2016
J. Supercomput., 2016
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Sensors, 2016
Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016
Int. J. Distributed Sens. Networks, 2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
Expert Syst. Appl., 2016
2015
Proceedings of the Handbook on Data Centers, 2015
Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level.
Proceedings of the Handbook on Data Centers, 2015
Proceedings of the Handbook on Data Centers, 2015
IET Comput. Vis., 2015
ACM Commun. Comput. Algebra, 2015
2014
Int. J. Distributed Sens. Networks, 2014
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Ad Hoc Ubiquitous Comput., 2013
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
2012
Multiple Interface Parallel Approach of Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes.
IEEE Commun. Lett., 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012
2011
J. Ubiquitous Syst. Pervasive Networks, 2011
J. Ubiquitous Syst. Pervasive Networks, 2011
IEEE Commun. Lett., 2011
Efficient Algorithms for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes
CoRR, 2011
Use of Gray codes for optimizing the search of (shortened) cyclic single burst-correcting codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
2010
2009