Alexander Perez-Pons

Publication

Recent

  • Song, C., Perez-Pons, A, and Yen, K., “AA-HMM: An Anti-Adversarial Hidden Markov Model for Anomaly-based Network Intrusion Detection”, Applied Science 8(12), 2421, 2018.
  • Sundararajan, A., Sarwat, A., and Pons, A, “A Survey on Key Characteristics, Performance Metrics, Threats, Attacks, and Defenses for Biometric System and Wearables”, ACM Computing Survey, 2018.
  • Upadhyay, H., Gohel, H., Pons, A., and Lagos, L., “Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment”, Advances in Science, Technology and Engineering Systems Journal, Vol. 3, Issue 1, Pg. 25-29, 2018.
  • Pons, A., Vidaurre, S., De La Rosa, A., Vargas, L., and Pons, E., “Analysis of “Do Not Track” on Applications and Web Browsers”, International Journal of Information Privacy, Security and Integrity, 3(2):117–133, 2017.
  • Nayak, A., Yen, K. and Pons, A., “Fuzzy Logic Based Android Malware Classification Approach”, Recent Science Publications - International Journal of Computer Networks and Security, Vol. 24, No. 2, 2014.
  • Nayak, A., Yen, K. and Pons, A., “Fuzzy Logic Based Android Malware Classification Approach”, Recent Science Publications - International Journal of Computer Networks and Security, Vol. 24, No. 2, 2014.
  • Upadhyay, H., Gohel, H., Pons, A., and Lagos, L., “Windows Virtualization Architecture for Cyber Threat Detection, 1th InternationalConference on Data Intelligence and Security (ICDIS 2018), South Padre Island, Texas, April 8-10, 2018.
  • Upadhyay, H., Gohel, H., Pons, A., Lagos, L., and Joshi, S., “Cyber Threat Monitoring Architecture with Virtual Machine Introspection, 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2018), Washington, DC, May 1-4, 2018.
  • Levy, D., Gohel, H., Upadhyay, H., Pons, A., and Lagos, L., “Design of Virtualization Framework to Detect Cyber Threats in Linux Environment”, The 4th IEEE International Conference on Cyber Security and Cloud Computing, (IEEE CSCloud 2017), New York, June 26-28, 2017.
  • Song, C. and Pons, A. “Building a Platform for Software-Defined Networking Cybersecurity Applications” , ICMLA 2016 Conference on Machine Learning in Security of Cyber-Physical Systems (MLSCPS), special workshop, California, December 18-20, 2016.
  • Herley, T., Perdomo, J., and Pons, A. “HMM-based Intrusion Detection System for Software Defined Networking”, ICMLA 2016 Conference on Machine Learning in Security of Cyber-Physical Systems (MLSCPS), December 18-20, California, 2016.
  • Sundararajan, A., Pons, A, and Sarwat, A.,“ “A Generic Framework for EEG-Based Biometric Authentication” Proceedings of 14th International Conference on Information Technology: New Generations, April 13-15, 2015, Las Vegas, Nevada.
  • Pons, E. and Pons, A., "Social Learning Theory and Ethical Hacking: Student Perspectives on a Hacking Curriculum", Information Systems Education Conference (ISECON) 2015, Orlando, Florida, November 5-7, 2015.
  • Selected Past

  • Leonard, D. C., Pons, A., and Asfour, S. “Realization of a Universal Patient Identifier through Biometric Technology,” IEEE Transactions of Biomedicine, Vol. 13, No. 4, 2009.
  • Lesiuk, T., Pons, A. and Polak, P., “Personality, Mood, and Music Listening of Computer Information Systems Developers: Implications for Quality-of-Work,” Information Resources Management Journal, Vol. 22. No. 2, 2009.
  • Pons, A. and Polak, P., “Understanding User Perspectives on Biometric Technology,” Comm. of the ACM, Vol. 51, No. 9, 2008.
  • Pons, A., “Semantic Prefetching Objects of Slower Web Site Pages,” Journal of Systems and Software, Vol. 79, No. 12, 2006.
  • Pons, A., “Object Prefetching using Semantic Links,” DATA BASE journal, Vol. 37, No. 1, 2006.
  • Pons, A., “Biometric Marketing: Targeting the Online Consumer,” Comm. of the ACM, Vol. 49, No. 8, 2006.
  • Pons, A., “Enhancement of Web Object Speculative Retrieval,” IASTED International Journal of Computers and Applications, Vol. 27, No. 3, 2005.
  • Pons, A., “Improving the Performance of Client Web Object Retrieval,” Journal of Systems and Software, Vol. 74, No. 3, 2004.
  • Pons, A., “Furniture Company: deductive databases and the scheduling problem,” International Journal of Information Management, Vol. 23, No. 6, 2003.
  • Pons, A., “Hard Real-Time C++: An Object-Oriented Language for Real-Time Systems,” IASTED International Journal of Computers and Applications, Vol. 26, No. 1, 2004.
  • Pons, A. and Aljifri, H., “Data Protection using Watermarking in E-Business,” Journal of Database Management, Special Issue: Data Management for E-Business, Vol. 14, No. 4, 2003.
  • Aljifri, H., Smets, M. and Pons, A., “IP Traceback using Header Compression,” Computers & Security, Vol. 22, No. 2, 2003.
  • Aljifri, H., Pons, A., and Tapia, M., “The Estimation of the WCET in Super-Scalar Real-Time Systems,” Parallel and Distributed Computing Practices, Vol. 2, No. 4, 2003.
  • Pons, A., “Web-Application Centric Object Prefetching,” Journal of Systems and Software, Vol. 67. No. 3, 2003.
  • Pons, A., “Temporal Abstract Classes and Virtual Temporal Specifications for Real-Time Systems,” ACM Transactions on Software Engineering and Methodology, Vol. 11, No. 3, 2002.
  • Furht, B. and Pons, A, “An Adaptive Real-time ECG Compression Algorithm with Variable Threshold,” IEEE Transactions on Biomedical Engineering, Vol. 35, No. 6, 1988.
  • Leonard, D. C., Pons, A., and Asfour, S. “Improvement of Quality in Healthcare Information Systems through the Creation of a Universal patient Identifier Framework,” Proceedings of the 37th International Conference on Computers and Industrial Engineering, October 20-23, 2007.
  • Aljifri, H., Pons, A., and Tapia, M., “Enhancing the Detection of Feasible Paths Using Partially-known Variables,” Atlantic City, The fifth international Conference on Computer Science and Informatics, CS&I 2000, February 27- March 3, 2000.
  • Aljifri, H., Pons, A., and Tapia, M., “Tighten the Computation of Worst-Case Execution-Time by Detecting Feasible Paths,” Arizona, the 19th IEEE International Performance, Computing, and Communications Conference, IPCCC 2000, February 20-22, 2000.
  • Aljifri, H., Pons, A., and Tapia, M., “Worst-Case Time Prediction Using the Knapsack Approach,” Las Vegas, IASTED International Software Engineering and Applications, SEA'2000, November 5-10, 2000.
  • Aljifri, H., Pons, A., and Tapia, M., “Using pipeline for tight estimation of Worst-Case Execution Time in Real-Time System,” Las Vegas, International conference on parallel and distributed processing techniques and applications, PDPTA'99, June, 28- July 1, 1999.