Solera, E., Menasalvas, E., Martín, M., Zorrilla, M., Valdés-Ramírez, D., Zavala, G., & Monroy, R. Evaluating Competency Development and Academic Outcomes: Insights from Six Semesters of Data-Driven Analysis. Education Sciences. 15(4):513. © MDPI 2025. *new*
M. Vargas-Santiago, Diana A. Leon-Velasco and R. Monroy. Resilient Facility Location Optimization Under Failure Scenarios Using NSGA-III: A Multi-Objective Approach For Enhanced System Robustness. Expert Systems with Applications. 277:127210. © Elsevier 2025. *new*
R. Jimenez Cruz, C. Yáñez Márquez, Y. Villuendas Rey, M. Gonzalez-Mendoza, and R. Monroy. Spherical Model for Minimalist Machine Learning Paradigm in Handling Complex Databases. Frontiers in Artificial Intelligence. 8: © Frontiers, 2025 *new*
I. Pérez-Sánchez, M.-A. Medina-Pérez, R. Monroy, O. Loyola-González, and A.-E. Gutiérrez-Rodríguez. New evaluation method for fuzzy cluster validity indices. IEEE Access 13.22728-22744. © IEEE Computer Press, 2025 *new*
J.-C. López-Pimentel, Carolina Del-Valle-Soto, Leonardo J. Valdivia, and R. Monroy. Emphasizing the early phases of the software development process before deploying smart contracts. IEEE Access 13:13628-13643. © IEEE Computer Press, 2025 *new*
M.-D. Calderón-Calderón, M.-A. Medina-Pérez, and R. Monroy. Improving identification by removing obstructive minutiae from latent fingerprints. IEEE Access. 13:7968-7985. © IEEE Computer Press, 2025 *new*
L.-D. Samper-Escalante, O. Loyola-González, R. Monroy, and M. Medina-Pérez. Botnet Identification on Twitter: A Novel Clustering Approach based on Similarity. IEEE Access. 16:149130-149146. © IEEE Computer Press, 2024
J. Llano-García, R. Monroy, and V. Sosa-Hernández. Neural Architecture Search for Image Super-Resolution: a Review on the Emerging state-of-the-Art. Neurocomputing. 128481. © Elsevier, 2024
D. Valdes-Ramírez, L. de Armas-Jacomino, G. Zavala, and R. Monroy. Assessing Sustainability Competencies in Contemporary STEM Higher Education: A Data-Driven Analysis at Tecnologico de Monterrey. Frontiers in Education 9:1415755. © Frontiers, 2024
S.-M. Sarmiento-Rosales, J.-L. Llano-García, J.-F. Falcón-Cardona, R. Monroy, V.-A. Sosa-Hernández and M.-I. Casillas del LLano. Surrogate Modeling for Efficient Evolutionary Multi-Objective Neural Architecture Search in Super Resolution Image Restoration. In, N. van Stein, ed., Proceedings of the 16th International Conference on Evolutionary Computation Theory and Applications (ECTA 2024), pp. 242-249. SCITEPRESS. 2024.
J. Kodhadoust, R. Monroy, M.-A. Medina-Pérez, O. Loyola-González, V. Areekul, and W. Kusakunniran. Enhancing latent palmprints using frequency domain analysis. Intelligent Systems with Applications. 200414. © Elsevier, 2024
Carlos Efrain Quintero-Narvaez and Raul Monroy. Integrating Knowledge Graph Data with Large Language Models for Explainable Inference. In Proceedings of the 17th ACM International Conference on Web Search and Mining (WSDM ’24). March 4 - 8, 2024 © ACM.
Omar Muñoz, Raúl Monroy, Leonardo Cañete-Sifuentes, Jose E. Ramirez-Marquez. Automated discovery of successful strategies in football soccer. Applied Sciences 14(4):1403. © MDPI, 2024
Javad Khodadoust, Raúl Monroy, Miguel Angel Medina-Pérez, Octavio Loyola-González, Worapan Kusakunniran, André Boller, Philipp Terhörst. A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field. Intelligent Systems with Applications 21:200320. © Elsevier, 2024
Leonardo Cañete-Sifuentes, Victor Robles, Ernestina Menasalvas, Raul Monroy. Comparing automated machine learning against an off-the-shelf pattern-based classifier in a class imbalance problem: predicting university dropout. IEEE Access 11:139147-139156. 2023.
Carlos E Quintero Narvaes, R. Monroy. Zero-Knowledge Proofs for Questionnaire Result Verification in Smart Contracts. In: Proceedings of the 23 Mexican International Conference on Computer Science (ENC), 2023, pp. 1-5
J.-L. Llano García, R. Monroy, V. Sosa. An Experimental Protocol for Neural Architecture Search in Super-Resolution. In Proceedings of the 2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW). © IEEE Computer Press, 2023.
A. Huidobro, R. Monroy, M.-A. Godoy, B. Cervantes. A Contrast-Pattern Characterization of Web Site Visitors in Terms of Conversions. In: Hosseini, S., Peluffo, D.H., Nganji, J., Arrona-Palacios, A. (eds) Technology-Enabled Innovations in Education. Transactions on Computer Systems and Networks. Springer, Singapore. © Springer, 2022.
A. Huidobro, R. Monroy, B. Cervantes. A High-Level Representation of the Navigation Behavior of Website Visitors. Applied Sciences.12:6711. © MDPI, 2022.
L. Cañete-Sifuentes, R. Monroy, M.-A. Medina-Pérez. FT4cip: A new functional tree for classification in class imbalance problems. Knowledge-Based Systems. 252:109294. Elsevier, 2022.
J. Khodadoust, M.-A. Medina-Pérez, O. Loyola-González, R. Monroy, A.-M Khodadoust. A secure and robust indexing algorithm for distorted fingerprints and latent palmprints. Expert Systems with Applications 206:117806. Elsevier 2022.
J.-C. López-Pimentel, L.-A. Morales-Rosales, R. Monroy. RootLogChain: Registering log-events in a blockchain for audit issues from the creation of the root. Sensors 21(22): 7669 © MDPI, 2021.
J.-L. Llano-García, R. Monroy, V.-A. Sosa-Hernández, C.-A. Coello-Coello. COARSE-EMOA: An Indicator-based Evolutionary Algorithm for Solving Equality Constrained Multi-objective Optimization Problems. Swarm and Evolutionary Computation. 100983 © Elsevier, 2021.
L. De Armas Jacomino, M. Medina-Pérez, R. Monroy, D. Valdes-Ramirez, C. Morell-Pérez, R. Bello. Dwell time estimation of import containers as an ordinal regression problem. Applied Sciences. 11(20):9380 © MDPI, 2021.
A. Silva-Gálvez, R. Monroy, J.-E. Ramírez-Márquez, C. Zhang. A Video Game-Crowdsourcing Approach to Discover a Player’s Strategy for Problem Solution to Housing Development. IEEE Access. 9:114870-114883 © IEEE Computer Press, 2021.
L. Cañete-Sifuentes, R. Monroy, M.-A. Medina-Pérez. A review and experimental comparison of multivariate decision trees. IEEE Access. 9:110451-110479 © IEEE Computer Press, 2021.
M. Vargas-Santiago, R. Monroy, C. Zhang, J.-E. Ramírez-Márquez, Diana A. Leon-Velasco. The Adaptable Pareto Set Problem for Facility Location: A Video Game Approach. Expert Systems with Applications. 186:115682. 2021.
I. Lin, O. Loyola-González, R. Monroy, M.-A. Medina-Pérez. A review of fuzzy and pattern approaches for class imbalance problems. Applied Sciences. 11(14):6310. 2021.
I. Pérez-Sánchez, B. Cervantes, M.-A Medina-Pérez, R. Monroy, O. Loyola-González, S. García, F. Herrera. An indexing algorithm based on clustering of minutia cylinder codes for fast latent fingerprint identification. IEEE Access. 9:85488–85499 © IEEE Computer Press 2021.
O. Loyola-González, E.-F. Ferreira Mehnert, A. Morales-Moreno, J. Fierrez, M.-A. Medina-Pérez, R. Monroy. Minutiae Errors in Latent Fingerprint Identification: Assessment and Prediction. Applied Sciences. 11(9):4187, pp 1-18. © MDPI 2021.
L.-D. Samper-Escalante *, O. Loyola-González, R. Monroy, M.-A. Medina-Pérez. Bot datasets on Twitter: Analysis and challenges. Applied Sciences. 11(9):4105, pp. 1-25. © MDPI 2021.
E.-J. Rivera-Ríos, M.-A. Medina-Pérez, M.-S. Lazo-Cortés, R. Monroy. Learning-Based Dissimilarity for clustering categorical data. Applied Sciences. 11(8):3509, pp. 1-17. © MDPI 2021.
R.-A. Ramírez-Valenzuela, R. Monroy, O. Loyola-González, Fernando Godínez, A. Soberanes-Martín A. A One-Class-Classification approach to create a stress-level curve plotter through wearable measurements and behavioral patterns. International Journal on Interactive Design and Manufacturing 15:159-171 © Springer 2021.
J. Khodadoust, M.-A. Medina-Pérez, R. Monroy, A.-M Khodadoust, S.-S. Mirkamali. A Multibiometric System based on the Fusion of Fingerprint, Finger-Vein, and Finger-Knuckle-Print. Expert Systems with Applications. 176(1)114687. 2021.
