here - Tecnológico de Monterrey

Curriculum Vitae
Raúl Monroy
July 19, 2015
General Information
Nationality:
Phone Number:
Fax Number:
e-mail:
URL:
Mexican
+52 (55) 5864 5316
+52 (55) 5864 5751
[email protected]
http://homepage.cem.itesm.mx/raulm
University Education and Degrees Awarded
1993-98: PhD in Artificial Intelligence. Thesis: Planning Proofs of Correctness of CCS Systems, under the supervision of Prof. Alan Bundy and
Dr. Ian Green, and examined by Prof. Matthew Hennessy and Dr. Alan
Smaill. The University of Edinburgh.
1992-1993: MSc in Information Technology. Thesis: The Use of Abduction to Correct Faulty Conjectures, under the supervision of Prof. Alan
Bundy, Dr. Jane Hesketh and Dr. Andrew Ireland. The University of
Edinburgh.
1987-1990: MSc in Computer Systems. Thesis: TEC-XINU, an Operating
System, under the supervision of Dr. Ralf Eder. Instituto Tecnológico y
de Estudios Superiores de Monterrey, at State of México (Mexico).
1980-1985: BSc in Electronics. Thesis: A VLSI-Based Short Distance Modem, Using Manchester Code, under the supervision of Dr Emmanuel
Moya. Universidad Autónoma Metropolitana, Ixtapalapa (Mexico).
Additional training
The 1994 International Marktoberdorf Summer School: (organised by
NATO) 8 courses lectured by Prof. E.W. Dijkstra, Prof. Tony Hoare,
Prof. Allain Martin, Dr. Martin Abadi, Prof. Michael Fourman, Prof. Frederick Schneider, Prof. Manfred Broy, Prof. David Gries, Prof. Samson
Abramsky.
1
Parallel Processing: Oklahoma State University at Stillwater. Summer 1990,
(50 Hrs), lectured by Dr. K.M. George.
Artificial Intelligence: Oklahoma State University at Stillwater. Summer
1990, (50 Hrs), lectured by Dr. B. Mayfield.
Object-Oriented Software Construction: Oklahoma State University at
Stillwater. Summer 1992, (50 Hrs), lectured by Dr. K.M. George.
Advanced Artificial Intelligence: Oklahoma State University at Stillwater.
Summer 1992, (50 Hrs), lectured by Dr. D. Miller.
Object-Oriented Programming: ITESM, 1990, lectured by Dr. Bertrand
Meyer.
Quality Control: ITESM. Certified as total quality control manager (250 Hrs)
Languages
Spanish: Mother tongue
English: Fluent: IELTS score = 8 (1996), TOEFL score = 637 (2008), TOEIC
score = 925 (1998)
Career since Graduation
2014-date: Tecnológico de Monterrey, Escuela nacional de ingenierı́a y ciencias, Leader of the Information Technology Research Group.
2010-date: Tecnológico de Monterrey, Campus Estado de México, (Full) Professor in Computer Science.
2007-2009: Tecnológico de Monterrey, Campus Estado de México, Associate
Professor in Computer Science.
2007-2007: DFKI, Saarbrücken, Germany, Associate and Visiting Researcher.
2006-2007: University of Edinburgh, Edinburgh, Scotland, Visiting Researcher
(on sabbatical leave from ITESM CEM).
2000-2007: Tecnológico de Monterrey, Campus Estado de México, Associate
Professor in Computer Science.
1992-1999: Tecnológico de Monterrey, Campus Estado de México, Assistant
Professor in Computer Science.
1992-1997: Tecnológico de Monterrey, Campus Estado de México, Leave of
Abscence.
1985-1992: Tecnológico de Monterrey, Campus Estado de México, Lecturer in
Computer Science.
2
1984: Universidad Autónoma Metropolitana, Part time faculty member. Electrical Engineering Department.
Teaching Responsibilities
My workload consists of 40% teaching, 10% administration and 50% research.
I teach only in two terms out of three offered in an academic year.
I have been involved in teaching since 1984. I do enjoy teaching. Throughout
all these years, I have taught several many courses, including electric circuits,
electronics, digital systems, computer organisation, assembly language, computer architecture, computer networks, artificial intelligence, knowledge representation, operating systems, common sense reasoning, logic, probability, quantitative modelling and simulation, numerical analysis, communication and concurrency, computer security, and many other more.
During the last five years, I have designed, developed or taught the following
courses in computing: undergradate: Quantitative Methods and Simulation,
Formal Methods in Software Engineering, Operating Systems, Introduction to
Communication and Concurrency, Computer Security, and Numerical Analysis;
and graduate: Logic and Probability, Formal Methods in Computer Security,
Automated Reasoning and Communication and Concurrency.
Research Interests
I am interested in automating the use of theorem proving to formal methods of
system development. I have recently become interested in issues of computer
security and robotics. Currently, my research concerns:
• The automated repair of security protocols;
• The discovery and application of general search control strategies for uncovering and correcting errors in either a system or its specification;
• The design of novel methods for computer intrusion detection; and
• The design of novel methods for motion planning (sensor-based robotics.)
The main techniques for these lines of investigation have been proof planning,
the productive use of failure and process algebras. Quoting Alan Bundy, proof
planning is a method that uses an explicit representation of the overall shape of
a family of similar proofs. The productive use of failure is collecting evidence
of theory misconception and mal-formulation in order to pinpoint flaws and
suggest theory development. Process algebras provides a means for modelling,
building and analysing communicating systems in terms of a few primitive ideas;
they are well-established, both in Industry and in Academia, and have evolved
into an ISO-standard, LOTOS.
In 2003, I founded the Computer Networking and Security Group (NETSEC), a research group based at Tecnológico de Monterrey. NETSEC is a group
3
of computer scientists with interests in intrusion detection and security of computer networks and automated analysis (and possibly correction if faulty) of
security protocols. This group comprehends 4 principal investigators, one postdoctoral participant, six research assistants and over a dozen of MSc students.
Jointly, the group has published over 70 papers and graduated 27 students (3
PhD students, 18 MSc students, and 6 undegraduate students) since 2003. The
group receives substantial funding from Tecnológico de Monterrey, and from
CONACYT, for covering operation expenses, granting scholarships to graduate
students and developing infrastructure. The group currently conducts its experiments in two laboratories, one is the computer networking, and the other
one the mobile computing. For more information about the Networking and
Security Group, the reader is referred to the group’s URL:
http://www.cem.itesm.mx/investigacion/seguridad/
Recently, I have been appointed to the Chair of Information Technology,
a distributed research group, which includes a number of people, including:
Julieta Noguez, Lourdes Muñoz, Moisés Alencastre, Miguel González, Neil
Hernández, Jaime Mora, Gildardo Sánchez, Luis A. Trejo and Edgar Vallejo,
amongst others.
Research Grants Held
2015: Formal Verification of Web Applications, Google Faculty Research
Awards, (Principal Investigator) with D. Hutter and Victor Ferman.
2014-date: Information Technology, ITESM, School of Science and Engineering, Research group grant (Principal Investigator);
2007—2013: Aspects of Computer Security, ITESM—Rectorı́a Zona Centro
del Sistema ITESM, Grant C-CEM-04/07 (Principal Investigator);
2010—2013: Aplicación de Modelos Estadı́sticos y Técnicas de Caracterización a Tráfico de Red para la Detección de Intrusos, Convocatoria SEP
Investigación Básica 2008, Grant 105698 (Principal Investigator);
2010—2013: Automated Repair of Industrial-Strength Security Protocols, Convocatoria Cooperación Bilateral 2009, Grant 121596, (Principal Investigator) with Dieter Hutter (also Principal Investigator);
Completed Projects
2010—2012: Planificación de Movimientos y Percepción para Robots: Mundos
Tridimensionales y Manejo de Incertidumbre, Convocatoria SEP Investigación Básica 2008, Grant 106475 (Associate Investigator);
2010—2012: ELISA - Sistema de Localizacin y Asistencia Inmediata, CUDICONACYT (Associate Investigator); with Luis A. Trejo
4
2005—10: On the Timely Detection of Mimicry Attacks, CONACyT. Convocatoria SEP Investigación básica, Grant 47557 (Principal Investigator).
2008: Método estadı́stico de detección de ataques al DNS. Fondo Regional para
la Innovación Digital en América Latina y el Caribe (FRIDA) 2007 (Associate Investigator);
2007—8: Pursuit Evasion Problems in 3D Environments. CONACyT — National Science Foundation (NSF). Grant J110.534/2006 (Associate Investigator);
2007: On Automatically Patching Faulty Security Protocols. Consejo Nacional
de Ciencia y Tecnologı́a (CONACyT) — Deutscher Akademischer Austausch Dienst (DAAD). Grant J110.382/2006 (Principal Investigator),
with Dieter Hutter (also Principal Investigator);
2005—6: On the Timely Detection of Mimicry Attacks, Fondo Regional para
la Innovación Digital en América Latina y el Caribe (FRIDA) 2005 Grant
VI (Principal Investigator);
2003—6: Aspects of Computer Security, ITESM—Consorcio Interrectorı́as
Grant CCEM- 0302-05 (Principal Investigator);
2002—4: Computer Security Based on Immune Systems, together with Dieter
Hutter from DFKI, Germany. CONACyT-BMBF Grant J200.1442/2002
(Principal Investigator);
2001—4: The Use of Proof Planning to Automating the Verification of Authentication Protocols, CONACyT Grant 33337-A (Principal Investigator);
1997—2001: The Use of Proof Planning to Automate Theorem Proving to
Formal Methods of System Development, together with Francisco Cantú
and Santiago Negrete. CONACYT REDII (Principal Investigator).
While doing my PhD, I was associated with the following project:
1992—7: Communication in safety cases: a semantic approach, SERC Grant
GR/J/58619.
Research Supervision
Research Assisstants (Post-doctorates)
1. Dr. Carlos Arturo Hernández Gracidas, graduated from INAOEP, is carrying out research, following my ideas on Masquerade Detection. Funded
by CONACYT (2011 — 2012).
2. Dr. Miguel Angel Medina Pérez, graduated from INAOEP, is carrying out
research, following my ideas on Masquerade Detection. His research stay
is funded by ITESM, and lasts one year, starting from January 16, 2015.
5
PhD Students
1. Jorge Rodrı́guez Ruiz; Jorge is aiming at detecting malware using a model
inspired on biological immune systems; admitted January 2014;
2. Eduardo Aguirre Bermúdez; Eduardo is aiming at providing privacy to
android-based mobile devices; admitted August 2013;
3. José Benito Camiña Prado; Benito is aiming at extending his results
on Masquerade Detection using Navigation Structures; admitted January
2012.
4. Vı́ctor Hugo Ferman Landa; Vı́ctor is aiming at a method for automated
browser-based security protocol analysis; admitted January 2011.
5. Jorge Martı́nez Muñoz; Jorge is working on extending Juan Carlos’s tool,
called shrimp, to automatically repair faulty protocols of type group;
admitted August 2008;
6. Rosa Elena di Constanzo Lorencez; Rosa Elena is working on a tool capable of detecting vulnerabilities on security protocols; admitted August
2008;
7. Jorge Vázquez Islas; Jorge is aiming at a method for detecting attacks to
802.11; admitted August 2008;
8. Roberto Alonso Rodrı́guez; Roberto is continuing his MSc projects, studying a social characterisation of DNS usage to DNS DoS attack detection;
awarded May 2015;
9. Karen Azurim Garcı́a Gamboa; Karen was associated with the project ‘On
the Timely Detection of Mimicry Attacks’, admitted May 2005, examined
December 2010; awarded May 2011.
10. Juan Carlos López Pimentel, ‘On the Automated Correction of Faulty
Security Protocols’: admitted January, 2004; examined April, 2008;
awarded May 2008; and
11. Fernando Godı́nez Delgado, ‘On an Efficient and Scalable Architecture for
Mimicry Attacks Detection Using Probabilistic Methods: admitted July,
2000; examined November, 2004; awarded May, 2005;
MSc Students
1. Jorge Rodrı́guez Ruiz. Detección de impostores en la base WUIL-DS.
ITESM CEM; awarded December, 2013.
2. José Benito Camiña Prado, Hacia la detección de intrusiones mediante
el análisis del comportamiento del usuario en su sistema de archivos,
awarded May 19, 2011.
6
3. Eduardo Aguirre Bermúdez, Modelado de ataques computacionales a
“host” utilizando redes de Petri coloreadas, awarded May 19, 2011.
4. José Ernesto Buelna Sánchez, Verificación de Polı́ticas de Integridad para
Sistemas Distribuidos en Tiempo Real, defended April 28, 2010, awarded
May 2010;
5. Roberto Alonso Rodrı́guez, Modelos estadı́sticos y de IA para la detección
de intrusiones y caracterización de tráfico, defended January 2010 (cosupervisor), awarded May 2010;
6. Ricardo Farrera Saldaña, ‘Análisis y Caracterización de Tráfico en Internet’, defended November 2009, awarded December 2009 (cosupervisor);
7. Armando Aguayo Mendoza, ‘La Monitorización de la Polı́tica de Seguridad
de Procesos Mediante Correlación de Eventos’, defended November 2009,
awarded December 2009 (co-supervisor);
8. Cuauhtémoc Juan Portas Sánchez, ‘Validación de Polı́ticas de Seguridad en una Red Financiera Mediante Correlacion de Eventos’, defended
November 2009, awarded December 2009 (co-supervisor);
9. Anna Valeska Álvarez Béjar, ‘Administrador de Polı́ticas de Seguridad:
2nda Versión’, defended June 2006, awarded December 2006;
10. Vı́ctor Hugo Garcı́a Pichardo, ‘Algoritmo ID3 en la Detección de Ataques
en Aplicaciones WEB’, awarded May 2006;
11. Karen Azurim Garcı́a Gamboa, ‘Administrador de Polı́ticas de Seguridad’,
awarded January, 2005;
12. Juan Carlos López Pimentel, ‘Verificación Formal de Protocolos de Seguridad en HOL usando el Método Inductivo’, awarded September,
2004;
13. Rosa Saab Asbun, ‘Modelo de un Sistema Inmunológico Natural en
Álgebra de Procesos’, awarded September, 2002;
14. Alberto Calixto Simón, ‘Análisis del protocolo TLS’, awarded September, 2001;
15. Maya Carrillo Ruiz, ‘Lógicas de Autenticación Aplicadas al Estudio de
Protocolos’, awarded September, 2001;
16. Arturo Rodolfo Castro Lloera, ‘Sistema de Monitoreo Experto Aplicado a
Equipos de Cómputo’, awarded December, 2000;
17. Enrique Alejandro Navarrete Paredes, ‘Reconocimiento de Patrones Aplicado a la Exposición Fotográfica’, awarded December, 1999.
