Search the dblp DataBase
Raul Monroy :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Raul Monroy , Maya Carrillo On Automating the Formulation of Security Goals under the Inductive Approach. [Citation Graph (0, 0)][DBLP ] Applied Informatics, 2003, pp:1020-1025 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy Attribute Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP ] AWIC, 2004, pp:74-83 [Conf ] Raul Monroy , Alan Bundy , Ian Green Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence. [Citation Graph (0, 0)][DBLP ] ECAI, 1998, pp:393-397 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy On the Use of Word Networks to Mimicry Attack Detection. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:423-435 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy Audit File Reduction Using N-Gram Models. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:336-340 [Conf ] Juan Carlos López Pimentel , Raul Monroy A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. [Citation Graph (0, 0)][DBLP ] IBERAMIA, 2004, pp:364-374 [Conf ] Víctor H. García , Raul Monroy , Maricela Quintana Web Attack Detection Using ID3. [Citation Graph (0, 0)][DBLP ] IFIP PPAI, 2006, pp:323-332 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy On the Role of Information Compaction to Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ISSADS, 2005, pp:83-97 [Conf ] Anna V. Álvarez , Karen A. García , Raul Monroy , Luis A. Trejo , Jesús Vázquez A Tool for Managing Security Policies in Organisations. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:378-388 [Conf ] Raul Monroy The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures. [Citation Graph (0, 0)][DBLP ] ASE, 2000, pp:91-100 [Conf ] Raul Monroy , Alan Bundy , Ian Green Planning Equational Verification in CCS. [Citation Graph (0, 0)][DBLP ] ASE, 1998, pp:43-52 [Conf ] Raul Monroy A Process Algebra Model of the Immune System. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:526-533 [Conf ] Raul Monroy Concept Formation via Proof Planning Failure. [Citation Graph (0, 0)][DBLP ] LPAR, 2001, pp:723-736 [Conf ] Raul Monroy , Alan Bundy , Andrew Ireland Proof Plans for the Correction of False Conjectures. [Citation Graph (0, 0)][DBLP ] LPAR, 1994, pp:54-68 [Conf ] Raul Monroy , Alan Bundy , Ian Green Searching for a Solution to Program Verification=Equation Solving in CCS. [Citation Graph (0, 0)][DBLP ] MICAI, 2000, pp:1-12 [Conf ] Rosa Saab , Raul Monroy , Fernando Godínez Towards a Model for an Immune System. [Citation Graph (0, 0)][DBLP ] MICAI, 2002, pp:401-410 [Conf ] Rafael Murrieta-Cid , Raul Monroy A Hybrid Segmentation Method Applied to Color Images and 3D Information. [Citation Graph (0, 0)][DBLP ] MICAI, 2006, pp:789-799 [Conf ] Rafael Murrieta-Cid , Alejandro Sarmiento , Teja Muppirala , Seth Hutchinson , Raul Monroy , Moises Alencastre-Miranda , Lourdes Muñoz-Gómez , Ricardo Swain Oropeza A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach. [Citation Graph (0, 0)][DBLP ] MICAI, 2005, pp:990-1000 [Conf ] Román Posadas , J. Carlos Mex-Perera , Raul Monroy , Juan Arturo Nolazco-Flores Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] MICAI, 2006, pp:622-631 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:99-113 [Conf ] Raul Monroy Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2003, v:10, n:3, pp:247-269 [Journal ] Raul Monroy , Alan Bundy , Ian Green Planning Proofs of Equations in CCS. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2000, v:7, n:3, pp:263-304 [Journal ] Juan Carlos López Pimentel , Raul Monroy , Dieter Hutter A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:174, n:4, pp:117-130 [Journal ] Benjamín Tovar , Lourdes Muñoz-Gómez , Rafael Murrieta-Cid , Moises Alencastre-Miranda , Raul Monroy , Seth Hutchinson Planning exploration strategies for simultaneous localization and mapping. [Citation Graph (0, 0)][DBLP ] Robotics and Autonomous Systems, 2006, v:54, n:4, pp:314-331 [Journal ] Juan Carlos López Pimentel , Raul Monroy , Dieter Hutter On the Automated Correction of Security Protocols Susceptible to a Replay Attack. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:594-609 [Conf ] A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader. [Citation Graph (, )][DBLP ] Evader surveillance under incomplete information. [Citation Graph (, )][DBLP ] On the Automated Correction of Protocols with Improper Message Encoding. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.304secs