V.-A. Sosa-Hernández, R. Monroy, M.-A. Medina-Pérez, O. Loyola-González, F. Herrera. A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. Computing Surveys. 54(1):1-38 © ACM 2021.
H. Zhu, C. Zhang, J.-E. Ramirez Marquez, S. Wu, R. Monroy, The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures against Intentional Attacks. IEEE Systems Journal. 15(2):2959-2970. © IEEE 2021.
M. Vargas-Santiago, R. Monroy, J.-E. Ramírez-Márquez, C. Zhang, Diana A. Leon-Velasco, H. Zhu. Complementing Solutions to Optimization Problems via Crowdsourcing on Video Game Plays. Applied Sciences. 10:8410. © MDPI 2020.
J.-C. López-Pimentel, O. Rojas, R. Monroy. Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems. In Proceedings of the 2020 IEEE International Conference on Blockchain pp. 126-133 © IEEE Computer Press 2020.
D. Valdes-Ramirez, M.-A. Medina Pérez, R. Monroy. An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification. Pattern Analysis and Applications 24:433–444 © Springer, 2021.
M. Vargas-Santiago, L.-A. Morales-Rosales, R. Monroy, S.-E. Pomares-Hernández, K. Drira. Autonomic Web Services based on different adaptive quasi-asynchronous checkpointing techniques. Applied Sciences. 10(7):2495. © MDPI 2020.
O. Loyola-González, A.-E. Gutiérrez-Rodríguez, M.-A. Medina-Pérez, R. Monroy, J.-A. Carrasco-Ochoa, J.-F. Martínez-Trinidad and M. García-Borroto. An Explainable Artificial Intelligence Model for Clustering Numerical Databases. IEEE Access. 8:52370-52384. © IEEE Computer Press, 2020.
J. Rodríguez, J.-I. Mata-Sánchez, R. Monroy, O. Loyola-González, A. López-Cuevas. A one-class classification approach for bot detection on Twitter. Computers and Security 91, April 2020, article 101715 © Elsevier, 2020 ** 2021 Rómulo Garza's best paper award **
J. Rodríguez, Raúl Monroy, M.-A. Medina-Pérez, O. Loyola-González and Bárbara Cervantes. Cluster validation in clustering-based one class classification. Expert Systems 36:1-14, e12475. © Wiley, 2019.
B. Cervantes, F. Gómez, R. Monroy, O. Loyola-González, M.-A. Medina-Pérez, J. Ramírez-Márquez. Pattern-based and Visual Analytics for Visitor Analysis on Web Sites. Applied Sciences 9(18):3840-3859. © MDPI, 2019.
D. Valdés-Ramírez, M.-A. Medina-Pérez, R. Monroy. Stacking fingerprint matching algorithms for latent fingerprint identification. In, Nyström, I., Hernández Heredia, Y. and Milián Núñez, V., editors, Proceedings of the 24th Iberoamerican Congress on Pattern Recognition, CIARP 2019, LNCS vol. 11896, pp. 230-240, 2019. © Springer.
L.-A. Trejo, V. Ferman, M.-A. Medina-Pérez, F. Arredondo Giacinti, R. Monroy, J. Ramírez-Márquez. DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks. IEEE Access. 7(1):116358-116369. © IEEE Computer Press, 2019.
C. Del-Valle-Soto, C. Mex-Perera, I. Aldaya, F. Lezama, J.-A. Nolazco-Flores and R. Monroy. New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks. Sensors 19(11):2489, 2019. © MDPI.
L. Cañete-Sifuentes, R. Monroy, M.-A. Medina-Pérez, O. Loyola-González, and F. Vera-Voronisky. Classification Based on Multivariate Patterns. IEEE Access. 7:55744-55762. © IEEE Computer Press, 2019.
J. Rodríguez, M.-A. Medina-Pérez, R. Monroy and O. Loyola-González. A Survey on Minutiae-Based Palmprint Feature Representations, and a Full Analysis of Palmprint Feature Representation Role in Latent Identification Performance. Expert Systems with Applications. 131:30-44. © Elsevier, 2019.
D. Valdés-Ramírez, M.-A. Medina-Pérez, R. Monroy, O. Loyola-González, J. Rodríguez, A. Morales-Moreno, F. Herrera. A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation. IEEE Access. 7:48484 - 48499, © IEEE Computer Press, 2019.
O. Loyola-González, R. Monroy, J. Rodríguez, A. López-Cuevas, I. Sánchez-Mata. Contrast Pattern-based Classification for Bot Detection on Twitter. IEEE Access. 7(1):45800-45817, © IEEE Computer Press, 2019.