7
18. Anabelem Soberanes, admitted January 2005;
19. Raymundo Eybar Piña, admitted January 2005.
BSc Students
1. Mauricio Cunillé Blando. Admitted January 2015.
2. Leonardo Mauricio Cañete Sifuentes. Detección de impostores mediante
estructuras de navegación, awarded December, 2014.
3. Axel Alejandro Gutiérrez Olivo. Detección de impostores mediante estructuras de navegación. Admitted August, 2014.
4. Eduardo Murillo González. Detección de impostores mediante estructuras
de navegación, awarded June, 2012.
5. Jorge Rodrı́guez Ruiz. Detección de DLLs maliciosos. ITESM CEM,
awarded May, 2011.
6. Luis Rodolfo Hernández Guzmán. Creación de un API para MATLAB
para soporte en el análisis de matrices de co-ocurrencia. ITESM CEM,
awarded December, 2010.
7. Velázquez, José Fernando. Caracterización de Ataques al DNS para la
implementación de un IDS en un ambiente GRID. ITESM CEM, awarded
November, 2008.
8. Garcı́a Garcı́a, Juan Francisco. Implementación de un programa registrador de eventos para la elaboración posterior de un detector de intrusos
basado en el análisis del comportamiento del usuario en su interacción con
el sistema de archivos. ITESM CEM, awarded May, 2009.
Distinctions
2015: Network Security, Summer Course, University of Bremen, Visiting Professor.
2015: National academy of Computer Science. Founding member.
2014: Formal Verification of Web Applications, Google Faculty Research
Awards, (Principal Investigator) with D. Hutter and Victor Ferman.
2013: COMIA 2013 2nd best paper award, SMIA;
2012-date: Associate editor of Journal Computación y Sistemas
2012-date: Associate editor of Journal Inteligencia Artificial (ISSN 19883064);
8
2012: COMIA 2012 2nd best paper award, SMIA;
2012: 3rd place for the Rómulo Garza Price for Outstanding Achievements in
Science, Technology, and Engineering, ITESM 2012;
2012-2013: Coordinator of the CONACYT Research Network on Information
Technology and Communication, REDTIC, 2012;
2010-2012: President of the Mexican Society for Artificial Intelligence;
2012-date: Member of the External Examination Committee to the National
Research Centre for Mathematics, CIMAT, 2012;
2012: Member of IBERAMIA - Inteligencia Artificial Journal Editorial Board
- ISSN 1988-3064;
2012: COMIA’12 2nd best paper award, Mexican Society for Artificial Intelligence (SMIA);
2011: Fellowship to the Mexican Academy of Sciences;
2010: Professorship at Tecnológico de Monterrey, Campus Estado de México;
2009-2012: Technical Committee Member of “Red Temática en Tecnologı́as
de Información y Comunicaciones”, CONACYT;
1999-date: National Researcher, rank 2, subject area 7, CONACYT—SNI
(12232);
2006: Sabbatical leave to carry out research on the “Automated Correction of
Faulty Security Protocols”, Tecnológico de Monterrey, campus Estado de
México;
2006: The Golden Ram Award for Investigation 2006, Tecnológico de Monterrey, campus Estado de México;
2006: Final to the Rómulo Garza Award, Sistema Tecnológico de Monterrey;
2000, 2002, 2005: Research Grants 33337-A, J200.1442/2002 and 47557,
CONACyT;
2005: Research Grant VI, Fondo Regional para la Innovación Digital en
América Latina y el Caribe (FRIDA);
2005: MICAI’05 best paper award, Mexican Society for Artificial Intelligence
(SMIA);
2004: Candidate to best paper award, IBERAMIA’04;
2003—5: ITESM Research Group Grant CCEM- 0302-05, ITESM Consorcio
Inter-rectorı́as;
9
2002: MICAI’02 best paper award, SMIA;
2000: Candidate to best paper award and invited to submit journal version to
the journal of Automated Software Engineering, ASE’00;
1998: Candidate to best paper award and invited to submit journal version to
the journal of Automated Software Engineering, ASE’98;
1994: NATO Scholarship to participate in the 1994 International Marktoberdorf Summer School, in Germany, NATO;
1993-1998: CONACyT scholarship to conduct studies towards a PhD, Artificial Intelligence, at Edinburgh University;
1992: CONACyT scholarship to conduct studies towards a MSc, Artificial Intelligence, at Edinburgh University; and
1987-1991: ITESM scholarship to conduct studies towards a MSc, Computer
Systems, at ITESM.
Administrative Experience and
Committee Membership
University Responsibilities
• 2005-date: Session Track Organiser at the editions 35, 36, 38, 39, 40, 41,
42 and 43 of the Congreso de Investigación y Desarrollo Tecnológico del
ITESM;
• 2004-date: Member of the team that designed the 2005 BSc Programme
in Computer Technology;
• 2003-date: Leader of the research group called Computer Networking and
Security;
• 2004-date: Member of the PhD and the MSc Programme Committee in
Computer Science;
• 2001: Member of the team that designed the MSc Programme in Computer Science;
• 1998, 2005, 7: Organiser of the MSc/PhD Programme Seminar;
• 1997-1999: Organiser of the MSc Programme in Computer Science;
• 1997: Leader of the team that designed the MSc Programme in Computer
Science;
• 1990-1992: Organiser of three MSc Programmes, one in Computer Systems, one in Information Systems, and one in Manufacturing; and
10
• 1990: Leader of the team that designed the MSc Programme in Computer
Technology.
External Responsibilities
• 2012-2013: Coordinator of the CONACYT Research Network on Information Technology and Communication, REDTIC, 2012;
• 2012-date: Member of the External Examination Committee to the National Research Centre for Mathematics, CIMAT, 2012;
• 2012-date: Associate editor of Journal of Computación y Sistemas - ISSN
1405-5546;
• 2012-date: Member of IBERAMIA - Inteligencia Artificial Journal Editorial Board - ISSN 1988-3064;
• 2010-2012: President of the Mexican Society for Artificial Intelligence;
• 2009-2012: Technical Committee Member of “Red Temática en Tecnologı́as de Información y Comunicaciones”, CONACYT;
• 2007-date: Joint organiser of the MICAI workshop on computer security
(2007, 2008 and 2009);
• 1997-date: Served on the Program Committee of the following conferences: ENC’97, ENC’99, ENC’2010, MICAI’00, MICAI’02, MICAI’04,
IBERAMIA’04, MICAI’05, MICAI’06, CITA’06, CORE’06, MICAI’07,
CORE’07 MICAI’08, MICAI’09, MICAI’10, MICAI’11, and MICAI’12;
• 2000-date: Served on Conference Committee of the following conferences:
IJCAI’03, MICAI’00, MICAI’02, MICAI’04, MICAI’05, MICAI’06, MICAI’07, MICAI’08 and MICAI’09;
• 1997-date: Served as an external reviewer for Convocatoria para Investigación Básica, organised by CONACyT;
• 2005-date: Served on the CONACyT committee for the evaluation of applications to student scholarship extensions;
• 1994-date: Served as a paper reviewer for the following journals: Expert
Systems with Applications, Computación y Sistemas, Systems Man and
Cybernetics, etc.
• 1994-date: Served as a paper reviewer for the following conferences:
CADE, LICS, IBERAMIA, ENC, IJCAI, IROS, ICRA, etc.
• 2008-2010: Vice-president of the Mexican Society for Artificial Intelligence;
• 2009: An editor of Springer-Verlag, LNAI series;
11
• 2009: Conference and Programme co-chairman of the 8th Mexican International Conference on Artificial Intelligence (MICAI’09), held in Guanajuato City, Mexico;
• 2008: guest editor to “Computación y sistemas”;
• 2008: Served as external reviewer for Convocatoria Bilateral, CONACyT;
• 2008: MICAI local co-chair;
• 2007: MICAI workshops co-chair;
• 2006: Served on the 4th Seminar for the Development of the National
Competitiveness;
• 2005: Programme co-chairman of the 4th Mexican International Conference on Artificial Intelligence (MICAI’05), to be held in Monterrey,
Mexico;
• 2004: An editor of Springer-Verlag, LNAI series;
• 2004: Programme co-chairman of the 3rd Mexican International Conference on Artificial Intelligence (MICAI’04), held in Mexico City, Mexico;
• 2000-2006: Secretary Treasurer of the Mexican Society for Artificial Intelligence;
• 2000-date: ACM member (7294044)
• 2002: Joint organiser of the workshop on ‘Logic and Computation’, at
TAINA’02;
• 1999-2005: Served as a host researcher for Programa de Verano de Investigación Cientı́fica, organised by the Academia Mexicana de Ciencias. I
have guided the research of about 15 students.
• 1999: Joint organiser of the workshop on ‘Logic and Computation’, at
ENC’99;
Research Visits
1. May 18 — June 3, 2012: Deutsches Forschungszentrum für Künstliche
Intelligenz (DFKI). Bremen, Germany;
2. May 29 — June 8, 2010: Deutsches Forschungszentrum für Künstliche
Intelligenz (DFKI). Bremen, Germany;
3. June, 2009: INAOE. Puebla, México.
4. 2008—date: CIMAT, Guanajuato, México.
12
5. December 4—17, 2008: Deutsches Forschungszentrum für Künstliche Intelligenz (DFKI). Bremen, Germany;
6. January — March 2007: Deutsches Forschungszentrum für Künstliche
Intelligenz (DFKI). Saarbrücken, Germany;
7. August — December, 2006 and then April — July, 2007: Centre for Intelligent Systems and Applications. The University of Edinburgh. Edinburgh,
United Kingdom;
8. December 2005: 1 week at the DFKI, Saarbrücken, Germany;
9. December 2004: 2 weeks at the DFKI, Saarbrücken, Germany;
10. June 2004: 1 week at the University of Nottingham. Nottingham, United
Kingdom;
11. July 2004: 1 week at the Universiyt of Edinburgh. Edinburgh, United
Kingdom;
12. December 2003: 2 weeks at the DFKI, Saarbrücken, Germany;
13. December 2002: 2 weeks at the DFKI, Saarbrücken, Germany;
14. November 2002: 1 week at the University of Illinois at Urbana-Champaign.
Urbana, USA;
15. July 2001: 1 week at the Technological University of Munich at Munich (Germany) and 1 week at the Universiyt of Edinburgh at Edinburgh
(United Kingdom);
16. June 1999: 5 weeks at the University of Edinburgh at Edinburgh, United
Kingdom; and
17. July 1994: 1 week at the Technological University of Darmstad. Darmstad, Germany.
Publications
Journal Papers (Indexed)
1. I. Becerra-Durán, R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.P. Laumond. Maintaining Strong Mutual Visibility of an Evader Moving
over the Reduced Visibility Graph. Autonomous Robots (AURO) In Press,
2015.
2. S.-M. Martı́nez-Monterrubio, J. Frausto-Solı́s and R. Monroy. EMRlog
method for computer security for Electronic Medical Records with logic
and data mining. BioMed Research International In Press, 2015.
13
3. C. del-Valle-Soto, C. Mex-Perera, R. Monroy, and J.-A. Nolazco-Flores.
On the Routing Protocol Influence on the Resilience of Wireless Sensor
Networks to Jamming Attacks. Sensors 15(4):7619-7649, MDPI, 2015.
4. J. Benito Camiña, C. Hernández-Gracidas, R. Monroy, and L. Trejo. The
Windows Users and Intrusions Logs Dataset (WUIL-DS): An Experimental Framework for Masquerade Detection Mechanisms. Expert Systems
with Applications, 41(3):919 - 930, Elsevier, 2014.
5. Ernesto Buelna and Raúl Monroy. Real-Time Verification of Integrity
Policies for Distributed Systems. Journal of Applied Research and Technology, 11(6):831 - 843. 2013.
6. R. Alonso and R. Monroy. On the NP-Completeness of Computing the
Commonality Amongst the Objects upon which a Collection of Agents
has Performed an Action. Computación y Sistemas, 17(4):489 - 500. CIC
- IPN, 2013.
7. K. A. Garcı́a, R. Monroy, L. A. Trejo, C. Mex-Perera, and E. Aguirre. Analyzing Log Files for Post-mortem Intrusion Detection. Journal of IEEE
Transactions on Systems, Man, and Cybernetics — Part C 42(6):16901704. IEEE Computer Press, 2012.
8. I. Razo-Zapata, C. Mex-Perera, and R. Monroy. Masquerade Attacks
Based on User’s Profile. Journal of Systems and Software 85(11):26402651, Elsevier, 2012.
9. R. Monroy. Editorial. Computación y Sistemas 16(4):379-381, CIC - IPN,
2012.
10. R. Monroy. Editorial. Polibits 46:3-4, CIDETEC - IPN, 2012.
11. R. Monroy, A. Bundy, and I. Green. On process equivalence = equation
solving in CCS. Journal of Automated Reasoning 43(1):53-80, Springer,
2009. Springer.
12. R. Monroy and G. Arroyo-Figueroa. Editorial, Special Issue on Innovative
Applications of AI. Computación y Sistemas 14(1):3-4, CIC del IPN, 2009.
13. J.C.-López P. and R. Monroy. Formal Support to Security Protocol Development: a Survey. Computación y Sistemas, special volume celebrating
50 years of Computing in Mexico, 12(1):89-109, CIC - IPN, 2008.
14. Juan C. López P., Raúl Monroy and Dieter Hutter. A method for patching
interleaving-replay attacks in faulty security protocols. Electronic Notes
in Theoretical Computer Science 174(4):117-130, Elsevier, 2007.
