A one-class classification approach for bot detection on Twitter J Rodríguez-Ruiz, JI Mata-Sánchez, R Monroy, O Loyola-González, ... Computers & Security 91, 101715, 2020 | 149 | 2020 |
Planning exploration strategies for simultaneous localization and mapping B Tovar, L Munoz-Gómez, R Murrieta-Cid, M Alencastre-Miranda, ... Robotics and Autonomous Systems 54 (4), 314-331, 2006 | 145 | 2006 |
Contrast pattern-based classification for bot detection on twitter O Loyola-González, R Monroy, J Rodríguez, A López-Cuevas, ... IEEE Access 7, 45800-45817, 2019 | 88 | 2019 |
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation. D Valdes-Ramirez, MA Medina-Pérez, R Monroy, O Loyola-González, ... IEEE Access 7 (1), 48484-48499, 2019 | 87 | 2019 |
PBC4cip: A new contrast pattern-based classifier for class imbalance problems O Loyola-González, MA Medina-Pérez, JF Martínez-Trinidad, ... Knowledge-Based Systems 115, 100-109, 2017 | 83 | 2017 |
Analyzing log files for postmortem intrusion detection KA Garcia, R Monroy, LA Trejo, C Mex-Perera, E Aguirre IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012 | 66 | 2012 |
A complexity result for the pursuit-evasion game of maintaining visibility of a moving evader R Murrieta-Cid, R Monroy, S Hutchinson, JP Laumond 2008 IEEE International Conference on Robotics and Automation, 2657-2664, 2008 | 52 | 2008 |
Web attack detection using ID3 VH Garcia, R Monroy, M Quintana IFIP World Computer Congress, TC 12, 323-332, 2006 | 50 | 2006 |
An explainable artificial intelligence model for clustering numerical databases O Loyola-Gonzalez, AE Gutierrez-Rodríguez, MA Medina-Pérez, ... IEEE Access 8, 52370-52384, 2020 | 45 | 2020 |
The Windows-Users and-Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms JB Camina, C Hernández-Gracidas, R Monroy, L Trejo Expert Systems with Applications 41 (3), 919-930, 2014 | 41 | 2014 |
A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print J Khodadoust, MA Medina-Pérez, R Monroy, AM Khodadoust, ... Expert Systems with Applications 176, 114687, 2021 | 39 | 2021 |
Hybrid method for detecting masqueraders using session folding and hidden markov models R Posadas, C Mex-Perera, R Monroy, J Nolazco-Flores MICAI 2006: Advances in Artificial Intelligence: 5th Mexican International …, 2006 | 39 | 2006 |
Proof plans for the correction of false conjectures R Monroy, A Bundy, A Ireland Logic Programming and Automated Reasoning: 5th International Conference …, 1994 | 35 | 1994 |
Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection JB Camiña, MA Medina-Pérez, R Monroy, O Loyola-González, ... Machine vision and applications 30, 959-974, 2019 | 34 | 2019 |
Cluster validation using an ensemble of supervised classifiers J Rodríguez, MA Medina-Pérez, AE Gutierrez-Rodríguez, R Monroy, ... Knowledge-Based Systems 145, 134-144, 2018 | 34 | 2018 |
A review and experimental comparison of multivariate decision trees L Cañete-Sifuentes, R Monroy, MA Medina-Pérez IEEE Access 9, 110451-110479, 2021 | 33 | 2021 |
Fusing pattern discovery and visual analytics approaches in tweet propagation O Loyola-González, A López-Cuevas, MA Medina-Pérez, B Camiña, ... Information Fusion 46, 91-101, 2019 | 32 | 2019 |
Formal support to security protocol development: A survey JC López Pimentel, R Monroy Computación y Sistemas 12 (1), 89-108, 2008 | 32 | 2008 |
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects MA Medina-Pérez, R Monroy, JB Camiña, M García-Borroto Soft Computing 21, 557-569, 2017 | 31 | 2017 |
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks C Del-Valle-Soto, C Mex-Perera, R Monroy, JA Nolazco-Flores Sensors 15 (4), 7619-7649, 2015 | 29 | 2015 |