O. Loyola-González, M.-A. Medina-Pérez, D. Hernández-Tamayo, R. Monroy, J.-A. Carrasco-Ochoa, M. García-Borroto. A Pattern-based Approach for Detecting Pneumatic Failures on Temporary Immersion Bioreactors. Sensors 19(2):414-432. © MDPI, 2019.
O. Loyola-González, A. López-Cuevas, M.-A. Medina-Pérez, J.-B. Camiña, R. Monroy and J. Ramírez-Márquez. Fusing Approaches of Pattern Discovery and Visual Analytics on Tweet Propagation. Information Fusion, 46(3):91-101, © Elsevier, 2019.
J. Benito Camiña, M.-A. Medina-Pérez, R. Monroy, O. Loyola-González, L.-A. Pereyra-Villanueva, L.-C. González Gurrola. Bagging-RandomMiner: A one-class classifier for file accesses-based masquerade detection. Machine Vision and Applications, 30(5):959-974, © Springer, 2019.
O. Loyola-González, R. Monroy, M.-A. Medina-Pérez, B. Cervantes and J.-E. Grimaldo-Tijerina. An Approach Based on Contrast Patterns for Bot Detection on Web Log Files. In, I. Batyrshin et al., editors, Advances in Soft Computing, Proceedings of the 17th Mexican International Conference on Artificial Intelligence, MICAI 2018, Part I, LNAI vol. 11288, pp. 276-285, 2018. © Springer Nature Switzerland AG.
J. Rodríguez, M.-A. Medina-Pérez, A.-E. Gutiérrez-Rodríguez, R. Monroy and H. Terashima-Marín. Cluster Validation Using an Ensemble of Supervised Classifiers. Knowledge Based Systems 145:134-144, © Elsevier, 2018.
B. Cervantes, R. Monroy, M.-A. Medina-Pérez, M. González-Mendoza and J. Ramirez-Marquez. Some Features Speak Loud, but Together they all Speak Louder: A Study on the Correlation Between Classification Error and Feature Usage in Decision-Tree Classification Ensembles. Engineering Applications of Artificial Intelligence 67:270-282. © Elsevier, 2018.
A. López-Cuevas, M.-A. Medina-Pérez, R. Monroy, J. Ramírez-Márquez and L.-A. Trejo. FiToViz: A Visualisation Approach for Real-time Risk Situation Awareness. Transactions on Affective Computing, 9(3):372-382. © IEEE Computer Press, 2017.
C. Del-Valle-Soto, C. Mex-Perera, R. Monroy and J.-A. Nolazco-Flores. MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks. Sensors 17(7):1573, 2017. © MDPI.
J. Rodríguez, L. Cañete, R. Monroy and M.-A. Medina Pérez. Experimenting with Masquerade Detection via User Task Usage. International Journal on Interactive Design and Manufacturing 11(4):771-784, 2017. © Springer.
V. Ferman, D. Hutter and R. Monroy. A Model Checker for the Verification of Browser Based Protocols. Computación y Sistemas, 21(1) 2017. © CIC - IPN México.
O. Loyola González, M.-A. Medina-Pérez, J.-F. Martínez-Trinidad, J.-A. Carrasco-Ochoa, R. Monroy and M. García-Borroto. PBC4cip: A New Contrast Pattern-based Classifier for Class Imbalance Problems. Knowledge Based Systems, 115:100-109, 2017. © Elsevier
J. Rodríguez, A.-Y. Barrera-Animas, L.-A. Trejo, M.-A. Medina-Pérez and R. Monroy. Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensors Data. Sensors 16(10):1619, 2016. © MDPI.
Roberto Alonso, Raúl Monroy and Luis A. Trejo. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers. Sensors 16(8):1311, 2016. © MDPI.
A.-Y. Barrera-Animas, L.-A. Trejo, M.-A. Medina-Pérez, R. Monroy, J.-B Camiña, F. Godínez. Online Personal Risk Detection Based on Behavioural and Physiological Patterns. Information Sciences 384:281-297, 2017. © Elsevier.
M. A. Medina-Pérez, Raúl Monroy, J. Benito Camiña, M. García-Borroto. Bagging-TPMiner: A classifier ensemble for masquerader detection based on typical objects. Soft Computing 21(3): 557-569, 2017. © Springer.
J. Benito Camiña, Raúl Monroy, Luis A. Trejo and M. A. Medina Pérez. Temporal and Spatial Locality, an Abstraction for Masquerade Detection. IEEE Transactions on Information Forensics and Security 11(9):2036 - 2051. 2016. © IEEE Computer Press.
I. Becerra-Durán, R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.-P. Laumond. Maintaining Strong Mutual Visibility of an Evader Moving over the Reduced Visibility Graph. Autonomous Robots 40(2):395-423. 2016. © Springer.
S. Martínez-Monterrubio J. Fraustro-Solís and R. Monroy. EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining. Biomed Research International May, 2015. © Hindawi.
C. del-Valle-Soto, C. Mex-Perera, R. Monroy, and J. A.-Nolazco-Flores. On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks. Sensors 15(4):7619-7649. March, 2015. © MDPI.
J. Benito Camiña, Jorge Rodríguez, and Raúl Monroy. Towards a Masquerade Detection System based on User's Tasks. In, A. Stavrou, H. Bos and G. Portokalidis, editors, Proceedings of the 17th International Symposium on Research in Attacks, Intrusion and Defenses (RAID`14). LNCS vol. 8688, pp. 447 - 465. September, 2014. © Springer.
J. Benito Camiña, C. Hernández-Gracidas, R. Monroy and L. Trejo. The Windows-Users and -Intruder simulations Logs Dataset (WUIL): An Experimental Framework for Masquerade Detection Mechanisms. Expert Systems with Applications, Methods and Applications of Artificial and Computational Intelligence. 41(3):919 - 930. Februray 15, 2014.
Ernesto Buelna and Raúl Monroy. Real-Time Verification of Integrity Policies for Distributed Systems Journal of Applied Research and Technology. 11(6):831 - 843. 2013.
Roberto Alonso and Raúl Monroy. On the NP-Completeness of Computing the Commonality Amongst the Objects upon which a Collection of Agents has Performed an Action. Computación y Sistemas. 17(4):489 - 500. 2013.
J. C. López-Pimentel, R. E. Ibarra-Orozco, V. F. Ramos Fon Bon and R. Monroy. A Secure Framework to Authenticate Remotely Digital Documents Based on the TLS Protocol. World Congress on Engineering. Vol II, pp. 1264 - 1270. International Association of Engineers, 2013.
K. A. García, R. Monroy, L. A. Trejo, C. Mex-Perera, and E. Aguirre. Analyzing Log Files for Post-mortem Intrusion Detection. Journal of IEEE Transactions on Systems, Man, and Cybernetics - Part C. 42(6):1690-1704. © IEEE Computer Press, 2012.
I. Razo-Zapata, C. Mex-Perera, and R. Monroy. Masquerade Attacks Based on User's Profile. Journal of Systems and Software 85(11)2640-2651. © Elsevier, 2012.
J. C. López-Pimentel, V. Ramos Fon Bon and R. Monroy. A Web Service for Signing and Authenticating Digital Documents based on Symmetric Cryptography Protocol. International Journal of Digital Information and Wireless Communications (IJDIWC) 1(2): 434-444. © The Society of Digital Information and Wireless Communications (SDIWC), 2012.
B. Camiña, R. Monroy, L. Trejo, and E. Sánchez. Towards Building a Masquerade Detection Method Based on User File System Navigation. In, I. Batyrshin, and G. Sidorov, editors, Proceedings of the 2011 Mexican International Conference on Artificial Intelligence, Part I, MICAI'11, LNCS vol. 7094, pp. 174 - 186, 2011. © Springer.
J. C. López-Pimentel, R. Monroy, and Víctor Ramos. Symmetric Cryptographic Protocol for Signing and Authenticating Digital Documents. In, V. Snasel, J.Platos and E. El-Qawasmeh, editors, Proceedings of the Proceedings of the 2011 International Conference on Digital Information Processing and Communications, ICDIPC'2011, Communications in Computer Information Sciences Series vol. 188, pp. 9-23, 2011. © Springer.
Karen García, E. Aguirre, R. Monroy and C. Mex-Perera. An Architecture for Forensic Intrusion Detection on System Logs. In, D. He, X. Chen and M. Reza-Abdi, editors, Proceedings of the 2010 International Conference on Information Security and Artificial Intelligence, ISAI 2010, Vol. 1, pp. 315 - 319, 2010.
R. Monroy. Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample. In, G. Sidorov, A. Hernández-Aguirre and C.-A. Reyes-García, editors, Proceedings of the 9th Mexican International Conference on Artificial Intelligence, MICAI`10, LNAI Vol. 6437, pp. 1 - 12, 2010. © Springer.
Israel Becerra, Rafael Murrieta-Cid and Raúl Monroy. Evader Surveillance under Incomplete Information. In Vijay Kumar, editor, Proceedings of the 2010 IEEE International Conference on Robotics and Automation, ICRA 2010, pp: 5511 - 5518, IEEE Computer Science Press.
L. A. Trejo, R. Alonso, R. Monroy, E. Sánchez, J. Vázquez, and M. Maqueo. Using Cloud Computing MapReduce operations to Detect DDoS Attacks on DNS servers. In Proceedings of the 4th Iberian Grid Infrastructure Conference, IBERGRID 2010.
A. Hernández-Aguirre, R. Monroy and C.-A. Reyes-Garcia, editors, Proceedings of the 8th Mexican International Conference on Artificial Intelligence, MICAI`09, IEEE Computer Science Press.
A. Hernández-Aguirre, R. Monroy and C.-A. Reyes-Garcia, editors, MICAI 2009: Advances in Artificial Intelligence, 8th Mexican International Conference on Artificial Intelligence, MICAI`09, LNAI Vol. 5845, 2009. © Springer.
Dieter Hutter and Raúl Monroy. On the Automated Correction of Protocols with Improper Message Encoding. In Luca Viganò and Pierpaolo Degano, editors, Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009. LNCS (security and cryptology) 5511:138-154, © Springer, 2009.
Raúl Monroy, A. Bundy, and I Green. On Process Equivalence = Equation Solving in CCS. Journal of Automated Reasoning, 43(1):53-80, Springer (DOI 10.1007/s10817-009-9125-x), 2009.
Juan C. López P. and Raúl Monroy. Formal Support to Security Protocol Development: a Survey. Journal Computación y Sistemas, special volume celebrating 50 years of Computing in Mexico, 12(1):89-109, CIC del IPN, 2008.
R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.-P. Laumond. A complexity result for the Pursuit-Evasion Game of Maintaining Visibility of a Moving Evader. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation, pages 2657-2664, USA, 2008. © IEEE Computer Society Press.
Carlos Mex-Perea, José Zamora-Elizondo and Raul Monrroy. An Intrusion Detection for a Mobile Ad-Hoc Networks based on a Non-Negative Matrix Factorization Method. Journal of Research in Computing, 40:131-140, 2008.
Grigori Sidorov, Carlos Mex-Perera and Raúl Monrroy (eds.). Computer Security. J. Research on Computing Science, Vol. 40, ISSN 1665-9899, IPN, 2008.
Juan C. López P., Raúl Monroy and Dieter Hutter. On the Automated Correction of Security Protocols Susceptible to a Replay Attack. In, J. Biskup and J. Lopez, eds., Proceedings of the 12th European Symposium Research Computer Security, ESORICS 2007. LNCS Vol. 4734, pages 594-609, Germany, 2007. © Springer.
Juan C. López P., Raúl Monroy and Dieter Hutter. A method for patching interleaving-replay attacks in faulty security protocols. Electronic Notes in Theoretical Computer Science 174(4):117-130, 2007. © Elsevier. Also available from the Proceedings of the 1st FLoC Workshop on Verification and Debugging.
C. Mex-Perera, R. Posadas, J. A. Nolazco, R. Monroy, A. Soberanes and L. Trejo. An improved Non-negative Matrix Factorization Method for Masquerade Detection. In, R. Vázquez and J.A. Díaz, Proceedings of the 1st Mexican International Conference on Informatics Security, MCIS 2006, pages (to appear), Mexico, 2006. © IEEE Computer Society Press.
R. Posadas, C. Mex-Perera, Raúl Monroy and J. A. Nolazco. Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models. In, A. Gelbukh and C. A. Reyes, editors, Proceedings of the 5th Mexican International Conference on AI, MICAI 2006, LNAI Vol 4293, pages 622-631, Mexico, 2006. © Springer.
Rafael Murrieta and Raúl Monroy. A Hybrid Segmentation Method Applied to Color Images and 3D Information. In, A. Gelbukh and C. A. Reyes, editors, Proceedings of the 5th Mexican International Conference on AI, MICAI 2006, LNAI Vol 4293, pages 789-799, Mexico, 2006. © Springer.
M. Alencastre-Miranda, L. Munoz-Gomez, R. Murrieta and R. Monroy. Local Reference Frames vs Global Reference Frame for Mobile Robot Localization and Planning. In, A. Gelbukh and C. A. Reyes, editors, Proceedings of the Special Session of the 5th Mexican International Conference on AI, MICAI 2006, pages 309-318, Mexico, 2006. IEEE Computer Society Press.
Víctor H. García, Raúl Monroy and Maricela Quintana. Web Attack Detection Using ID3. In, John Debenham, editor, Proceedings of the 2nd IFIP International Symposium on Professional Practice in AI, WCC 2006. IFIP Vol 219, pages 323-332, Santiago, Chile, 2006. © Springer.
Anna V Álvarez, Karen A García, Raúl Monroy, Luis A Trejo and Jesús Vázquez. A Tool for Managing Security Policies in Organisations. In, H. Yoshiura, K. Sakurai and K. Rannenberg, editors, Proceedings of the 1st International Workshop on Security, IWSEC 2006, LNCS Vol. 4266, pages 378-388, Kyoto, Japan, 2006. © Springer.
Fernando Godínez, Dieter Hutter and Raúl Monroy. On the Use of Word Networks to Mimicry Attack Detection. In, G. Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Computer Security, ETRICS'06, LNCS Vol. 3995, pages 423-435, Freiburg, Germany, 2006. © Springer.
B. Tovar, L. Muñoz-Gomez, R. Murrieta-Cid, M. Alencastre-Miranda, R. Monroy and S. Hutchinson. Planning Exploration Strategies for Simultaneous Localization and Mapping. Journal of Robotics and Autonomous Systems 54(4):314-331, 2006. © Elsevier.
Louise A. Dennis, Raul Monroy and Pablo Nogueira. Proof-Directed Debugging and Repair. In Henrik Nilsson , editor, Proceedings of the 7th Symposium on Trends in Functional Programming. University of Nottingham, UK, April, 2006.
Rafael Murrieta Cid, Alejandro Sarmiento, Teja Muppirala, Seth Hutchinson, Raúl Monroy, Moisés Alencastre Miranda, Lourdes Muñoz Gómez and Ricardo Swain. A framework for reactive motion and sensing planning: a critical events-based approach. In A. Gelbukh, A. de Albornoz and H. Terashima, Proceedings of the 4th Mexican International Conference in Artificial Intelligence, MICAI`05, LNCS Vol. 3789, pages 999-1009, Monterrey, Nuevo León, Mexico. © Springer. Best Paper Award Recipient.
Fernando Godínez, Dieter Hutter and Raúl Monroy. On the Role of Information Compaction to Intrusion Detection. In H. Unger, editor, Proceedings of the Fifth IEEE International Symposium and School on Advance Distributed Systems ISSADS 2005, LNCS Vol. 3563, pages 83-97, Guadalajara, Jalisco, Mexico. © Springer.
Fernando Godínez, Dieter Hutter and Raúl Monroy. Audit File Reduction Using N-Gram Models. In A. Patrick and M. Yung, editors, Proceedings of the Ninth International Conference on Financial Cryptography and Data Security, FC`05, LNCS Vol. 3570, pages 336-351, Roseau, The Commonwealth Of Dominica, 2005. © Springer.
Karen García, Raúl Monroy and Jesús Vázquez. An Artificial Manager for Security Policies in Organizations. Journal of Research in Computing 17:97-106, 2005.
Alexander Gelbukh, Raúl Monroy (eds.). Advances in Artificial Intelligence Theory. J. Research on Computing Science, Vol. 16, ISSN 1665-9899, IPN, 2005.
Alexander Gelbukh, Raúl Monroy (eds.). Advances in Artificial Intelligence Applications. J. Research on Computing Science, Vol. 16, ISSN 1665-9899, IPN, 2005.
Fernando Godínez, Dieter Hutter and Raúl Monroy. Service Discrimination and Audit File Reduction for Effective Intrusion Detection. In C. H. Lim and M. Yung, editors, Proceedings of the Workshop on Information Security Applications, WISA 2005, LNCS Vol. 3325, pages 101-115, Jeju Island, Korea, 2005. © Springer.
Juan C. López and Raúl Monroy. A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. In Christian Lemaître, Carlos A. Reyes and Jesus A. Gonzales, editors, Proceedings of the IX Ibero-American Conference on Artificial Intelligence, IBERAMIA 2004, LNAI Vol. 3315, pages 364-374, Puebla, Mexico, 2004. © Springer. Candidate to Best Paper Award.
Fernando Godínez, Dieter Hutter and Raúl Monroy. Attribute Reduction for Effective Intrusion Detection. In, J. Favela, E. Menasalvas and E. Chávez, editors, Proceedings of the 2004 Atlantic Web Intelligence Conference, LNAI Vol. 3034, pages 74-83, Cancún, Mexico, 2004. © Springer.
Raúl Monroy, A Process Algebra Model of the Immune System. In Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, Part II, KES`04, LNAI Vol. 3214, pages 526-533, Wellington, New Zealand, 2004. © Springer.
R. Monroy, G. Arroyo-Figueroa, L.E. Sucar and H. Sossa, editors, Proceedings of the 3rd International Conference on Artificial Intelligence, MICAI`04, LNAI Vol. 2972, 2004. © Springer
Raúl Monroy, Rosa Saab and Fernando Godínez, On Modelling an Immune System. Computación y Sistemas 7(4):249-259, 2004.
Raúl Monroy. Predicate Synthesis for Correcting Faulty Conjectures: the Proof Planning Paradigm. Journal of Automated Software Engineering (10)3:247-269, 2003. © Kluwer.
Raúl Monroy. Computer Modelling the Human Immune System. In S. Colton, J. Gow. V. Sorge and T. Walsh, Proceedings of the CADE-19 Workshop on Challenges and Novel Applications for Automated Reasoning, pages 47-53, Miami, USA, 2003. University of Miami.
Raúl Monroy and Maya Carrillo. Automatic Formulation of Security Goals Under the Inductive Approach. In Proceedings of the IASTED`02, Applied Informatics, pages 1020-1025, Innsbruck, Austria, 2003. © Acta Press.
Maya Carrillo and Raúl Monroy, Towards Automating the Use of the Inductive Approach for the Verification of Security Protocols. In H. Sossa and G. Arroyo, editors, Proceedings of the MICAI/TAINA`02, avances en inteligencia artificial, pages 125-134, Mérida, Mexico, April 2002. Centro de Investigación en Computación-IPN.
Raúl Monroy, Matías Alvarado and Mauricio Osorio. Logic and Computation, Chapter in H. Sossa and G. Arroyo, editors, MICAI/TAINA 2002, avances en inteligencia artificial, Mérida, Mexico, 2002. Centro de Investigación en Computación-IPN.
Rosa Saab, Raúl Monroy and Fernando Godínez. Towards a Model for an Immune System. In, Coello-Coello, C., de Albornoz, A., Sucar, L.E. and Battistutti, O.C., editors, Proceedings of the 2nd Mexican Internation Conference on Artificial Intelligence, MICAI`02, LNAI Vol. 2313, pages 401-410, Mérida, Mexico, 2002. © Springer. Best Paper Award Recipient.
Alberto Calixto and Raúl Monroy. TLS Analysis Using CADP. Studia Informatica Universalis, 2(2):pages 234-249, 2002.
Maya Carrillo and Raúl Monroy. Lógicas de autenticación aplicadas al estudio de protocolos. In Proceedings of the 27th Latin American Conference in Informatics, CLEI'01, Mérida, Venezuela, 2001. CLEI.
Raúl Monroy. Concept Formation via Proof Planning Failure. In, R. Nieuwenhuis and A. Voronkov, editors, Proceedings of the 8th International Conference in Logic for Programming, Artificial Intelligence and Reasoning, LPAR`01, LNAI Vol. 2250, pages 718-731, La Havana Cuba, 2001. © Springer.
Raúl Monroy and A. Bundy. On the Correction of Faulty Formulae. Computación y Sistemas. 5(1):25-37, 2001.
Raúl Monroy. The use of abduction and recursion-editor techniques for the correction of faulty conjectures. In P. Alexander and P. Flenner, editors, 15th Conference on Automated Software Engineering, ASE'00, pages 91-99, Grenoble, France, 2000. © IEEE Computer Society Press. Candidate to best paper award.
Raúl Monroy, A. Bundy, and I Green. Searching for a solution to program verification = equation solving in CCS. In O. Cairó, L.E. Sucar, and F. Cantú, editors, Mexican Internation Conference on Artificial Intelligence, MICAI`00, LNAI Vol. 1793, pages 1-12, Acapulco, Mexico, 2000. © Springer.
Raúl Monroy, A. Bundy, and I Green. Planning proofs of equations in CCS. Automated Software Engineering 7(3):263-304, 2000. © Kluwer.
Enrique Navarrete, Eduardo García, and Raúl Monroy. Reconocimiento de patrones aplicado a la exposición fotográfica. In Proceedings of the 26th Latin American Conference in Informatics, CLEI`00, Atizapán, Mexico, 2000. Candidate to Best Paper Award. Extended, English version submitted to CLEI's electronic journal.
Raúl Monroy. Planning Proofs of Correctness of CCS Systems. Unpublished PhD Thesis, University of Edinburgh, 1998.
Raúl Monroy, Alan Bundy and Ian Green. Planning Equational Verification in CCS. In D. Redmiles and B. Nuseibeh, editors, 13th Conference on Automated Software Engineering, ASE'98, pages 43-52, Hawaii, USA, 1998. © IEEE Computer Society Press, 1998. Candidate to best paper award (get an e-copy of this paper from the conference on-line bibliography URL).
Raúl Monroy, Alan Bundy, and Ian Green. Observant: An Annotated Term Rewriting for Deciding Observation Congruence. In H. Prade, editor, Proceedings of the 13th European Conference on Artificial Intelligence, ECAI'98, pages 393-397, Brighton, UK, 1998. © Wiley & Sons.
Raúl Monroy, Alan Bundy, and Andrew Ireland. Proof Plans for the Correction of False Conjectures. In F. Pfenning, editor, 5th International Conference on Logic Programming and Automated Reasoning, LPAR'94, LNAI Vol. 822, pages 54-68, Kiev, Ukraine, 1994. © Springer.
R. Monroy. Inductive proof plans for the correction of faulty software specifications - thesis proposal. Discussion Paper 145, Dept. of Artificial Intelligence, Edinburgh, 1994.