15. B. Tovar, L. Muñoz-Gomez, R. Murrieta-Cid, M. Alencastre-Miranda,
R. Monroy and S. Hutchinson. Planning Exploration Strategies for Simultaneous Localization and Mapping. Journal Robotics and Autonomous
Systems 54(4):314-331, Elsevier, 2006.
14
16. R. Monroy, R. Saab and F. Godı́nez. On Modelling an Immune System.
Computación y Sistemas. 7(4):249–259, 2004.
17. Raúl Monroy. Predicate Synthesis for the Correction of Faulty Conjectures: the Proof Planning Paradigm. Automated Software Engineering,
10(3):247–269, 2003.
18. R. Monroy and A. Bundy. On the correction of faulty formulae. Computación y Sistemas, 5(1):25-37, 2001.
19. R. Monroy, A. Bundy, and I. Green. Planning Proofs of Equations in
CCS. Journal of Automated Software Engineering 7(3):263–304, 2000.
Edited Books
• A. Hernández-Aguirre, R. Monroy and C.-A. Reyes-Garcı́a, editors, Proceedings of MICAI 2009: Advances in Artificial Intelligence, 8th Mexican
International Conference on Artificial Intelligence, MICAI‘09, LNAI Vol.
5845, 2009. Springer.
• A. Hernández-Aguirre, R. Monroy and C.-A. Reyes-Garcı́a, editors, Proceedings of the 8th Mexican International Conference on Artificial Intelligence, MICAI‘09, IEEE Computer Science Press.
• R. Monroy, G. Arroyo-Figueroa, E. Sucar and H. Sossa, editors, Advances
in Artificial Intelligence: Proceedings of the 3rd Mexican International
Conference on Artificial Intelligence, MICAI‘2004, Springer-Verlag, Lecture Notes in Artificial Intelligence, Vol. 2972, 2004.
• A. Gelbukh and R. Monroy, editors: Advances in Artificial Intelligence
Theory, J. Research on Computing Science, Vol. 16, ISSN 1665-9899, IPN,
2005, printing 500;
• A. Gelbukh and R. Monroy, editors: Advances in Artificial Intelligence
Applications, J. Research on Computing Science, Vol. 17, ISSN 1665-9899,
IPN, 2005, printing 500.
Book Chapters
• M. González-Mendoza and R. Monroy. Inteligencia Artificial. Chapter in,
Julio Ernesto Rubio Barrios (ed.), Nuevas tendencias tecnológicas, Tecnológico de Monterrey. 2010. pp: 1-31. (in press)
• A. de Albornoz, P. Escamilla-Velasco, R. Brena-Pinero, R. Monroy,
R. Soto Rodrı́guez, S. Cerón-Alegre, M. Valenzuela-Rendón, E. VallejoClemente. Inteligencia Artificial. Chapter in Las Megatendencias Tecnológicas Actuales y su Impacto en la Identificación de Oportunidades
Estratégicas de Negocios. ITESM. México. 2009. Grupo de Desarrollo
Regional. pp: 105-117.
15
• R. Monroy, M. Alvarado and M. Osorio. Logic and Computation, Chapter
in, H. Sossa and G. Arroyo, editors, MICAI/TAINA 2002, avances en
inteligencia artificial. Centro de Investigación en Computación-IPN, 2002.
• A. Aliseda and R. Monroy. Logic and Computation, Chapter in, J. M.Ahuactzin, editor, Encuentro Nacional de Computación, ENC‘99. Universidad de las Américas, 1999.
Invited Papers
1. R. Monroy. Some Encounters on the Productive Use of a Failed Proof
Attempt or a Counterexample. In, G. Sidorov, A. Hernández-Aguirre and
C.-A. Reyes-Garcı́a, editors, Proceedings of the 9th Mexican International
Conference on Artificial Intelligence, MICAI‘10, LNAI Vol. 6437, pp. 1 12, 2010. Springer.
Conference Papers
1. J. B. Camiña, J. Rodrı́guez, and R. Monroy. Towards a Masquerade
Detection System based on User’s Tasks. In, A. Stavrou, H. Bos and G.
Portokalidis, editors, Proceedings of the 17th International Symposium on
Research in Attacks, Intrusions and Defenses, RAID. LNCS vol. 8688,
pp. 447 - 465. September, 2014. Springer.
2. J. C. López-Pimentel, V. Ramos Fon Bon and R. Monroy. A Web Service
for Signing and Authenticating Digital Documents based on Symmetric
Cryptography Protocol. International Journal of Digital Information and
Wireless Communications (IJDIWC) 1(2): 434-444. The Society of Digital Information and Wireless Communications (SDIWC), 2012.
3. B. Camiña, R. Monroy, L. Trejo, and E. Sánchez. Towards Building a
Masquerade Detection Method Based on User File System Navigation.
In, I. Batyrshin, and G. Sidorov, editors, Proceedings of the 2011 Mexican International Conference on Artificial Intelligence, Part I, MICAI’11,
LNCS vol. 7094, pp. 174 - 186, 2011. Springer.
4. J. C.-López-Pimentel, R. Monroy, and V. Ramos. Symmetric Cryptographic Protocol for Signing and Authenticating Digital Documents.
In, V. Snasel and Y. Imai, editors, Proceedings of the 2011 International Conference on Digital Information Processing and Communications, ICDIPC’2011, LNCS (Communications in Computer Information
Sciences Series) vol. 188, pp. 9-23, 2011. Springer.
5. Karen Garcı́a, E. Aguirre, R. Monroy and C. Mex-Perera. An Architecture
for Forensic Intrusion Detection on System Logs. In, D. He, X. Chen and
M. Reza-Abdi, editors, Proceedings of the 2010 International Conference
on Information Security and Artificial Intelligence, ISAI 2010, pp. to
appear, 2010. IEEE Computer Science Press.
16
6. I. Becerra, R. Murrieta-Cid and R. Monroy. Evader Surveillance under
Incomplete Information. In Vijay Kumar, editor, Proceedings of the 2010
IEEE International Conference on Robotics and Automation, ICRA 2010,
pp: to appear, IEEE Computer Science Press.
7. L.-A. Trejo, R. Alonso, R. Monroy, E. Sánchez, J. Vázquez, and M.
Maqueo. Using Cloud Computing MapReduce operations to Detect DDoS
Attacks on DNS servers. In Proceedings of 4th Iberian Grid Infrastructure
Conference, IBERGRID 2010.
8. D. Hutter and R. Monroy. On the automated correction of protocols
with improper message encoding. In, L. Vigan‘o and P. Degano, eds.,
Proceedings of the Joint Workshop on Automated Reasoning for Security
Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS’09,
LNCS Vol. 5511, pages138-154. Springer, 2009.
9. R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.-P. Laumond. A complexity result for the Pursuit-Evasion Game of Maintaining Visibility of
a Moving Evader. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation, ICRA’08, pages pages 2657-2664,
USA, 2008. IEEE Computer Society Press.
10. Juan C. López P., Raúl Monroy and Dieter Hutter. On the Automated
Correction of Security Protocols Susceptible to a Replay Attack. In, J.
Biskup and J. Lopez, eds., Proceedings of the 12th European Symposium
Research Computer Security, ESORICS 2007. LNCS Vol. 4734, pages
594-609, Germany, 2007. Springer.
11. C. Mex-Perera, R. Posadas, J.-A. Nolazco, R. Monroy, A. Soberanes and
L. Trejo. An improved Non-negative Matrix Factorization Method for
Masquerade Detection. In, R. Vázquez and J.-A. Dı́az, eds., Proceedings of
the 1st Mexican International Conference on Informatics Security, MCIS
2006, Mexico, 2006. IEEE Computer Society Press.
12. R. Posadas, C. Mex-Perera, R. Monroy and J. A. Nolazco. Hybrid Method
for Detecting Masqueraders Using Session Folding and Hidden Markov
Models. In, A. Gelbukh and C. A. Reyes, eds., Proceedings of the 5th
Mexican International Conference on AI, MICAI 2006, LNAI Vol. 4293,
pages 622-631, Mexico, 2006. Springer.
13. Rafael Murrieta and Raúl Monroy. A Hybrid Segmentation Method
Applied to Color Images and 3D Information. In, A. Gelbukh and
C. A. Reyes, eds., Proceedings of the 5th Mexican International Conference on AI, MICAI 2006, LNAI Vol. 4293, pages 789-799, Mexico, 2006.
Springer.
14. Anna A. Álvarez, Karen A. Garcı́a, Raúl Monroy, Luis A Trejo and Jesús
Vázquez. A Tool for Managing Control Access Policies in Organisations.
In, H. Yoshiura, K. Sakurai and K. Rannenberg, eds., Proceedings on the
17
1st International Workshop on Security, IWSEC 2006, LNCS Vol. 4266,
pages 378-388, Kyoto Japan, 2006. Springer.
15. Vı́ctor H. Garcı́a-Pichardo, Raúl Monroy, Maricela Quintana. Web Attack Detection Using ID3. In, John Debenham, editor, Proceedings of the
2nd IFIP International Symposium on Professional Practice on AI, IFIP
Vol. 218, pages 323-332, Santiago, Chile, 2006. Springer.
16. Fernando Godı́nez, Dieter Hutter and Raúl Monroy. On the Use of Word
Networks to Mimicry Attack Detection. In, G. Müller and G. Schneider,
eds., Proceedings of the International Conference on Emerging Trends in
Information and Computer Security, ETRICS’06, LNCS Vol. 3995, pages
423-435, Freiburg, Germany, 2006. Springer.
17. L.-A. Dennis, R. Monroy and P. Nogueira. Proof-directed Debugging and
Repair. In, H. Nilsson and M. van Eekelen, eds., Proceedings of the Seventh
Symposium on Trends in Functional Programming, pages 131-140. 2006.
18. R. Murrieta-Cid, A. Sarmiento, T. Muppirala, S. Hutchinson, R. Monroy,
M. Alencastre-Miranda, L. Muñoz-Gómez, R. Swain. A framework for
reactive motion and sensing planning: a critical events-based approach.
In A. Gelbukh, A. de Albornoz and H. Terashima, Proceedings of the
Fourth Mexican International Conference in Artificial Intelligence, MICAI‘05, LNCS Vol. 3789, pages 999-1009, Monterrey, Nuevo León, Mexico, Springer-Verlag. Best Paper Award Recipient.
19. F. Godı́nez, D. Hutter and R. Monroy. On the Role of Information Compaction to Intrusion Detection. In H. Unger, editor, Proceedings of Fifth
IEEE International Symposium and School on Advance Distributed Systems ISSADS 2005, LNAI Vol. 3563, pages 83-98, Guadalajara, Jalisco,
México, 2005. Springer-Verlag.
20. F. Godı́nez, D. Hutter and R. Monroy. Audit File Reduction Using NGram Models. In A. Patrick and M. Yung, eds., Proceedings of the Ninth
International Conference on Financial Cryptography and Data Security,
FC‘05, LNCS Vol. 3570, pages 336-341, Roseau, The Commonwealth Of
Dominica, 2005. Springer-Verlag.
21. F. Godı́nez, D. Hutter and R. Monroy. Service Discrimination and
dit File Reduction for Effective Intrusion Detection. In C.H. Lim
M. Yung, eds., Proceedings of the Workshop on Information Security
plications, WISA 2005, LNCS Vol. 3325, pages 101-115, Jeju Island,
rea, 2005. Springer-Verlag.
Auand
ApKo-
22. J.C. López and R. Monroy. A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. In C. Lemaı̂tre,
C.A. Reyes and J.A. Gonzales, eds., Proceedings of the IX Ibero-American
Conference on Artificial Intelligence, IBERAMIA 2004, LNAI Vol. 3315,
18
pages 364-374, Puebla, Mexico, 2004. Springer-Verlag. Candidate to Best
Paper Award.
23. Raúl Monroy. A Process Algebra Model of the Immune System. In
M.G. Negoita, editor, Proceedings of the 8th Knowledge-Based Intelligent
Information & Engineering Systems, KES‘04, LNAI Vol. 3214, pages 526533, Wellington, New Zealand, September 2004. Springer-Verlag.
24. F. Godı́nez, D. Hutter and R. Monroy. Attribute Reduction for Effective
Intrusion Detection. In J. Favela, E. Menasalvas, and E. Chávez, eds.,
Proceedings of the 2004 Atlantic Web Intelligence Conference, AWIC‘04,
LNAI Vol. 3034, pages 74-83, Cancún, Mexico, 2004. Springer-Verlag.
25. R. Monroy and M. Carrillo. Automatic Formulation of Security Properties
Under the Inductive Approach. In M.H. Hamza, editor, Proceedings of
IASTED‘03, Applied Informatics-Software Engineering, pages 1020-1025,
Innsbruck, Austria, 2003. Acta Press.
26. M. Carrillo and R. Monroy, Towards Automating the Use of the Inductive
Approach for the Verification of Security Protocols. In H. Sossa and G.
Arroyo, eds., Proceedings of MICAI/TAINA‘02, avances en inteligencia
artificial, pages 125-134, Merida, Mexico, 2002. Centro de Investigación
en Computación-IPN, 2002.
27. R. Saab, R. Monroy and F. Godı́nez. Towards a Model for an Immune
System. In Coello-Coello, C., de Albornoz, A., Sucar, L.E. and Battistutti,
O.C., eds., Proceedings of the 2nd Mexican Internation Conference on
Artificial Intelligence, MICAI‘02, LNAI vol. 2313, pages 401-410, Mérida,
Mexico, 2002. Springer-Verlag. Best Paper Award Recipient.
28. R. Monroy. Concept Formation via Proof Planning Failure. In R.
Nieuwenhuis and A. Voronkov, eds., Proceedings of the 8th International
Conference in Logic for Programming, Artificial Intelligence and Reasoning, LPAR‘01, LNAI Vol. 2250, pages 718-731, La Havana Cuba, 2001.
Springer-Verlag.
29. M. Carrillo and R. Monroy. Lógicas de autenticación aplicadas al estudio
de protocolos. In Proceedings of the 27th Conferencia Latinoamericana en
Informática, CLEI‘2001. Mérida, Venezuela, 2001. CLEI.
30. R. Monroy. The use of Abduction and Recursion-Editor Techniques for the
Correction of Faulty Conjectures. In P. Flenner and P. Alexander, eds.,
Proceedings of the 15th Conference on Automated Software Engineering,
ASE’00, pages 91-99, Grenoble, Francia, 2000. IEEE Computer Science
Press. Candidate to best paper award.
31. E. Navarrete, E. Garcı́a and R. Monroy. Reconocimiento de patrones
en la exposición fotográfica. In L.A. Trejo, editor, Proceedings of the
26th Conferencia Latinoamericana de Informática, CLEI 2000, Atizapán,
Mexico, 2000. CLEI.
19
32. R. Monroy, A. Bundy, and I. Green. Searching for a Solution to Program
Verification = Equation Solving in CCS. In O. Cairó and F. Cantú, eds.,
Proceedings of the Mexican Internation Conference on Artificial Intelligence, MICAI‘00, LNAI Vol. 1793, pages 1-13, Acapulco, Mexico, 2000.
Springer-Verlag.
33. R. Monroy. The Use of Proof Planning Failure for Correcting Faulty Conjectures. In J.M. Ahuactzin, editor, 2nd Mexican Conference in Computer
Science, ENC’99, pages 1-6, Pachuca, Mexico, 1999. Sociedad Mexicana
de Ciencia de la Computación.
34. R. Monroy. On the Correction of Faulty Formulae. In A. de Albornoz,
and M. Alvarado, eds., Taller de Inteligencia Artificial, TAINA‘99, pages
56 - 68, D. F., Mexico, 1999. Instituto Politécnico Nacional.
35. R. Monroy, A. Bundy, and I. Green. Planning Equational Verification
in CCS. In D. Redmiles and B. Nuseibeh, eds., Proceedings of the 13th
Conference on Automated Software Engineering, ASE‘98, pages 43 - 52,
Hawaii, USA, 1998. IEEE Computer Society Press. Candidate to Best
Paper Award.
36. R. Monroy, A. Bundy, and I. Green. Annotated Term Rewriting for Deciding Observation Congruence. In H. Prade, editor, Proceedings of the 13th
European Conference on Artificial Intelligence, ECAI‘98, pages 393-397,
Brighton, England, 1998. Wiley & Sons.
37. R. Monroy. Observant: an Annotated Term Rewriting for Deciding Observation Congruence. In S. Negrete, editor, Encuentro Nacional de Computación, ENC’97, pages 40-50, Querétaro, Mexico, 1997. Universidad
Autónoma de Querétaro.
38. R. Monroy, A. Bundy, and A. Ireland. Proof Plans for the Correction
of Faulty Conjectures. In F. Pfenning, editor, Proceedings of the 5th International Conference on Logic Programming and Automated Reasoning,
LPAR’94, LNAI Vol. 822, pages 54-68, Kiev, Ukraine, 1994. SpringerVerlag. Also available from Edinburgh as Research paper 681.
Journal Papers (peer-reviewed)
1. B. Cervantes, M. González-Mendoza, R. Monroy, C.-E. Galdámez-Blanco,
E.-I. Garcı́-Pérez. Hacia la construcción de una herramienta para la
creación de bitácoras para Android. Journal of Research in Computing
93:111-120, CIC del IPN, 2015.
2. J. Rodrı́guez-Ruiz, R. Monroy and J.-B. Camiña-Prado. Hacia la detección de impostores mediante un modelo basado en tareas. Journal of
Research in Computing 62:45-56, CIC del IPN, 2013. Selected as the 3rd
best paper of the conference, award granted by the Mexican Society for
Artificial Intelligence.
20
3. J.-B. Camiña and R. Monroy. WUIL: una base de datos para probar
mecanismos de detección de intrusos. Journal of Research in Computing
62:57-66, CIC del IPN, 2013.
4. R. Alonso, R. Monroy, L. Trejo. Complejidad computacional de un caso
especial del cálculo de grupos en las redes de interacción. Research in
Computing Science 55(1):138-154, CIC-IPN, 2012. Selected as the 2nd
best paper of the conference, award granted by the Mexican Society for
Artificial Intelligence.
5. J. Vázquez, R. Monroy and L. Trejo. Un Nuevo Esquema para la Detección de Ataques en Redes Inalámbricas. Research in Computing Science 55(1):297 - 308, CIC, IPN, 2012.
6. B. Camiña, C. Hernández and R. Monroy. Hacia la detección de impostores mediante grafos de navegación. Research in Computing Science
55(1):285 - 296, CIC - IPN, 2012.
7. J. C. López-Pimentel, V. Ramos Fon Bon and R. Monroy. A Web Service
for Signing and Authenticating Digital Documents based on Symmetric
Cryptography Protocol. International Journal of Digital Information and
Wireless Communications (IJDIWC) 1(2): 434-444. The Society of Digital Information and Wireless Communications (SDIWC), 2012.
8. K. A.-Garcı́a-Gamboa, E. Aguirre-Bermudez, R. Monroy and C. MexPerera. Forensic Intrusion Detection on System Logs. In, A. Gelbukh
(ed.), Artificial Intelligence and Applications, Sociedad Mexicana de Inteligencia Artificial, pp: 231—241, 2009.
9. R. Alonso-Rodrı́guez, J.Vázquez-Islas, L. A.-Trejo-Rodrı́guez, R. Monroy
and E. Sánchez-Velázquez. How Social Networks Can Help to Detect
DDoS Attacks on DNS Servers. In, A. Gelbukh (ed.), Artificial Intelligence and Applications, Sociedad Mexicana de Inteligencia Artificial, pp:
261—270, 2009.
10. E. Aguirre-Bermudez, K. A.-Garcı́a-Gamboa and R. Monroy. Coloured
Petri Nets for Modelling Host-Based Attacks. In, A. Gelbukh (ed.), Artificial Intelligence and Applications, Sociedad Mexicana de Inteligencia
Artificial, pp: 281—290, 2009.
11. Carlos Mex-Perera, José Zamora-Elizondo and Raúl Monroy. Intrusion
Detection for Mobile Ad-Hoc Networks Based on a Non-Negative Matrix
Factorization. Journal of Research in Computing 40:131-140, CIC del
IPN, 2008.
12. M. Alencastre-Miranda, L. Muñoz-Gómez, R. Murrieta and R. Monroy.
Local Reference Frames vs. Global Reference Frame for Mobile Robot
Localization and Planning. In, A. Gelbukh and C. A. Reyes, eds., Journal
of , Mexico, 2006. IEEE Computer Society Press.
21
13. K. Garcı́a, R. Monroy and J. Vázquez. An Artificial Manager for Security
Policies in Organizations. Journal of Research in Computing Science.
17:97–106, 2005.
14. A. Calixto and R. Monroy. TLS Analysis Using CADP. Studia Informatica
Universalis, 2(2):234-249, 2002.
Doctoral External Examining
• External examiner, Tecnológico de Monterrey, campus Monterrey, 2015,
PhD, Carolina del Valle.
• External examiner, Centro de Investigación en Matemáticas, 2015, PhD,
Israel Becerra.
• External examiner, Centro de Investigación y de Estudios Avanzados del
IPN (CINVESTAV), 2015, Lil Marı́a Xibai Rodrı́guez Henrı́quez;
• External examiner, Centro de Investigación y de Estudios Avanzados del
IPN (CINVESTAV), 2013, Cuauhtemoc Mancillas López;
• External examiner, Centro de Investigación en Matemáticas (CIMAT),
2013, PHD, Ubaldo Ruiz López;
• External examiner, Universidad Michoacana de San Nicolás Hidalgo, 2011,
PhD, Anastacio Antolino Hernández;
• External examiner, Tecnológico de Monterrey, campus Monterrey, 2009,
PhD, Rafael A. Ayala Rodrı́guez;
• External examiner, Tecnológico de Monterrey, campus Monterrey, 2008,
PhD, Marcelo Fernández;
• External examiner, Tecnológico de Monterrey, campus Monterrey, 2003,
PhD, Jaime Solano; and
• External examiner, Tecnológico de Monterrey, campus Morelos, 2005,
PhD, Juan Segura.
MSc External Examining
• External examiner, ESIME — Culhuacan, IPN, 2015, MSc, Ilce Belén
Ramı́rez Osnaya.
• External examiner, Centro de Investigación en Matemáticas, 2010, MSc,
Israel Becerra.
Book Reviews
1. Long, L. and Long, N. Introducción a las computadoras y a los sistemas
de información, 5ta edición, Prentice Hall Hispanoamericana, 1999.
22
Magazine Papers
1. Raúl Monroy. Obituario Tardı́o por Donald Michie. La Jornada de Oriente, Junio 2, 2008.
2. Paralelismo en Computación. Soluciones Avanzadas, Vol. 1, No. 5, pp 4
– 10, Octubre, 1993.
Guest Lectures
1. ‘Detección de impostores basada en navegación de archivos’, CINVESTAV, Mayo, 2015.
2. ‘Inteligencia Artificial en la Seguridad Informática’, Universidad Michoacana de San Nicolás Hidalgo, Abril, 2015.
3. ‘Information Flow in Disaster Management Systems’, Intelligent Disaster
Management Workshop. February, 2015.
4. ‘A model based on social structures to detect traffic anomalies on DNS
servers’, 9th Latin American Workshop on Logic/Languages Algorithms
and New Methods of Reasoning 2014 (LANMR‘14). November, 2014.
5. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, Rtronics. Universidad Tecnológica de Tlaxcala. Septiembre 2013.
6. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, Rtronics. Congreso Mexicano de Inteligencia Artificial. Mayo 2013.
7. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, Rtronics. Universidad Autónoma del Estado de México, campus Valle de
México. Abril 2013.
8. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, Rtronics. Tecnológico de Monterrey, Campus Estado de México. October
2012.
9. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, Semana
ingenierı́a. UNAM, FES Aragón. October 2012.
10. ‘Detección oportuna de impostores y la base de datos WUIL-DS’, II Encuentro internacional en ingenierı́a de sistemas e informática, EIISI‘2012.
Universidad Pedagógica y Tecnológica de Colombia. October 2012.
11. ‘Aprovechando la adversidad, descubrimientos en la reparación automática
de protocolos’, 2do Congreso nacional de ciencias básicas. Universidad
Autónoma Juárez Tabasco. August 2012.
12. ‘Descubrimiento sobre el uso productivo del fracaso al intentar verificar
un modelo’, II Encuentro internacional en ingenierı́a de sistemas e informática, EIISI‘2011. Universidad Pedagógica y Tecnológica de Colombia. October 2011.
23
13. ‘Las redes temáticas de investigación del CONACYT’, VI Congreso nacional de investigación. Universidad Pedagógica y Tecnológica de Colombia. Octubre 2011.
14. ‘On Automatically Fixing Security Protocols”, Mexican International
Conference on Computer Science, ENC‘2011, SMCC. March 2011;
15. ‘Some Encounters on the Productive Use of a Failed Proof Attempt or a
Counterexample”, MICAI‘2010, SMIA. Noviembre 2010;
16. ‘Some Encounters on the Productive Use of a Failed Proof Attempt or a
Counterexample”, Semana de la investigación 2010, ITAM. Octubre 2010;
17. ‘Corrección automática de Protocolos de Seguridad’. Seminario de investigación. Instituto de Investigaciones Eléctricas, IIE. Septiembre, 2010;
18. ‘On the Automated Correction of Faulty Security Protocols’, Research
Seminar at DFKI, Bremen. June 2010;
19. ‘Corrección automática de Protocolos de Seguridad’. Seminario de investigación. Centro de Investigación en Matemáticas, CIMAT. Mayo 14,
2010;
20. ‘Corrección de Protocolos de Seguridad’. INTROMISIÓN 2008. Facultad
de Ciencias de la UNAM. Noviembre 24, 2008;
21. ‘Métodos Formales en el Desarrollo de Software’. 1er Congreso en
Inteligencia Artificial y Robótica. Universidad Autónoma de México.
Noviembre 21, 2008;
22. ‘La Situación de la Computación en México (Panelista)’. Congreso Celebración de los 25 años de los Posgrados en Computación en el CINVESTAV. CINVESTAV. Septiembre 4, 2008;
23. ‘On the Automated Correction of Security Protocols Susceptible to a Replay Attacks’. Seminario del CINVESTAV. CINVESTAV. Mayo 12, 2008;
24. ‘A complexity result for the Pursuit-Evasion Game of Maintaining Visibility of a Moving Evader’. Segundo Taller de Robótica y Planificación de
Movimientos. CIMAT. México. Febrero 2008;
25. ‘México ¿Crecimiento o Estagnación de la Cooperación en Investigación en
los Programas Marco de la Comunidad Europea?’. LA-Winds. Diciembre
7, 2007;
26. ‘On the Automated Correction of Security Protocols Susceptible to a Replay Attack’, Seminario Internacional en Sistemas y Computación de la
VI Semana Cientı́fica “Ciencia y Vida”, Fundaci’on Universitaria Juan de
Castellanos, Tunja, Colombia, Octubre 26, 2007;
24
27. ‘On Patching Faulty Security Protocols’, Scottish Theorem Proving seminar, School of Computer Science at St Andrews University, St Andrews,
UK, October 13, 2006;
28. ‘A method for patching interleaving-replay attacks in faulty security protocols’, CISA seminar, Centre for Intelligent Systems and Applications
of the School of Informatics at Edinburgh University, Edinburgh, UK,
August 31, 2006;
29. ‘On Automatically Patching Faulty Security Protocols, seminario de investigación, Centro de investigación en Matemáticas, CIMAT, Guanajuato,
July 6, 2006;
30. ‘Audit File Reduction Using NGram Models’, 36 congreso de investigación
y desarrollo del Tecnológico de Monterrey, Monterrey, N.L., 2006;
31. ‘Guı́a para preparar propuestas de investigación y artı́culos de revista’,
36 congreso de investigación y desarrollo del Tecnológico de Monterrey,
Monterrey, N.L., 2006;
32. ‘Seguridad Computacional’, Semana de computación de la Universidad
Autónoma del Estado de México, Toluca, México, 2005;
33. ‘Errores en el Desarrollo de Sistemas: Amenazas y Soluciones’, Sexto Congreso Estudiantil de Computación, CORE’05 at Centro de Investigación
en Computación del Instituto Politécnico Nacional, Mexico City, Mexico,
2005.
34. ‘Predicate Synthesis for the Correction of Faulty Conjectures’, 35 Congreso de Investigación y Desarrollo Tecnológico at ITESM, Monterrey,
Mexico, 2005.
35. ‘Lógica Computacional y Agentes Inteligentes’, Tercer Semana Cientı́fica
at Fundación Universitaria Juan Castellanos, Tunja, Colombia, 2004.
36. ‘Automated Formulation of Security Goals under the Inductive Approach’,
34 Congreso de Investigación y Desarrollo Tecnológico at ITESM, Monterrey, Mexico, 2004.
37. ‘Modelo Computacional de un Sistema Inmune Humano’, 7o Simposium
Internacional de Sistemas y Computación at 18th International Joint Conference on Artificial Intelligence, IJCAI, Acapulco, Mexico, 2003.
38. ‘Aplicaciones de Inteligencia Artificial en Seguridad Computacional’, Tercer Seminario de Seguridad Informática y Tecnologı́as de Información,
organised by Secretarı́a de la Defensa Nacional, 2003.
39. ‘Inteligencia Artificial’, Sexta Semana Académica at Tecnológico de Estudios Superiores de Coacalco, Coacalco, Mexico, 2003.
25
40. ‘Towards a Model for an Immune System’, 33 Congreso de Investigación
y Desarrollo Tecnológico at ITESM, Monterrey, Mexico, 2003.
41. ‘Uso productivo del fracaso en la búsqueda de una demostración’, seminario de investigación, consorcio interrectorı́as del Tecnológico de Monterrey, Atizapán, Mexico, 2003.
42. ‘Concept Formation Via Proof Planning Failure’, 32 Congreso de Investigación y Desarrollo Tecnológico at ITESM, Monterrey, Mexico, 2002.
43. ‘Técnicas de Automatización en el Razonamiento para el Desarrollo de
Sistemas’, Segundo Ciclo de Expoconferencias en Informática y Sistemas
Computacionales at Instituto de Educación Superior de Chiapas, Tuxtla
Gutiérrez, Mexico, 2001.
44. ‘Análisis de Protocolos de Seguridad’, Ciclo de Conferencias y Seminarios
en Seguridad Informática at Universidad Nacional Autónoma de México,
Mexico City, Mexico, 2001.
45. ‘The Uses of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures’, 31 Congreso de Investigación y Desarrollo
Tecnológico at ITESM, Monterrey, Mexico, 2001.
46. ‘On the Correction of Faulty Conjectures’, Doctoral Research Seminar,
Centre for Artificial Intelligence at Tecnológico de Monterrey, Monterrey,
Mexico, 2000.
47. ‘Desarrollo de Sistemas Automáticos para la Verificación de Software y
Hardware’, Semana de Computación at Universidad Autónoma del Estado
de México, Atizapán, Mexico, 2000.
48. ‘Planeación de Verificación de Sistemas Concurrentes’, Octava Semana de
Computación at Benemérita Universidad Autónoma de Puebla, Puebla,
Mexico, 1999.
49. ‘Corrección de errores en formulaciones incorrectas’, Cómputo 99, Mexico
City, Mexico, 1999.
50. ‘Lógica de Autenticación’, Seminario en Seguridad Computacional at Rectorı́a de la Universidad Virtual del Tecnológico de Monterrey, Atizapán,
Mexico, 1999.
51. ‘Demostración Automática por Inducción Matemática y sus Aplicaciones’,
Ciclo de Conferencias en Inteligencia Artificial at Tecnológico de Monterrey, Atizapán, Mexico, 1999.
52. ‘Por qué y Para qué Estudiar Inteligencia Artificial’, Ciclo de Conferencias
en Inteligencia Artificial at Tecnológico de Monterrey, Atizapán, Mexico,
1999.
26
53. ‘Planning Proofs of Equations’, 29 Congreso de Investigación y Desarrollo
Tecnológico at ITESM, Monterrey, Mexico, 1999.
54. ‘Verificación Automática de Sistemas de Comunicación’, Taller de Inteligencia Artificial (TAINA’98), Mexico City, Mexico, 1998.
55. ‘Trends in Operating Systems’, United States Trade Center Conference,
Mexico City, Mexico, 1991.
56. ‘La Enseñanza en Telecomunicaciones, Mexico y el Mundo: Expectativas y
Tecnologı́a en ese Instituto’, III Seminario “Banca y Telecomunicaciones”,
organised by Asociación Mexicana de Bancos, Guadalajara, Mexico, 1991.
Contexts in which my Work Has Been Cited
Type A Citations (194)
• B. Tovar, L. Muñoz-Gomez, R. Murrieta-Cid, M. Alencastre-Miranda,
R. Monroy and S. Hutchinson. Planning Exploration Strategies for Simultaneous Localization and Mapping. Journal of Robotics and Autonomous
Systems 54(4):314-331, 2006. Elsevier.
1. S. Chen, Y. Pisan, and C. Tien-Tan. A Scouting Strategy for RealTime Strategy Games. In Proceedings of the 2014 Conference on
Interactive Entertainment. ACM, 2014.
2. F. Amigoni, N. Basilico, A. Q. Li. Moving From ‘How to go There?’to
‘Where to go?’: Towards Increased Autonomy of Mobile Robots.
In New Trends in Medical and Service Robots, pp. 345-356, 2014,
Springer International Publishing.
3. L. M. Miller, T. D. Murphey. Trajectory optimization for continuous
ergodic exploration on the motion group se (2). In Decision and
Control (CDC), 2013 IEEE 52nd Annual Conference on, pp. 45174522, 2013, IEEE.
4. A AlDahak, L. Seneviratne, and J. Dias. Frontier-based exploration for unknown environments using incremental triangulation.
In Safety, Security, and Rescue Robotics (SSRR), 2013 IEEE International Symposium on, pp. 1-6, 2013, IEEE.
5. H. Yu, Y. Zhang, Y. Wang, and J. Zhu. Fast and robust frontier line
segment extracting method based on FCM for robot exploration. In
Chinese Automation Congress (CAC), pp. 685-690, 2013, IEEE.
6. F. Amigoni, A. Quattrini-Li, and D. Holz. Evaluating the impact of perception and decision timing on autonomous robotic exploration. In Proceedings of the European Conference on Mobile
Robotics, ECMR’2013, pp. 68-73, 2013, IEEE.
27
7. R. Cipolleschi, M. Giusto, A. Quattrini-Li, F. Amigoni.
Semantically-informed coordinated multirobot exploration of relevant areas in search and rescue settings. In Proceedings of the European Conference on Mobile Robotics, ECMR’2013, pp. 216-221, 2013,
IEEE.
8. F. Amigoni, N. Basilico, and A. Quattrini-Li. How Much Worth Is
Coordination of Mobile Robots for Exploration in Search and Rescue?
In RoboCup 2012: Robot Soccer World Cup XVI, LNCS Vol. 7500,
pp. 106-117, 2013. Springer.
9. T. Wattanavekin, T. Ogata, T. Hara, and J. Ota. Mobile Robot
Exploration by Using Environmental Boundary Information. ISRN
Robotics, 2013. Hindawi Publishing Corporation.
10. P. Chand and D.A. Carnegie. Mapping and exploration in a hierarchical heterogeneous multi-robot system using limited capability
robots. Robotics and Autonomous Systems 61(6):565 - 579, 2013.
Elsevier.
11. M. Juliá, A. Gil, O. Reinoso. A comparison of path planning strategies for autonomous exploration and mapping of unknown environments. Autonomous Robots 33(4):427-444, 2012. Springer.
12. A. Parulkar, P. Shukla, K. and M. Krishna. Fast randomized planner
for SLAM automation. In 2012 IEEE International Conference on
Automation Science and Engineering, CASE 2012, pages 765-770,
2012. IEEE Computer Science Press.
13. I. Jebari, S. Bazeille, and D. Filliat. Combined Vision and FrontierBased Exploration Strategies for Semantic Mapping. In Informatics
in Control, Automation and Robotics, 2012. LNEE, Vol. 133, Part
1, pages 237-244, 2012. Springer.
14. A. Quattrini-Li, F. Amigoni, N. Basilico: Searching for Optimal OffLine Exploration Paths in Grid Environments for a Robot with Limited Visibility. In, J. Hoffmann, B. Selman, editors, Proceedings of
the Twenty-Sixth AAAI Conference on Artificial Intelligence, AAAI
Press 2012
15. A. Quattrini-Li. Development of a framework for evaluating performance of exploration strategies of autonomous robots. Unpublished
PhD thesis. Politecnico de Milano. 2011.
16. QUN, Z. Path Planning, Mapping and Learning for Mobile Robot
Navigation, Doctoral dissertation, NATIONAL UNIVERSITY OF
SINGAPORE, 2012.
17. E. Mattison, and K. Ghose. Towards an Autonomous Indoor Vehicle: Utilizing a Vision-Based Approach to Navigation in an Indoor
Environment. In IT Convergence and Services, LNEE, Vol. 107, Part
4, pages 367-375, 2011. Springer.
28
18. P. M.-Walker, A. Kolling, and M. Lewis: Human exploration patterns
in unknown, time-sensitive environments. In Proceedings of the IEEE
International Conference on Systems, Man and Cybernetics, SMC
2011, pages 2870-2876, 2011. IEEE Computer Science Press.
19. P. Chand. Development of an Artificial Intelligence System for the
Instruction and Control of Cooperating Mobile Robots. Unpublished
PhD thesis. University of Victoria. 2011
20. Walcott, Aisha. Long-term robot mapping in dynamic environments.
Unpublished PhD thesis. Massachusetts Institute of Technology.
2011.
21. D. Holz, N. Basilico, and F. Amigoni. A comparative evaluation of
exploration strategies and heuristics to improve them. In European
Conference on Mobile Robots, October 2011.
22. N. Basilico and F. Amigoni. Exploration strategies based on multicriteria decision making for searching environments in rescue operations. Autonomous Robots 31(4):401-417, 2011. Springer.
23. N. Basilico and F. Amigoni. Exploration strategies based on MultiCriteria Decision Making for search and rescue autonomous robots.
In Tumer, Yolum, Sonenberg and Stoneeds, editors, Proc. of 10th
Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS
2011), pp. 99-106, 2011. IFAAMAS.
24. N. Basilico and F. Amigoni. Defining effective exploration strategies
for search and rescue applications with Multi-Criteria Decision Making. In Proceedings of the 2011 International Conference on Robotics
and Automation, ICRA’2011, pages 4260 - 4265, 2011, IEEE Computer Science Press.
25. V. Bhatawadekar, D. Fehr, V. Morellas, N. Papanikolopoulos. A
dynamic sensor placement algorithm for dense sampling. In Proceedings of the 14th International Conference on Information Fusion
FUSION’2011, pages 1 - 7, 2011, IEEE Computer Science Press.
26. X. Zhang, Y. Sun, J. Xiao, and F. Cabrera-Mora. Theseus gradient guide: An indoor transmitter searching approach using received
signal strength. In Proceedings of the 2011 International Conference
on Robotics and Automation, ICRA’2011, pages 2560 - 2565, 2011,
IEEE Computer Science Press.
27. S.-S. Ge, Q. Zhang, A.-T. Abraham, B. Rebsamen. Simultaneous
Path Planning and Topological Mapping (SP2ATM) for environment
exploration and goal oriented navigation. Robotics and Autonomous
Systems 59(3-4): 228-242, 2011.
28. I. Jebari, S. Bazeille, E. Battesti, H. Tekaya, T. Klein, M.-A. Filliat, D. Meyer, C. Sio-Hoi Ieng, R. Benosman, E. Cizeron, J.-C. Mamanna, B. Pothier. Multi-sensor semantic mapping and exploration
29
of indoor environments. In Proceedings of the 2011 IEEE International Conference on Technologies for Practical Robot Applications,
TePRA, pages 151 - 156, 2011, IEEE Computer Science Press.
29. M. Desnoyer, What You See Is What You Get so Look At What You
Want To See. Unpublished PhD thesis. School of Computer Science.
Carnegie Mellon University. 2011.
30. E. Mattison, and A. Garcia. An autonomous ground explorer utilizing a vision-based approach to indoor navigation. In Robotics Symposium, 2011 IEEE IX Latin American and IEEE Colombian Conference on Automatic Control and Industry Applications (LARC),
pages 1-6, 2011. IEEE Computer Society Press.
31. F. Amigoni and N. Basilico. A Decision-Theoretic Framework to
Select Effective Observation Locations in Robotic Search and Rescue Scenarios. In Proceedings of the IEEE International Conference
on Robtics and Automation (ICRA’2010) Workshop on Search and
Pursuit/Evasion in the Physical World.
32. M. Juliá, O. Reinoso, A. Gil, M. Ballesta, L. Payá: A hybrid solution to the multi-robot integrated exploration problem. Engineering
Applications of AI 23(4): 473-486, 2010.
33. F. Amigoni and V. Caglioti. An Information-Based Exploration
Strategy for Environment Mapping with Mobile Robots. Robotics
and Autonomous Systems 58(5):684-699, 2010. Elsevier.
34. A. Duffa and P.F.M.J. Verschure. Unifying perceptual and behavioral
learning with a correlative subspace learning rule. Neurocomputing
73(10-12):1810-1830. June, 2010. Elsevier.
35. R. J.-Duro, M. Graña, and J. de Lope. On the potential contributions of hybrid intelligent approaches to Multicomponent Robotic
System development. Information Sciences 180(14):2635-2648. July
15, 2010.
36. J.-A. Hernandez, A. Pustowka, E.-F. Caicedo, E.-B. Bacca. Formation control of cooperative robots with limited sensing using a virtual
robot as reference. In Proceedings of the 6th Latin American Robotics
Symposium (LARS), pages 1-7, 2009.
37. N. Basilico, F. Amigoni. Exploration Strategies based on MultiCriteria Decision Making for an Autonomous Mobile Robot. Proceedings of the Fourth European Conference on Mobile Robots
(ECMR2009), pages 259-264, 2009.
38. J. Molina-Vargas, C. Torres-Pinzón, C. Restrepo-Patiño. Técnicas
de Inteligencia Artificial para la Solución de Laberintos de Estructura Desconocida. Scientia Et Technica 14(39):135-140, Universidad
Tecnológica de Pereira, 2008.
39. N. Kwak, G.-W. Kim, S.-H. Ji, and B.-H. Lee. A Mobile Robot
Exploration Strategy with Low Cost Sonar and Tungsten-Halogen
30
Structured Light.
Journal of Intelligent and Robotic Systems
51(1):89-111, Springer, 2008.
40. L. Liu, T. G.-Crowe, J. N.-Bakambu. Efficient Exploration Algorithms for Rough Terrain Modeling Using Triangular Mesh Maps.
RAM 2008, pages 1206-1211, 2008. IEEE Computer Science Press.
41. Y. Sun, J. Xiao, X. Li, F. Cabrera-Mora. Adaptive Source Localization by a Mobile Robot Using Signal Power Gradient in Sensor
Networks. GLOBECOM 2008, pages 17-21, 2008. IEEE Computer
Science Press.
42. Francesco Amigoni. Experimental Evaluation of Some Exploration
Strategies for Mobile Robots. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation, ICRA 2008, pages
2818-2823, Pasadena, CA, USA, May 19-23, 2008. IEEE Computer
Science Press.
43. K. Sridharan, P.-R. Kumar. Robotic Exploration and Landmark Determination: Hardware-Efficient Algorithms and FPGA Implementations. Springer, 2008.
44. B. Lavis, T. Furukawa and H.-F. Durrant-Whyte. Dynamic space
reconfiguration for Bayesian search and tracking with moving targets.
Autonomous Robots 24(4): 387-399 (2008). Springer.
45. N. Petrellis, F. Gioulekas, M. Birbas, J. Kikidis, and A. Birbas. Application of Forward Error Correcting Algorithms to Positioning Systems. In, Peng-Yeng Yin, editor, Pattern Recognition Techniques,
Technology and Applications, pages 591-612, 2008. I-Tech.
46. A. S.-S. Huwedi. 3D Mapping of an Unknown Environment with a
Robust Cooperation Team of Mobile Robots. Unpublished PhD thesis.
Universität Karlsruhe (Technische Hochschule). 2008.
47. K.-R. Beevers. Mapping with Limited Sensing. PhD Thesis. Rensselaer Polytechnic Institute. New York, USA, 2007.
48. Z. Wei, G. Huang and P. Wang. The Research on Multi-robot Simultaneous Localization Mapping Algorithm. Proceedings of the 2007
IEEE International Conference on Automation and Logistics, pages
1241-1246, 2007. IEEE COmputer Science Press.
49. N. Petrellis, N. Konofaos, and G.-P. Alexiou. Using future position
restriction rules for stabilizing the results of a noise-sensitive indoor
localization system. Optical Engineering 46(6):1-15, 2007.
50. N. Petrellis, N. Konofaos, and G.-P. Alexiou. A Sensors System
for Indoor Localisation of a Moving Target Based on Infrared Pattern Recognition. In, R. Stolkin, editor, Scene Reconstruction Pose
Estimation and Tracking, pages 283-304, 2007. I-Tech.
51. B. Lavis, T. Furukawa, H. F.-Durrant-Whyte. Spatially Adaptive
Exploration for Autonomous Bayesian Search and Tracking. Submitted to Autonomous Robots, 2007.
31
52. B. Dimitris. Smart Technologies for Environmental Safety and
Knowledge Enhancement in Intermodal Transport. In Proceedings of
the 46th Conference of the European Regional Science Association,
ERSA’06, pages 1-16, Greece, 2006.
• R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.-P. Laumond. A complexity result for the Pursuit-Evasion Game of Maintaining Visibility of
a Moving Evader. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation, ICRA’08, pages pages 2657-2664,
USA, 2008. IEEE Computer Society Press.
1. F Shkurti, and G Dudek. On the complexity of searching for an
evader with a faster pursuer. In Proceedings of IEEE International
Conference on Robotics and Automation, ICRA’14, pages 4062-4067,
2014, IEEE Computer Science Press.
2. A. Kumar and A. Ojha. Anticipated Velocity Based Guidance
Strategy for Wheeled Mobile Evaders Amidst Moving Obstacles in
Bounded Environment. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of IndiaVol I Advances in Intelligent Systems and Computing Volume 248,
pp 789-798, 2014, Springer.
3. D. J. Kwak and H. J. Kim. Policy Improvements for Probabilistic
Pursuit-Evasion Game. Journal of Intelligent and Robotic Systems,
74(3-4):709-724, 2014. Springer.
4. C. Robin and S. Lacroix (2013). Failure anticipation in pursuitevasion. Robotics, 361.
5. Z. Cao, C. Zhou, L. Cheng, Y. Yang, W. Zhang, and M. Tan. A Distributed Hunting Approach for Multiple Autonomous Robots. International Journal of Advanced Robotic Systems 10:217-225, 2013.
Intechopen.
6. A. Abdelkader and H. El-Alfy. Visibility Induction for Discretized
Pursuit-Evasion Games. In Proceedings of the Twenty-Sixth AAAI
Conference on Artificial Intelligence, pages 1976-1982, 2012, AAAI
Press.
7. H. El-Alfy. A new approach for the two-player pursuit-evasion game.
In Proceedings of the 8th International Conference on Ubiquitous
Robots and Ambient Intelligence, URAI’2011, pages 396 - 397, 2011,
IEEE Computer Science Press.
8. J. Thunberg, P. Ogren, and X. Hu. A boolean control network approach to pursuit evasion problems in polygonal environments. In
Proceedings of the 2011 International Conference on Robotics and
Automation, ICRA’2011, pages 4506 - 4511, 2011, IEEE Computer
Science Press.
32
9. E. Stump, N. Michael, V. Kumar, V. Isler. Visibility-based deployment of robot formations for communication maintenance. In
Proceedings of the 2011 International Conference on Robotics and
Automation, ICRA’2011, pages 4498 - 4505, 2011, IEEE Computer
Science Press.
10. E. A. Stump and B. M. Sadler.
Persistent
lance using mutually-visible robotic formations,
http://dx.doi.org/10.1117/12.851148, 2011.
surveilSPIE :
11. I. Al-Bluwi, A. Elnagar. Maintaining visibility of a moving target:
Maximizing escape time vs. exposure time. In Proceedings of the
11th International Conference on Control, Automation, Robotics and
Vision, ICARCV 2010, pages 982-987, 2010, IEEE Computer Science
Press.
12. C. Giovannangeli, M. Heymann and E. Rivlin. Pursiut-Evasion
Games in Presence of Obstacles in Unknown Environments: towards
an Optimal Pursuit Strategy. Chaper 4, in Cutting Edge Robotics
2010, pages 47-80, 2010, Intech.
13. I. Al-Bluwi and A. Elnagar. Pursuit Evasion in Dynamic Environments with Visibility Constraints. In, H. Liu, H. Ding, Z. Xiong,
and X. Zhu, editors, Proceedings of the Intelligent Robotics and Applications Lecture Notes in Computer Science, 6425:116-129, 2010,
Springer.
14. I. Al-Bluwi, A. Elnagar. Maintaining visibility of a moving target:
Maximizing escape time vs. exposure time. In Proceedings of the 2010
11th International Conference on Control Automation Robotics Vision ICARCV’2010, pages 982 - 987, 2010, IEEE Computer Science
Press.
15. S. Bhattacharya. Pursuit-evasion games in mobile networks. Unpublished PhD Thesis. Electrical and Computer Department. University
of Illinois at Urbana-Champaign, 2010.
16. Cheng Wu. Novel function approximation techniques for large-scale
reinforcement learning. Unpublished PhD Thesis. College of Engineering, Department of Electrical and Computer Engineering at
Northeastern University, 2010.
17. H. El-Alfy, D. Jacobs and L. Davis. Assigning Cameras to Subjects
in Video Surveillance Systems. In Proceedings of the IEEE International Conference on Robotics and Automation, ICRA’09, pages
837-843, Kobe, Japan, May 12-17, 2009. IEEE Computer Science
Press.
18. H.-M. El-Alfy. Techniques For Video Surveillance: Automatic Video
Editing And Target Tracking. Unpublished PhD Thesis. University
of Maryland. 2009.
33
19. E.-A. Stump. Control for Localization and Visibility Maintenance
of an Independent Agent using Robotic Teams. Unpublished PhD
Thesis. University of Pennsylvania, 2009.
20. Christophe Giovannangeli. Pursuit-evasion games in presence of obstacles. Reseach report MRTN-CT-2004-005439. Sixth Framework
Programme. 2009.
• Vı́ctor H. Garcı́a-Pichardo, Raúl Monroy, Maricela Quintana. Web Attack Detection Using ID3. In, John Debenham, editor, Proceedings of the
2nd IFIP International Symposium on Professional Practice on AI, IFIP
Vol. 218, pages 323-332, Santiago, Chile, 2006. Springer.
1. K. Goseva-Popstojanova, G. Anastasovski, A. Dimitrijevikj, R. Pantev, and B. Miller. Characterization and classification of malicious
Web traffic. Computers and Security, 42:92-115. 2014.
2. C. I. Pinzón, J. F. de Paz, Á. Herrero, E. Corchado,
J. Bajo, J. M. Corchado.
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection
through data mining.
Information Sciences, 2013.
Elsevier.
http://dx.doi.org/10.1016/j.ins.2011.06.020.
3. S. K. Pramanik, S. Pramanik, B. K. Pramanik, M. K. Islam-Molla
and Md. E. Hamid. Hybrid Classification Algorithm for Knowledge
Acquisition of Biomedical Data. International Journal of Advanced
Science and Technology 44:99-112, July, 2012.
4. S. Jaiswal, N. Gupta, H. Shrivastava. Enhancing the features of Intrusion Detection System by using machine learning approaches. International Journal of Scientific and Research Publications, 2(2):166170, 2012.
5. A. S. Issa. Intrusion Detection System Based on Decision Tree and
Clustered Continuous Inputs. Raf. J. of Comp. & Math’s. 8(1):7987, 2011.
6. A.-M. Brifcani and A.-S. Issa. Intrusion Detection and Attack Classifier Based on Three Techniques: A Comparative Study. Eng. and
Tech. Journal, 29(2):396-412, 2011.
7. S.-A. Talekar, V.-S. Tidake, and P.-V. Shinde. Intelligent network
sniffer: a data mining approach. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology,
ICWET’11, pages 258 - 261, 2011. ACM.
8. H. Sarvari, M Mehdi-Keikha. Improving the accuracy of intrusion
detection systems by using the combination of machine learning approaches. In Proceedings of the Second International Conference of
Soft Computing and Pattern Recognition, SoCPaR 2010, pages 334337, 2010. IEEE Computer Science Press.
34
9. C. Pinzón, J.-F. de Paz, J. Bajo, A. Herrero, and E. Corchado.
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for
detecting SQL Injection attacks. In Proceedings of the 10th International Conference on Hybrid Intelligent Systems (HIS’2010), pages
73 - 78, 2010. IEEE Computer Science Press.
10. C. Pinzón, A. Herrero, J. F.-de Paz, E. Corchado and J. Bajo.
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks.
HAIS 2010, Part II, LNAI 6077:510-519, 2010. Springer.
11. J. Bajo, J.-M. Corchado, C. Pinzón, Y. de Paz, B. Pérez-Lancho.
SCMAS: A Distributed Hierarchical Multi-Agent Architecture for
Blocking Attacks to Databases. International Journal of Innovative
Computing, Information and Control 6(4)1:10, April 2010;
12. C. Pinzón. Arquitectura multi-agente adaptativa para la deteccin de
ataques en entornos dinmicos y distribuidos. Unpublished PhD Thesis. Universidad de Salamanca, 2010.
13. Gregory Blanc and Youki Kadobayashi. Towards Learning Intentions
in Web 2.0. In D.-J. Guan, editor, Proceedings of the 2009 Joint
Workshop on Information Security, August 6-7, 2009, Taiwan, 2009.
14. Liang Guangmin. Modeling Unknown Web Attacks in Network
Anomaly Detection. In Proceedings of the 2008 Third International
Conference on Convergence and Hybrid Information Technology, Volume 02, pages 112-116. 2008. IEEE Computer Science Press.
15. Lee, Joong-Hee Lee, Jong-Hyouk Sohn, Seon-Gyoung Ryu, Jong-Ho
Chung, Tai-Myoung. Effective Value of Decision Tree with KDD
99 Intrusion Detection Datasets for Intrusion Detection System. In
Proceedings of 10th International Conference on Advanced Communication Technology, 2008. ICACT 2008, Vol. 2, pages 1170-1175,
Gangwon-Do, South Korea, 2008. IEEE Computer Science Press.
16. Zeng Jin-quan, Zhao Hui,Lili Cai-ming,PENG Ling-xi. Principles
Inspired Approach to Detection of Web Attacks. Journal of University of Electronic Science and Technology of China 366:1215-1218,
December 2007. ISSN 1001-0548
17. Fady Hamoui. Détection de fraudes et Extraction de Connaissances.
Unpublished MSc. Université Montpellier II. 2007.
• R. Monroy, A. Bundy, and A. Ireland. Proof Plans for the Correction
of Faulty Conjectures. In F. Pfenning, editor, Proceedings of the 5th International Conference on Logic Programming and Automated Reasoning,
LPAR’94, LNAI Vol. 822, pages 65-68, Kiev, Ukraine, 1994. SpringerVerlag. Also available from Edinburgh as Research paper 681.
1. Moussa Demba. Specialization of Recursive Predicates from Positive
Examples Only. Journal of Computer Science 6(6): 619-625, 2010.
35
2. G. Sutcliffe. The SZS Ontologies for Automated Reasoning Software.
In, Rudnicki P, Sutcliffe G., Konev B., Schmidt R., Schulz S., eds.,
Proceedings of the Combined KEAPPA - IWIL Workshops., pp. 3849, Qatar, 2008;
3. Bernhard Gramlich. Strategic Issues, Problems and Challenges in Inductive Theorem Proving. Electronic Notes in Theoretical Computer
Science 125(2): 5-43 (2005);
4. M. Demba, F. Alexandre, and K. Bsaı̈es. Correction of faulty conjectures and programs extraction. In, W. Ahrendt, P. Baumgartner
and H. de Neville, eds., Proceedings of the CADE-20 Workshop on
Disproving-Non-Theorems, Non-Validity, Non-Provability pages 1727, Tallinn, Estonia, 2005.
5. S. Colton and A. Pease. Lakatos-Style Methods in Automated Reasoning. In 16th Eureopean Conference on Artificial Intelligence,
ECAI’2004, pp. 977-978, The Netherlands, 2004;
6. F. Alexandre, K. Bsaı̈es, M. Demba. Predicate Synthesis from Inductive Proof Attempt of Faulty Conjectures. Lecture Notes in Computer Science, Vol. 3018, Germany, pp. 20-33, 2003;
7. W. Ahrendt. Deduktive Fehlersuche in Abstrakten Datentypen, Germany, PhD Thesis, 2002;
8. W. Ahrendt. Deductive Search for Errors in Free Data Type Specifications Using Model Generation, Lecture Notes in Computer Science,
pp. 211-225, Vol. 2392, Germany, 2002;
9. D. Galmiche. Proof Plans and Proof Nets in Mixed Linear Logic,
in Electronic Notes in Theoretical Computer Science, Vol. 37, The
Netherlands, 2000;
10. J. Richardson. Proof Planning with Program Schemas, Lecture Notes
in Computer Science, pp. 313-315, Vol. 1559, Germany, 1998;
11. M. Protzen. Patching Faulty Conjectures. In, M.-A. McRobbie, J.K. Slaney, eds., Proceedings of the 13th International Conference on
Automated Deduction, Lecture Notes in Computer Science vol. 1104,
pages 77-91, Springer, 1996;
12. M. Protzen. Disproving Conjectures and Lazy Generation of Induction Hypotheses, Technical University of Darmstad, PhD Thesis,
1995;
13. P. Flener and L. Popelinsky. On the Use of Inductive Reasoning in
Program Synthesis: Prejudice Prospects, Lecture Notes in Computer
Science, pp. 69-87, Vol. 883, Germany, 1994.
• R. Posadas, C. Mex-Perera, R. Monroy and J. A. Nolazco. Hybrid Method
for Detecting Masqueraders Using Session Folding and Hidden Markov
Models. In, A. Gelbukh and C. A. Reyes, eds., Proceedings of the 5th
Mexican International Conference on AI, MICAI 2006, LNAI Vol. 4293,
pages 622-631, Mexico, 2006. Springer.
36
1. J. A Iglesias, A. Ledezma, and A. Sanchis. Evolving classification of
UNIX users’ behaviors. Evolving Systems, 1-8, 2014, Springer.
2. H. A. Kholidy, F. Baiardi, S. Hariri. DDSGA: A Data-Driven
Semi-Global Alignment Approach for Detecting Masquerade Attacks.
IEEE Transactions on Dependable and Secure Computing P(99):114, 2014, IEEE.
3. J. E. Tapiador, J. C. Hernandez-Castro and P. Peris-Lopez. Online
Randomization Strategies to Obfuscate User Behavioral Patterns.
Journal of Network and Systems Management 20(4):561-578, 2012.
Springer.
4. H. A. Kholidy and F. Baiardi. CIDD: A Cloud Intrusion Detection
Dataset for Cloud Computing and Masquerade Attacks. In Information Technology: New Generations (ITNG) pages 397 - 402, 2012.
IEEE Computer Science Press.
5. J. E. Tapiador and J. A. Clark. Masquerade mimicry attack detection: A randomised approach. Computers and Security 30(5):297310, 2011. Elsevier.
6. L. Huang, and M. Stamp. Masquerade detection using profile hidden Markov models. Computers and Security, 30(8):732-747, 2011,
Elsevier. doi:10.1016/j.cose.2011.08.003.
7. J.E. Tapiador, J.A. Clark. Masquerade mimicry attack detection: A
randomised approach. Computers and Security 30(5):297-310, 2011.
8. A. M. Bartkowiak. Command and Block Profiles for Legitimate Users
of a Computer Network. Computer Information Systems — Analysis and Technologies Communications in Computer and Information
Science 245:295-304, 2011. Springer.
9. J.E. Tapiador, J.A. Clark. Information-Theoretic Detection of
Mimicry Masquerade Attacks, In Proceedings NSS 2010, pages 183 190, 2010. IEEE Computer Society Press.
10. C. Strasburg, S. Krishnan, K. Dorman, S. Basu, J.-S. Wong.
Masquerade Detection in Network Environments. In 2010 10th
IEEE/IPSJ International Symposium on Applications and the Internet, pages 38-44, 2010.
11. C. Benitez and P. Fierens. Experiments in command dimension reduction in masquerader detection. In Proceedings of V Congreso
Iberoamericano de Seguridad Informática, pages 31-45, Montevideo,
Uruguay. Universidad de la República de Uruguay, 2008. ISBN:
978-9974-0-0593-8.
12. M. Bertacchini and P. Fierens. A Survey on Masquerader Detection
Approaches. In Proceedings of V Congreso Iberoamericano de Seguridad Informática, pages 46-60, Montevideo, Uruguay. Universidad de
la República de Uruguay, 2008. ISBN: 978-9974-0-0593-8.
37
• L.-A. Dennis, R. Monroy and P. Nogueira. Proof-directed Debugging and
Repair. In, H. Nilsson and M. van Eekelen, eds., Proceedings of the Seventh
Symposium on Trends in Functional Programming, pages 131-140. 2006.
1. R. Samanta. Program reliability through algorithmic design and analysis. Unpublished PhD thesis. University of Texas. 2013
2. Andrea Arcuria. Evolutionary repair of faulty software. Applied Soft
Computing 11(4): 3494-3514, 2011.
3. H. A. Hussein, K. M. Mahar, M. F. Hussein and O. M. Badawy. Automatic Correction of Programming Faults using Semantic Networks.
Acta Press. 10.2316/P.2011.758-034.
4. Andrea, Arcuri. Automatic software generation and improvement
through search based techniques. Unpublished PhD thesis. University
of Birmingham. 2009.
5. Andrea Arcuri. Evolutionary Repair of Faulty Software. Technical
report, CSR-09-02. University of Birmingham, 2009.
6. R. Samanta, J. Deshmukh. and E.-A. Emerson. Automatic Generation of Local Repairs for Boolean Programs. In Formal Methods in
Computer-Aided Design, pp. 1-10, 2008.
7. Y. Zhang and Y. Ding. CTL Model Update for System Modifications.
Journal of Artificial Intelligence Research 31: 113-155, 2008.
8. J.-S. Fitzgerald and P.-G. Larsen. Balancing Insight and Effort: The
Industrial Uptake of Formal Methods. In, C.-B. Jones, Z. Liu and
J. Woodcock, eds., Formal Methods and Hybrid Real-Time Systems,
Essays in Honor of Dines Björner and Chaochen Zhou on the Occasion of Their 70th Birthdays, LNCS Vol. 4700, pages 237-254, Macao,
China, 2007. Springer.
• Raúl Monroy. Predicate Synthesis for Correcting Faulty Conjectures: the
Proof Planning Paradigm, Automated Software Engineering, an International Journal, (10):247-269, 2003.
1. Alan Bundy. Cooperating Reasoning Processes: More than just the
Sum of their Parts. In Proceedings of IJCAI’2007, pp. 2-11, Morgan
Kaufmann, 2007.
2. L. A. Dennis. Program Slicing and Middle-Out Reasoning for Error
Location and Repair. IJCAR 2006 workshop on Disproving: NonTheorems, Non-Validity and Non-Provability, Seattle, Washington,
2006.
3. J. Souquiére. Demande d’opération QSL Modélisation formelle
MODFORM. Project description, QSL (France), 2006;
4. Louise A. Dennis and Pablo Nogueira. What can be Learned from
Failed Proofs of Non-Theorems? In Proceedings of the Emerging
Trends track of TPHOLs 2005. Technical Report. Oxford University,
2005.
38
5. G. Steel. The Importance of Non-theorems and Counterexamples in
Program Verification. In T. Hoare and J. Misra, eds., Proceedings of
the Verified Software: Theories, Tools, Experiments (VSTTE) Conference. Position paper, 2005;
6. L. Dennis, The Use of Proof Planning Critics to Diagnose Errors in
the Base Cases of Recursive Programs, in 2nd International Joint
Conference On Automated Reasoning, pp. (To appear in Electronic
Notes in Theoretical Computer Science), 2004.
7. G. Steel, Discovering Attacks on Security Protocols by Refuting Incorrect Inductive Conjectures, PhD Thesis, Edinburgh University, 2003.
• J.C.-López P. and R. Monroy. Formal Support to Security Protocol Development: a Survey. Computación y Sistemas, special volume celebrating
50 years of Computing in Mexico, 12(1):89-109, CIC del IPN, 2008.
1. R. Merkel, C. Kraetzer, R. Altschaffel, E. Clausing, M. Schott and
J. Dittmann. Fingerprint Forensics Application Protocol: Semiautomated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. In Digital Forensics and Watermarking LNCS 7128:321-335, 2012. Springer.
2. I. You, Y. Hori, and K. Sakurai. Towards formal analysis of wireless LAN security with MIS protocol. International Journal of Ad
Hoc and Ubiquitous Computing 7(2):112 - 120, 2011. InderScience
Publishers.
3. C. Kraetzer, R. Merkel, R. Altschaffel, E. Clausing, J. Dittmann.
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. In Proceedings of the thirteenth ACM multimedia workshop
on Multimedia and security, MM&Sec’11, pages 93-102, 2011. ACM
Press.
4. R. Patel, B. Borisaniya, A. Patel, D. Patel, M. Rajarajan, A. Zisman. Comparative Analysis of Formal Model Checking Tools for
Security Protocol Verification. In Proceedings of the Third International Conference on Recent Trends in Network Security and Applications, CNSA 2010, Communications in Computer and Information
Science 89:152-163, 2010. Springer.
5. N. Moebius, K. Stenzel, W. Reif. Pitfalls in Formal Reasoning about
Security Protocols. In Proceedings of ARES 2010 - Fifth International Conference on Availability, Reliability and Security, pages (to
appear), 2009, IEEE Computer Science Press.
6. N. Moebius, K. Stenzel, and W. Reif. Formal Verification of
Application-Specific Security Properties in a Model-Driven Approach. In, F. Massacci, D.-S. Wallach, N. Zannone, eds., Proceedings
of Engineering Secure Software and Systems, Second International
39
Symposium, ESSoS 2010, Pisa, Italy. Lecture Notes in Computer
Science Vol. 5965, pages 166-181. Springer-Verlag, 2010.
• Juan C. López P., Raúl Monroy and Dieter Hutter. A method for patching
interleaving-replay attacks in faulty security protocols. Electronic Notes
in Theoretical Computer Science 174(4):117-130, 2007.
1. B. Bonakdarpour, R. Hajisheykhi, and S. S Kulkarni. KnowledgeBased Automated Repair of Authentication Protocols. In Formal
Methods FM 2014, pp. 132-147, 2014. Springer International Publishing.
2. A. Jurcut, T. Coffey, R. Dojen. Symmetry in Security Protocol Cryptographic Messages — A Serious Weakness Exploitable by Parallel
Session Attacks. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES), 2012, pages
410 - 416, IEEE Computer Society Press, 2012.
3. A. Singhal, P. Rustagi. A Study on Protocol Patching Using
SHRIMP. B. Tech Project Report, DA-IICT, Gandhinagar, 2010.
4. M. Jain. Is the attack valid? A tool for detecting erroneous attacks
found by Scyther. Dhirubhai Ambani Institute of Information and
Communication. B. Tech Project Report, DA-IICT, Gandhinagar,
2008.
5. S. Lal. A Connector between Scyther and SHRIMP. Dhirubhai Ambani Institute of Information and Communication. B. Tech Project
Report, DA-IICT, Gandhinagar, 2008.
6. A. Chakaborty. Automated Detection of Typing Flaws. Dhirubhai Ambani Institute of Information and Communication. B. Tech
Project Report, DA-IICT, Gandhinagar, 2007.
• F. Godı́nez, D. Hutter and R. Monroy. Attribute Reduction for Effective
Intrusion Detection. In J. Favela, E. Menasalvas, and E. Chávez, eds.,
Proceedings of the 2004 Atlantic Web Intelligence Conference, AWIC‘04,
LNAI Vol. 3034, pages 74-83, Cancún, Mexico, 2004. Springer-Verlag.
1. N. Senan. Feature selection for traditional Malay musical instrument
sound classification using rough set. Unpublished PhD thesis, Universiti Tun Hussein Onn Malaysia. 2013
2. S.-K. Shrivastava, and P. Jain. Effective Anomaly based Intrusion
Detection using Rough Set Theory and Support Vector Machine. International Journal of Computer Applications 18(3):35-41, 2011.
3. Neveen I. Ghali. Feature Selection for Effective Anomaly-Based Intrusion Detection. IJCSNS International Journal of Computer Science and Network Security 9(3):285-289, 2009.
4. W. Chimphlee, A.-H. Abdullah, M.-N. Md Sap, S. Chimphlee and
S. Srinoy. A Rough-Fuzzy Hybrid Algorithm for Computer Intrusion
40
Detection. The Int. Arab Journal of Inf. Technology 4(3):247-254,
2007.
5. W. Chimphlee, A.-H. Abdullah, M.-N. Md Sap, S. Chimphlee and
S. Srinoy. Unsupervised Clustering Methods for Identifying Rare
Events in Anomaly Detection. Transactions on Engineering, Computing and Technology 8:253-258, 2005.
6. W. Chimphlee, M.-Noor.M. Sap, A.-H. Abdullah, S. Chimphlee,
S. Srinoy. Hybrid Model for Computer Intrusion Detection. Proceedings of the 4th WSEAS Int. Conf. on Information Security,
Communications and Computers, Tenerife, Spain, December 16-18,
2005 (pp316-320).
• R. Monroy. The use of Abduction and Recursion-Editor Techniques for the
Correction of Faulty Conjectures. In P. Flenner and P. Alexander, eds.,
Proceedings of the 15th Conference on Automated Software Engineering,
ASE’00, pages 91-99, Grenoble, Francia, 2000. IEEE Computer Science
Press.
1. Moussa Demba. Specialization of Recursive Predicates from Positive
Examples Only. Journal of Computer Science 6(5): 512-518, 2010.
2. M. Demba, F. Alexandre, and K. Bsaı̈es. Correction of faulty conjectures and programs extraction. In, W. Ahrendt, P. Baumgartner
and H. de Neville, eds., Proceedings of the CADE-20 Workshop on
Disproving-Non-Theorems, Non-Validity, Non-Provability pages 1727, Tallinn, Estonia, 2005.
3. J. Gow. The Dynamic Creation of Induction Rules Using Proof Planning, PhD Thesis, Edinburgh University, 2004;
4. F. Alexandre, K. Bsaı̈es, M. Demba. Predicate Synthesis from Inductive Proof Attempt of Faulty Conjectures. Lecture Notes in Computer Science, Vol. 3018, Germany, pp. 20-33, 2003;
5. G. Steel. Discovering Attacks on Security Protocols by Refuting Incorrect Inductive Conjectures, PhD Thesis, Edinburgh University,
2003.
• I. Razo-Zapata, C. Mex-Perera, and R. Monroy. Masquerade Attacks
Based on User’s Profile. Journal of Systems and Software 85(11):26402651, Elsevier, 2012.
1. S. Sen. Using instance weighted naive bayes for adapting concept
drift in masquerade detection. International Journal of Information
Security 13(6):583-590, Springer, 2014.
2. S. Sen. Sequence-based masquerade detection for different user
groups. Security and Communication Networks, Wiley, 2014.
3. P. B. Ruthven. Contextual Profiling of Homogeneous User Groups for
Masquerade Detection. Unpublished MSc thesis, Gjφvik University,
2014.
41
4. C. J. Tucker. Performance Metrics for Network Intrusion Systems.
Unpublished PhD thesis. University of Plymouth, 2013.
• Raúl Monroy. The Use of Abduction to Correct Faulty Conjectures. Unpublished MSc. University of Edinburgh. 1994.
1. Moa Johansson, Lucas Dixon and Alan Bundy. Conjecture Synthesis
for Inductive Theories. Journal of Automated Reasoning (to appear)
DOI: 10.1007/s10817-010-9193-y. 2010. Springer.
2. Moa Johansson. Automated Discovery of Inductive Lemmas. Unpublished PhD Thesis. University of Edinburgh. 2009.
3. G. Steel. Discovering Attacks on Security Protocols by Refuting Incorrect Inductive Conjectures, PhD Thesis, Edinburgh University,
2003.
4. Graham Steel. Non-theorems and Cryptographic Protocols. Unpublished PhD Thesis Proposal. Edinburgh University, 2002.
• R. Saab, R. Monroy and F. Godı́nez. Towards a Model for an Immune
System. In Coello-Coello, C., de Albornoz, A., Sucar, L.E. and Battistutti,
O.C., eds., Proceedings of the 2nd Mexican Internation Conference on
Artificial Intelligence, MICAI‘02, LNAI vol. 2313, pages 401-410, Mérida,
Mexico, 2002. Springer-Verlag. Best Paper Award Recipient.
1. M. Villalobos-Arias, C. A. Coello-Coello, O. Hernández-Lerma. Convergence Analysis of a Multiobjective Artificial Immune System Algorithm. Lecture Notes in Computer Science, Vol. 3239, Germany,
pp. 226-235, 2004;
2. N. Cortez. Sistema inmune artificial para solucionar problemas de
optimización. PhD Thesis. Centro de Investigación y de Estudios
Avanzados del Instituto Politécnico Nacional (CINVESTAV), 2004;
3. M. Villalobos-Arias. Análisis de Heurı́sticas de Optimización para
Problemas Multiobjetivo. PhD Thesis. Centro de Investigación y
de Estudios Avanzados del Instituto Politécnico Nacional (CINVESTAV), 2004.
• R. Monroy, R. Saab and F. Godı́nez. On Modelling an Immune System.
Computación y Sistemas. 7(4):249–259, 2004.
1. Panagiotis Papadopoulos. Understanding the Function of the Immune System of the Human Body with the Development of a Mathematical Model, Unpublished MSc Thesis, Imperial College London,
2010.
2. H.-W. Mo. Research of immune system response based on partial differential equation. Computer Engineering and Applications 45(11):14. 11 Apr. 2009.
42
3. Y. Abdelgadir and A. Abdullah. Biologically Inspired Model for
Securing Hybrid Mobile Ad Hoc Networks. In Proceedings of International Symposium on the Information Technology, 2008. ITSim
2008, pages 1-6, 2008. IEEE Computer Science Press.
• K. A. Garcı́a, R. Monroy, L. A. Trejo, C. Mex-Perera, and E. Aguirre. Analyzing Log Files for Post-mortem Intrusion Detection. Journal of IEEE
Transactions on Systems, Man, and Cybernetics — Part C 42(6):16901704. IEEE Computer Press, 2012.
1. K. Ethala, R. Sheshadri, and S.-S. Chakkaravarthy. WIDS RealTime Intrusion Detection System Using Entrophical Approach. Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Springer India, 2015. 73-79.
2. Layman, L., Diffo, S. D., & Zazworka, N. (2014, April). Human
factors in webserver log file analysis: a controlled experiment on investigating malicious activity. In Proceedings of the 2014 Symposium
and Bootcamp on the Science of Security (p. 9). ACM.
3. Butun, I., Morgera, S., & Sankar, R. (2014). A Survey of Intrusion Detection Systems in Wireless Sensor Networks. Communication Surveys and Tutorials 16(1):1-17.
• Raúl Monroy. A Process Algebra Model of the Immune System. In
M.G. Negoita, editor, Proceedings of the 8th Knowledge-Based Intelligent
Information & Engineering Systems, KES‘04, LNAI Vol. 3214, pages 526533, Wellington, New Zealand, September 2004. Springer-Verlag.
1. V. Narang, J. Decraene, S. Yoon Wong, B. S. Aiswarya, A. R. Wasem,
S. Rong Leong and A. Gouaillard. Systems immunology: a survey
of modeling formalisms, applications and simulation tools. Immunologic Research 53(1-3):251-265, 2012. Springer.
2. C. McCaiga, R. Normana, and C. Shankland. From individuals to
populations: A mean field semantics for process algebra. Theoretical
Computer Science 412(17):1557-1580, April 2011.
3. A. Nash and S. Kalvala. A framework proposition for cellular locality
of Dictyostelium modelled in π-Calculus. In proceedings of the 2nd
Complex Systems Modelling and Simulation (CoSMoS) Workshop,
pages 83 - 100, 2009. Luniver Press.
• R. Monroy, A. Bundy, and I. Green. Planning Proofs of Equations in
CCS. Journal of Automated Software Engineering 7(3):263–304, 2000
1. Bernhard Gramlich. Strategic Issues, Problems and Challenges in
Inductive Theorem Proving. Electronic Notes in Theoretical Compututer Science 125(2): 5-43 (2005);
2. L.-A. Fredlund. A Framework for Reasoning about erlang Code.
PhD Thesis. Royal Institute of Technology. Sweden, 2001.
43
• R. Monroy and M. Carrillo. Automatic Formulation of Security Properties
Under the Inductive Approach. In M.H. Hamza, editor, Proceedings of
IASTED‘03, Applied Informatics-Software Engineering, pages 1020-1025,
Innsbruck, Austria, 2003. Acta Press.
1. Anitha, D., & Punithavalli, M. (2009). A Survey of Secure Group
Key Management. Networking and Communication Engineering
1(7):422-429.
2. G. Steel and A. Bundy. Attacking Group Protocols by Refuting
Incorrect Inductive Conjectures. Journal of Automated Reasoning,
special issue on Automated Reasoning for Security Protocol Analysis.
Kluwer 2005 (to appear).
3. G. Steel and A. Bundy. Attacking a Group Multicast Key Management Protocol using CORAL. Electronic Notes in Theoretical Computer Science 125(1):125-144.
• C. Mex-Perera, R. Posadas, J.-A. Nolazco, R. Monroy, A. Soberanes and
L. Trejo. An improved Non-negative Matrix Factorization Method for
Masquerade Detection. In, R. Vázquez and J.-A. Dı́az, eds., Proceedings of
the 1st Mexican International Conference on Informatics Security, MCIS
2006, Mexico, 2006.
1. L. Huang, and M. Stamp.
Masquerade detection using profile hidden Markov models.
Computers and Security (2011)
doi:10.1016/j.cose.2011.08.003.
2. Maximiliano Bertacchini and Pablo Fierens. A Survey on Masquerader Detection Approaches. In Proceedings of V Congreso Iberoamericano de Seguridad Informática, pages 46-60, Montevideo, Uruguay.
Universidad de la República de Uruguay, 2008. ISBN: 978-9974-00593-8.
• R. Monroy and A. Bundy. On the correction of faulty formulae. Computación y Sistemas, 5(1):25-37, 2001.
1. R. Zarrad, M. Demba, and K. Bsaies. Prouvabilité et correction des
formules implicatives. Quatrièms Journées Francophones de Programmation par Contraintes (2008):391-395. INRIA, 2008.
2. Fiona McNeill Dynamic Ontology Refinement. Unpublished PhD
Thesis, University of Edinburgh, 2006.
• R. Monroy. Concept Formation via Proof Planning Failure. In R.
Nieuwenhuis and A. Voronkov, eds., Proceedings of the 8th International
Conference in Logic for Programming, Artificial Intelligence and Reasoning, LPAR‘01, LNAI Vol. 2250, pages 718-731, La Havana Cuba, 2001.
Springer-Verlag.
44
1. Alan Bundy. Cooperating Reasoning Processes: More than just the
Sum of their Parts. In Proceedings of IJCAI’2007, pp. 2-11, Morgan
Kaufmann, 2007;
• J.C. López and R. Monroy. A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. In C. Lemaı̂tre,
C.A. Reyes and J.A. Gonzales, eds., Proceedings of the IX Ibero-American
Conference on Artificial Intelligence, IBERAMIA 2004, LNAI Vol. 3315,
pages 364-374, Puebla, Mexico, 2004. Springer-Verlag.
1. Bernhard Gramlich. Strategic Issues, Problems and Challenges in Inductive Theorem Proving. Electronic Notes in Theoretical Computer
Science 125(2): 5-43 (2005).
• F. Godı́nez, D. Hutter and R. Monroy. Audit File Reduction Using NGram Models. In A. Patrick and M. Yung, eds., Proceedings of the Ninth
International Conference on Financial Cryptography and Data Security,
FC‘05, LNCS Vol. 3570, pages 336-341, Roseau, The Commonwealth Of
Dominica, 2005. Springer-Verlag.
1. Ulf Larson. Aspects of Adapting Data Collection to Intrusion Detection. BSc Thesis. Chalmers University of Technology. Göteborg,
Sweden, 2006.
• R. Monroy, A. Bundy, and I. Green. On process equivalence = equation
solving in CCS. Journal of Automated Reasoning 43(1):53-80, Springer,
2009.
1. Popescu, Andrei. Contributions to the theory of syntax with bindings
and to process algebra. Unpublished PhD Thesis. University of
Ottawa, 2010.
2. Andrei Popescu and Elsa Gunter. Incremental pattern-based coinduction for process algebra and its Isabelle formalization. In, C.-H.
L. Ong, ed., Proceedings of FOSSACS 2010. LNCS Vol. 6014
• J. B. Camiña, C. Hernández-Gracidas, R. Monroy and L. Trejo. The
Windows-Users and -Intruder simulations Logs Dataset (WUIL): An Experimental Framework for Masquerade Detection Mechanisms. Expert
Systems with Applications, Methods and Applications of Artificial and
Computational Intelligence. 41(3):919 - 930. 2014.
1. P. B. Ruthven. Contextual Profiling of Homogeneous User Groups for
Masquerade Detection. Unpublished MSc thesis, Gjφvik University,
2014.
• D. Hutter and R. Monroy. On the automated correction of protocols
with improper message encoding. In, L. Vigan‘o and P. Degano, eds.,
Proceedings of the Joint Workshop on Automated Reasoning for Security
Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS’09,
LNCS Vol. 5511, pages138-154. Springer, 2009.
45
1. W. Song and B. Hu. Approach to Detecting Type-Flaw Attacks
Based on Extended Strand Spaces. The Computer Journal (2014):
bxu106.
• Juan C. López P., Raúl Monroy and Dieter Hutter. On the Automated
Correction of Security Protocols Susceptible to a Replay Attack. In, J.
Biskup and J. Lopez, eds., Proceedings of the 12th European Symposium
Research Computer Security, ESORICS 2007. LNCS Vol. 4734, pages
594-609, Germany, 2007. Springer.
1. B. Bonakdarpour, R. Hajisheykhi, and S. S Kulkarni. KnowledgeBased Automated Repair of Authentication Protocols. In Formal
Methods FM 2014, pp. 132-147, 2014. Springer International Publishing.
• R. Monroy and G. Steel. Faulty Group Protocols. Unpublished research
report. The University of Edinburgh.
1. L.-A. Lizama, M.-López-Romero, S. Venegas-Andraca, and E. de
Carlos-López. Secure transport of UTC (CNM) through quantum
key distribution. In Proceedings of the Simposio de Metrologı́a, pages
1-6, 2010.
2. Ashish Rastogi. A Model based approach to Implement Cloud Computing in E-Governance. International Journal of Computer Applications 9(7):15-18, November 2010.
3. S. Sandosh, V. Akila and S. Uthayashangar. Secure Decentralized
Group Key Management through Progressive Approach. International Journal of Computer Applications 9(10):6-10, November 2010.
4. Antoine Mercier. Contributions à l’Analyse Automatique des Protocoles Cryptographiques en Prśence de Propriétés Algébriques: Protocoles de Groupe, Équivalence Statique. Unpublished PhD Thesis.
École Normale Supérieure de Cachan, 2009.
46