Follow
Pablo Velarde Alvarado
Title
Cited by
Cited by
Year
Mobile personal health monitoring for automated classification of electrocardiogram signals in elderly
LJ Mena, VG Félix, A Ochoa, R Ostos, E González, J Aspuru, P Velarde, ...
Computational and mathematical methods in medicine 2018, 2018
352018
PEAL: Power efficient and adaptive latency hierarchical routing protocol for cluster-based WSN
F Hidoussi, H Toral-Cruz, DE Boubiche, R Martínez-Peláez, ...
Wireless Personal Communications 96, 4929-4945, 2017
312017
Classification of network anomalies in flow level network traffic using Bayesian networks
MJ Vargas-Muñoz, R Martínez-Peláez, P Velarde-Alvarado, ...
2018 International Conference on Electronics, Communications and Computers …, 2018
242018
Detecting anomalies in network traffic using the method of remaining elements
P Velarde-Alvarado, C Vargas-Rosales, D Torres-Roman, ...
IEEE Communications Letters 13 (6), 462-464, 2009
192009
An unsupervised approach for traffic trace sanitization based on the entropy spaces
P Velarde-Alvarado, C Vargas-Rosales, R Martinez-Pelaez, H Toral-Cruz, ...
Telecommunication Systems 61, 609-626, 2016
152016
P2PM-pay: Person to person mobile payment scheme controlled by expiration date
R Martínez-Peláez, H Toral-Cruz, J Ruiz, P Velarde-Alvarado
Wireless Personal Communications 85, 289-304, 2015
122015
Detecting anomalies in network traffic using Entropy and Mahalanobis distance
J Santiago-Paz, D Torres-Roman, P Velarde-Alvarado
CONIELECOMP 2012, 22nd International Conference on Electrical Communications …, 2012
102012
Entropy based analysis of worm attacks in a local network
P Velarde-Alvarado, C Vargas-Rosales, D Torres-Román, ...
Research in Computing Science 34, 225-235, 2008
72008
Entropy-based profiles for intrusion detection in LAN traffic
P Velarde-Alvarado, C Vargas-Rosales, D Torres-Román, ...
Advances in Artificial Intelligence: Algorithms and Applications, Research …, 2008
72008
Information theory and data-mining techniques for network traffic profiling for intrusion detection
P Velarde-Alvarado, R Martinez-Pelaez, J Ruiz-Ibarra, V Morales-Rocha
Journal of computer and communications, 2014
62014
A novel framework for generating personalized network datasets for nids based on traffic aggregation
P Velarde-Alvarado, H Gonzalez, R Martínez-Peláez, LJ Mena, ...
Sensors 22 (5), 1847, 2022
52022
Security improvement of two dynamic ID-based authentication schemes by Sood-Sarje-Singh
R Martínez-Pelaez, F Rico-Novella, J Forné, P Velarde-Alvarado
Journal of applied research and technology 11 (5), 755-763, 2013
52013
My personal images as my graphical password
PAS Valles, JG Villalobos-Serrano, R Martínez-Peláez, V García, ...
IEEE Latin America Transactions 16 (5), 1516-1523, 2018
32018
Entropy and flow-based approach for anomalous traffic filtering
R Zempoaltecatl-Piedras, P Velarde-Alvarado, D Torres-Roman
Procedia Technology 7, 360-369, 2013
32013
Cryptanalysis and improvement of Chen-Hsiang-Shih's remote user authentication scheme using smart cards
R Martínez-Peláez, F Rico-Novella, P Velarde-Alvarado
Revista Facultad de Ingeniería Universidad de Antioquia, 27-35, 2013
22013
Privacy, Intrusion Detection, and Response
P Kabiri
IGI Global, 2012
22012
Using entropy spaces and mixtures of gaussian distributions to characterize traffic anomalies
P Velarde-Alvarado, AF Martínez-Herrera, A Iriarte-Solis
Procedia Technology 3, 97-108, 2012
22012
An Architecture for Intrusion Detection Based on an Extension of the Method of Remaining Elements
P Velarde-Alvarado, C Vargas-Rosales, D Torres-Roman, ...
Journal of applied research and technology 8 (2), 159-174, 2010
22010
FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences
J Portillo-Portillo, G Sanchez-Perez, LK Toscano-Medina, ...
Entropy 24 (7), 942, 2022
12022
Identificación Digital E Infraestructura Para Incrementar La Seguridad en El Ciberespacio
FRC Martínez, ÁDH Candelaria, RM Peláez, YIS Benítez, PV Alvarado
Pistas Educativas 38 (120), 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20