J. Carlos Mex-Perera
Orcid: 0000-0001-8682-5983
According to our database1,
J. Carlos Mex-Perera
authored at least 25 papers
between 2001 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
2021
A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks.
Sensors, 2021
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis.
Comput. Electr. Eng., 2021
2019
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019
2017
Providing traffic tolerance in optical packet switching networks: a reinforcement learning approach.
Photonic Netw. Commun., 2017
2016
GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier.
Microprocess. Microsystems, 2016
2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015
2014
On the MAC/Network/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols.
Sensors, 2014
Self-healing in transparent optical packet switching mesh networks: A reinforcement learning perspective.
Comput. Networks, 2014
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014
2013
Proceedings of the Information Security, 16th International Conference, 2013
2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
Some Representations of the S-Box of Camellia in <i>GF</i>(((2<sup>2</sup>)<sup>2</sup>)<sup>2</sup>).
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2006
Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
2005
Proceedings of the Nonlinear Analyses and Algorithms for Speech Processing, 2005
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005
Proceedings of the Progress in Pattern Recognition, 2005
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005
2004
Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space.
Proceedings of the Nonlinear Speech Modeling and Applications, 2004
Proceedings of the Progress in Pattern Recognition, 2004
2002
2001
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001