default search action
Alexander Perez-Pons
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Pranav Gangwani, Alexander Perez-Pons, Himanshu Upadhyay:
Evaluating Trust Management Frameworks for Wireless Sensor Networks. Sensors 24(9): 2852 (2024) - 2023
- [c17]Ricardo Harrilal-Parchment, Diana Pineda, Kemal Akkaya, Abdullah Aydeger, Alexander Perez-Pons:
Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications. ICIT 2023: 1-6 - [c16]Ngoc Suong Huynh, Sebastian De La Cruz, Alexander Perez-Pons:
Denial-of Service (DoS) Attack Detection Using Edge Machine Learning. ICMLA 2023: 1741-1745 - [c15]Diana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Ahmed S. Ibrahim, Alexander Perez-Pons:
Design and Analysis of an Open-Source SDN-based 5G Standalone Testbed. INFOCOM Workshops 2023: 1-6 - [c14]Diana Gutierrez, William Ocampo, Adriaan Jansen, Alexander Perez-Pons:
Memory Extraction of an Emulated STM-32 Blue Pill for Anomaly Detection. IOTSMS 2023: 133-140 - [c13]Diana Gutierrez, William Ocampo, Alexander Perez-Pons, Himanshu Upadhyay, Santosh Joshi:
Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source Framework. ISDFS 2023: 1-6 - [c12]Diana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Alexander Perez-Pons:
SDN-based GTP-U Traffic Analysis for 5G Networks. NOMS 2023: 1-4 - [c11]David Llanio Reyes, Alexander Perez-Pons, Rogelio Bofill Dean:
Anomaly Detection in Embedded Devices Through Hardware Introspection. SVCC 2023: 1-7 - [i2]Ricardo Harrilal-Parchment, Diana Pineda, Kemal Akkaya, Abdullah Aydeger, Alexander Perez-Pons:
Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications. CoRR abs/2305.19451 (2023) - 2021
- [j24]Chongya Song, Alexander Perez-Pons, Kang K. Yen:
AG-SGD: Angle-Based Stochastic Gradient Descent. IEEE Access 9: 23007-23024 (2021) - [j23]Pranav Gangwani, Alexander Perez-Pons, Tushar Bhardwaj, Himanshu Upadhyay, Santosh Joshi, Leonel E. Lagos:
Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle. Future Internet 13(12): 312 (2021) - [c10]Angel Castro, Alexander Perez-Pons:
Virtual Assistant for Forensics Recovery of IoT Devices. BigDataSecurity 2021: 186-190 - 2020
- [c9]Chongya Song, Alexander Perez-Pons, Kang K. Yen:
Optimizing Stochastic Gradient Descent Using the Angle Between Gradients. IEEE BigData 2020: 5269-5275 - [c8]Robert Heras, Alexander Perez-Pons:
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices. SAI (3) 2020: 224-243
2010 – 2019
- 2019
- [j22]Aditya Sundararajan, Arif I. Sarwat, Alexander Perez-Pons:
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems. ACM Comput. Surv. 52(2): 39:1-39:36 (2019) - [c7]Robert Heras, Alexander Perez-Pons:
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster. WiSec 2019: 302-303 - [i1]Aditya Sundararajan, Arif I. Sarwat, Alexander Perez-Pons:
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems. CoRR abs/1903.02548 (2019) - 2018
- [c6]Himanshu Upadhyay, Hardik A. Gohel, Alexander Perez-Pons, Leonel E. Lagos:
Windows Virtualization Architecture For Cyber Threats Detection. ICDIS 2018: 119-122 - 2017
- [j21]Alexander Perez-Pons, Andrew De La Rosa, Silvia Vidaurre, Luis Vargas, Eugene Pons:
Security and privacy implications of 'do not track'. Int. J. Inf. Priv. Secur. Integr. 3(2): 117-133 (2017) - [c5]Dmita Levy, Hardik A. Gohel, Himanshu Upadhyay, Alexander Perez-Pons, Leonel E. Lagos:
Design of Virtualization Framework to Detect Cyber Threats in Linux Environment. CSCloud 2017: 316-320 - 2016
- [c4]Chongya Song, Alexander Perez-Pons, Kang K. Yen:
Building a Platform for Software-Defined Networking Cybersecurity Applications. ICMLA 2016: 482-487 - [c3]Trae Hurley, Jorge E. Perdomo, Alexander Perez-Pons:
HMM-Based Intrusion Detection System for Software Defined Networking. ICMLA 2016: 617-621 - 2015
- [c2]Aditya Sundararajan, Alexander Perez-Pons, Arif I. Sarwat:
A Generic Framework for EEG-Based Biometric Authentication. ITNG 2015: 139-144
2000 – 2009
- 2009
- [j20]Teresa Lesiuk, Alexander Perez-Pons, Peter Polak:
Personality, Mood and Music Listening of Computer Information Systems Developers: Implications for Quality-of-Work. Inf. Resour. Manag. J. 22(2): 83-97 (2009) - [j19]D. C. Leonard, Alexander Perez-Pons, Shihab S. Asfour:
Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology. IEEE Trans. Inf. Technol. Biomed. 13(4): 494-500 (2009) - 2008
- [j18]Alexander Perez-Pons, Peter Polak:
Understanding user perspectives on biometric technology. Commun. ACM 51(9): 115-118 (2008) - 2007
- [j17]Alexander Perez-Pons:
A Practical System to Manage and Control Digital Media. J. Comput. Inf. Syst. 47(4): 45-51 (2007) - 2006
- [j16]Alexander Perez-Pons:
Biometric marketing: targeting the online consumer. Commun. ACM 49(8): 60-66 (2006) - [j15]Robert Plant, Alexander Perez-Pons:
MIS Research Involving Human Subjects: Processes and IRB Requirements. Commun. Assoc. Inf. Syst. 17: 20 (2006) - [j14]Alexander Perez-Pons:
Object prefetching using semantic links. Data Base 37(1): 97-109 (2006) - [j13]Alexander Perez-Pons:
Semantic prefetching objects of slower web site pages. J. Syst. Softw. 79(12): 1715-1724 (2006) - 2005
- [j12]Alexander Perez-Pons, Peter Polak, Joel Stutz:
Evaluating the Teaching Effectiveness of Various Data Modeling Notations. J. Comput. Inf. Syst. 46(2): 78-84 (2005) - [j11]Alexander Perez-Pons:
Improving the performance of client Web object retrieval. J. Syst. Softw. 74(3): 303-311 (2005) - 2003
- [j10]Hassan Aljifri, Marcel Smets, Alexander Perez-Pons:
IP Traceback using header compression. Comput. Secur. 22(2): 136-151 (2003) - [j9]Alexander Perez-Pons:
The furniture company: deductive databases and the scheduling problem. Int. J. Inf. Manag. 23(6): 523-536 (2003) - [j8]Hassan Aljifri, Alexander Perez-Pons, Daniel Collins:
Global e-commerce: a framework for understanding and overcoming the trust barrier. Inf. Manag. Comput. Secur. 11(3): 130-138 (2003) - [j7]Alexander Perez-Pons, Hassan Aljifri, Khalid Fourati:
E-commerce and Arab intra-trade. Inf. Technol. People 16(1): 34-48 (2003) - [j6]Alexander Perez-Pons:
Enhancing the Quality-Of-Service for Application Service Providers. J. Comput. Inf. Syst. 44(1): 3-8 (2003) - [j5]Alexander Perez-Pons, Hassan Aljifri:
Data Protection Using Watermarking in E-Business. J. Database Manag. 14(4): 1-13 (2003) - [j4]Alexander Perez-Pons:
Database Tuning and its Role in Information Technology Education. J. Inf. Syst. Educ. 14(4): 381-388 (2003) - [j3]Alexander Perez-Pons:
Web-application centric object prefetching. J. Syst. Softw. 67(3): 193-200 (2003) - 2002
- [j2]Alexander Perez-Pons:
Temporal abstract classes and virtual temporal specifications for real-time systems. ACM Trans. Softw. Eng. Methodol. 11(3): 291-308 (2002) - 2001
- [j1]Hassan Aljifri, Alexander Perez-Pons, Moiez A. Tapia:
The Estimation of the WCET in Super-Scalar Real-Time System. Parallel Distributed Comput. Pract. 4(2) (2001)
1990 – 1999
- 1999
- [c1]Hassan Aljifri, Alexander Perez-Pons, Moiez A. Tapia:
Using Pipeline for Tight Estimation of Worst-Case Execution Time in a Real-Time System. PDPTA 1999: 599-605
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint