A survey of migration mechanisms of virtual machines V Medina, JM García ACM Computing Surveys (CSUR) 46 (3), 1-33, 2014 | 197 | 2014 |
A fixed-point algorithm to estimate the Yule–Simon distribution parameter JMG Garcia Applied Mathematics and Computation 217 (21), 8560-8566, 2011 | 25 | 2011 |
Parallel algorithm for multiplication on elliptic curves JMG Garcia, RM Garcia Cryptology ePrint Archive, 2002 | 16 | 2002 |
Network anomaly detection by continuous hidden markov models: An evolutionary programming approach JJ Flores, F Calderon, A Antolino, JM Garcia Intelligent Data Analysis 19 (2), 391-412, 2015 | 9 | 2015 |
Evolving HMMs For Network Anomaly Detection–Learning Through Evolutionary Computation JJ Flores, A Antolino, JM Garcia 2010 Sixth International Conference on Networking and Services, 271-276, 2010 | 7 | 2010 |
Evolving hidden Markov models for network anomaly detection JJ Flores, A Antolino, JM Garcia Sixth International Conference on Networking and Services (ICNS), 2010 | 6 | 2010 |
Hybrid network anomaly detection–learning hmms through evolutionary computation JJ Flores, A Antolino, JM Garcia, FC Solorio iConcept Press Ltd, 2012 | 5 | 2012 |
Workload hidden markov model for anomaly detection JM Garcia, T Navarrete, C Orozco International Conference on Security and Cryptography 2, 56-60, 2006 | 5 | 2006 |
A system for distributed SELinux policy management PC Lugo, JMG Garcia, JJ Flores 2009 Third International Conference on Network and System Security, 254-261, 2009 | 4 | 2009 |
An Architecture for Systematic Administration of SELinux Policies in Distributed Environments PC Lugo, JJ Flores, JMG Garcia International Journal of Computers and Communications 1 (4), 127-135, 2007 | 4 | 2007 |
Discrete fuzzy transform applied to computer anomaly detection JMG Garcia 2011 Annual Meeting of the North American Fuzzy Information Processing …, 2011 | 3 | 2011 |
Detección de anomalías en la carga de un procesador utilizando modelos ocultos de Markov T Navarrete, JM García Tesis de maestría, Instituto tecnológico de Morelia, Morelia, Michoacán, 2007 | 3 | 2007 |
Análisis y control de riesgos de seguridad informática: control adaptativo JM García Extraído desde 9 (01), 2014, 2008 | 1 | 2008 |
Quantum Cryptoanalysis of Elliptic Curve Systems JM Garcia, R Menchaca Computación y Sistemas 4 (3), 242-248, 2001 | 1 | 2001 |
Live replication of virtual machines V Medina, JM García Proceedings of the 10th WSEAS international conference on Software …, 2011 | | 2011 |
An algorithm to fill out a bloc with pseudorandom binary data JMG Garcia Proceedings of the 4th WSEAS international conference on Computer …, 2010 | | 2010 |
A Network Isolation Analysis in Xen y MCVM Rios, JMG García | | 2009 |
A specification language for information security policies JMG Garcia Proceedings of the international conference on Computational and information …, 2009 | | 2009 |
Security architecture for a systematic administration of SELinux policies in distributed environments PC Lugo, JJ Flores, JMG Garcia Proceedings of the 7th conference on Data networks, communications …, 2008 | | 2008 |
Intrusion Risk Analysis and the Power Law Distribution of Attacks. JMG Garcia WOSIS, 47-52, 2004 | | 2004 |