The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Raul Monroy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Raul Monroy, Maya Carrillo
    On Automating the Formulation of Security Goals under the Inductive Approach. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 2003, pp:1020-1025 [Conf]
  2. Fernando Godínez, Dieter Hutter, Raul Monroy
    Attribute Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AWIC, 2004, pp:74-83 [Conf]
  3. Raul Monroy, Alan Bundy, Ian Green
    Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence. [Citation Graph (0, 0)][DBLP]
    ECAI, 1998, pp:393-397 [Conf]
  4. Fernando Godínez, Dieter Hutter, Raul Monroy
    On the Use of Word Networks to Mimicry Attack Detection. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:423-435 [Conf]
  5. Fernando Godínez, Dieter Hutter, Raul Monroy
    Audit File Reduction Using N-Gram Models. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:336-340 [Conf]
  6. Juan Carlos López Pimentel, Raul Monroy
    A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. [Citation Graph (0, 0)][DBLP]
    IBERAMIA, 2004, pp:364-374 [Conf]
  7. Víctor H. García, Raul Monroy, Maricela Quintana
    Web Attack Detection Using ID3. [Citation Graph (0, 0)][DBLP]
    IFIP PPAI, 2006, pp:323-332 [Conf]
  8. Fernando Godínez, Dieter Hutter, Raul Monroy
    On the Role of Information Compaction to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:83-97 [Conf]
  9. Anna V. Álvarez, Karen A. García, Raul Monroy, Luis A. Trejo, Jesús Vázquez
    A Tool for Managing Security Policies in Organisations. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:378-388 [Conf]
  10. Raul Monroy
    The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures. [Citation Graph (0, 0)][DBLP]
    ASE, 2000, pp:91-100 [Conf]
  11. Raul Monroy, Alan Bundy, Ian Green
    Planning Equational Verification in CCS. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:43-52 [Conf]
  12. Raul Monroy
    A Process Algebra Model of the Immune System. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:526-533 [Conf]
  13. Raul Monroy
    Concept Formation via Proof Planning Failure. [Citation Graph (0, 0)][DBLP]
    LPAR, 2001, pp:723-736 [Conf]
  14. Raul Monroy, Alan Bundy, Andrew Ireland
    Proof Plans for the Correction of False Conjectures. [Citation Graph (0, 0)][DBLP]
    LPAR, 1994, pp:54-68 [Conf]
  15. Raul Monroy, Alan Bundy, Ian Green
    Searching for a Solution to Program Verification=Equation Solving in CCS. [Citation Graph (0, 0)][DBLP]
    MICAI, 2000, pp:1-12 [Conf]
  16. Rosa Saab, Raul Monroy, Fernando Godínez
    Towards a Model for an Immune System. [Citation Graph (0, 0)][DBLP]
    MICAI, 2002, pp:401-410 [Conf]
  17. Rafael Murrieta-Cid, Raul Monroy
    A Hybrid Segmentation Method Applied to Color Images and 3D Information. [Citation Graph (0, 0)][DBLP]
    MICAI, 2006, pp:789-799 [Conf]
  18. Rafael Murrieta-Cid, Alejandro Sarmiento, Teja Muppirala, Seth Hutchinson, Raul Monroy, Moises Alencastre-Miranda, Lourdes Muñoz-Gómez, Ricardo Swain Oropeza
    A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach. [Citation Graph (0, 0)][DBLP]
    MICAI, 2005, pp:990-1000 [Conf]
  19. Román Posadas, J. Carlos Mex-Perera, Raul Monroy, Juan Arturo Nolazco-Flores
    Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    MICAI, 2006, pp:622-631 [Conf]
  20. Fernando Godínez, Dieter Hutter, Raul Monroy
    Service Discrimination and Audit File Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:99-113 [Conf]
  21. Raul Monroy
    Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2003, v:10, n:3, pp:247-269 [Journal]
  22. Raul Monroy, Alan Bundy, Ian Green
    Planning Proofs of Equations in CCS. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2000, v:7, n:3, pp:263-304 [Journal]
  23. Juan Carlos López Pimentel, Raul Monroy, Dieter Hutter
    A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:174, n:4, pp:117-130 [Journal]
  24. Benjamín Tovar, Lourdes Muñoz-Gómez, Rafael Murrieta-Cid, Moises Alencastre-Miranda, Raul Monroy, Seth Hutchinson
    Planning exploration strategies for simultaneous localization and mapping. [Citation Graph (0, 0)][DBLP]
    Robotics and Autonomous Systems, 2006, v:54, n:4, pp:314-331 [Journal]
  25. Juan Carlos López Pimentel, Raul Monroy, Dieter Hutter
    On the Automated Correction of Security Protocols Susceptible to a Replay Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:594-609 [Conf]

  26. A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader. [Citation Graph (, )][DBLP]


  27. Evader surveillance under incomplete information. [Citation Graph (, )][DBLP]


  28. On the Automated Correction of Protocols with Improper Message Encoding. [Citation Graph (, )][DBLP]


Search in 0.137secs, Finished in 0.139secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002