23
Curriculum Vitae Ra´ ul Monroy January 22, 2009 General Information Nationality: Mexican Date of Birth: January 1, 1963 Phone Number: +52 (55) 5864 5555 x 2466 Fax Number: +52 (55) 5864 5751 e-mail: [email protected] URL: http://homepage.cem.itesm.mx/raulm University Education and Degrees Awarded 1993-98: PhD in Artificial Intelligence. Thesis: Planning Proofs of Cor- rectness of CCS Systems, under the supervision of Prof. Alan Bundy, Dr. Ian Green, Dr. Jane Hesketh and Dr. Andrew Ireland and exam- ined by Prof. Matthew Hennessy and Dr. Alan Smaill. The University of Edinburgh. 1992-1993: MSc in Information Technology. Thesis: The Use of Abduc- tion to Correct Faulty Conjectures, under the supervision of Prof. Alan Bundy and Dr. Andrew Ireland. The University of Edinburgh. 1987-1990: MSc in Computer Systems. Thesis: TEC-XINU, an Operating System, under the supervision of Mr. Ralf Eder. Instituto Tecnol´ ogico y de Estudios Superiores de Monterrey, at State of M´ exico (Mexico). 1980-1985: BSc in Electronics. Thesis: A VLSI-Based Short Distance Mo- dem, Using Manchester Code, under the supervision of Dr Emmanuel Moya. Universidad Aut´ onoma Metropolitana, Ixtapalapa (Mexico). Additional training The 1994 International Marktoberdorf Summer School: (organised by NATO) 8 courses lectured by Prof. E.W. Dijkstra, Prof. Tony Hoare, Prof. Allain Martin, Dr. Martin Abadi, Prof. Michael Fourman, Prof. Fred- erick Schneider, Prof. Manfred Broy, Prof. David Gries, Prof. Samson Abramsky. 1

Curriculum Vitae - AMiner · Curriculum Vitae Ra´ul Monroy January 22, 2009 General Information Nationality: Mexican Date of Birth: January 1, 1963 Phone Number: +52 (55) 5864 5555

  • Upload
    vudang

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Curriculum Vitae

Raul Monroy

January 22, 2009

General Information

Nationality: MexicanDate of Birth: January 1, 1963Phone Number: +52 (55) 5864 5555 x 2466Fax Number: +52 (55) 5864 5751e-mail: [email protected]: http://homepage.cem.itesm.mx/raulm

University Education and Degrees Awarded

1993-98: PhD in Artificial Intelligence. Thesis: Planning Proofs of Cor-rectness of CCS Systems, under the supervision of Prof. Alan Bundy,Dr. Ian Green, Dr. Jane Hesketh and Dr. Andrew Ireland and exam-ined by Prof. Matthew Hennessy and Dr. Alan Smaill. The University ofEdinburgh.

1992-1993: MSc in Information Technology. Thesis: The Use of Abduc-tion to Correct Faulty Conjectures, under the supervision of Prof. AlanBundy and Dr. Andrew Ireland. The University of Edinburgh.

1987-1990: MSc in Computer Systems. Thesis: TEC-XINU, an OperatingSystem, under the supervision of Mr. Ralf Eder. Instituto Tecnologico yde Estudios Superiores de Monterrey, at State of Mexico (Mexico).

1980-1985: BSc in Electronics. Thesis: A VLSI-Based Short Distance Mo-dem, Using Manchester Code, under the supervision of Dr EmmanuelMoya. Universidad Autonoma Metropolitana, Ixtapalapa (Mexico).

Additional training

The 1994 International Marktoberdorf Summer School: (organised byNATO) 8 courses lectured by Prof. E.W. Dijkstra, Prof. Tony Hoare,Prof. Allain Martin, Dr. Martin Abadi, Prof. Michael Fourman, Prof. Fred-erick Schneider, Prof. Manfred Broy, Prof. David Gries, Prof. SamsonAbramsky.

1

Parallel Processing: Oklahoma State University at Stillwater. Summer 1990,(50 Hrs), lectured by Dr. K.M. George.

Artificial Intelligence: Oklahoma State University at Stillwater. Summer1990, (50 Hrs), lectured by Dr. B. Mayfield.

Object-Oriented Software Construction: Oklahoma State University atStillwater. Summer 1992, (50 Hrs), lectured by Dr. K.M. George.

Advanced Artificial Intelligence: Oklahoma State University at Stillwater.Summer 1992, (50 Hrs), lectured by Dr. D. Miller.

Object-Oriented Programming: ITESM, 1990, lectured by Dr. BertrandMeyer.

Quality Control: ITESM. Certified as total quality control manager (250 Hrs)

Languages

Spanish: Mother tongue

English: Fluent: IELTS score = 8 (1996), TOEFL score = 637 (2008), TOEICscore = 925 (1998)

Career since Graduation

2000-date: Tecnologico de Monterrey, Campus Estado de Mexico, AssociateProfessor in Computer Science.

1992-1999: Tecnologico de Monterrey, Campus Estado de Mexico, AssistantProfessor in Computer Science.

1992-1997: Tecnologico de Monterrey, Campus Estado de Mexico, Leave ofAbscence.

1985-1992: Tecnologico de Monterrey, Campus Estado de Mexico, Lecturer inComputer Science.

1984: Universidad Autonoma Metropolitana, Part time faculty member. Elec-trical Engineering Department.

Teaching Responsibilities

My workload consists of 40% teaching, 10% administration and 50% research.I teach only in two terms out of three offered in an academic year.

I have been involved in teaching since 1984. I do enjoy teaching. Throughoutall these years, I have taught several many courses, including electric circuits,

2

electronics, digital systems, computer organisation, assembly language, com-puter architecture, computer networks, artificial intelligence, knowledge repre-sentation, common sense reasoning and many other more.

During the last five years, I have designed, developed and taught the follow-ing courses in computing: undergradate: Quantitative Methods and Simulation,Formal Methods in Software Development, Operating Systems, Discrete Mathe-matics, Introduction to Communication and Concurrency; and graduate: Logicand Probability, Automated Reasoning and Communication and Concurrency.

Research Interests

I am interested in automating the use of theorem proving to formal methods ofsystem development. I have recently become interested in issues of computersecurity and robotics. Currently, my research concerns:

• The automated verification of security protocols;

• The discovery and application of general search control strategies for un-covering and correcting errors in either a system or its specification;

• The design of novel methods for computer intrusion detection; and

• The design of novel methods for motion planning (sensor-based robotics.)

The main techniques for these lines of investigation have been proof planning,the productive use of failure and process algebras. Quoting Alan Bundy, proofplanning is a method that uses an explicit representation of the overall shape ofa family of similar proofs. The productive use of failure is collecting evidenceof theory misconception and mal-formulation in order to pinpoint flaws andsuggest theory development. Process algebras provides a means for modelling,building and analysing communicating systems in terms of a few primitive ideas.They are well-established, both in Industry and in Academia, and have evolvedinto an ISO-standard, LOTOS.

In 2003, I founded the Computer Networking and Security Group (NET-SEC), a research group based at Tecnologico de Monterrey. NETSEC is agroup of computer scientists with interests in intrusion detection and securityof computer networks and automated analysis (and possibly correction if faulty)of security protocols. This group comprehends 5 investigators, 3 research assis-tants and over a dozen of graduate students. Jointly, the group has publishedover 20 papers and graduated 8 students since 2003. The group receives sub-stantial funding from the Institute, for covering operation expenses, grantingscholarships to graduate students and developing infrastructure. The groupcurrently conducts its experiments in two laboratories, one in computer net-works and other one in mobile computing.

For more information about the Networking and Security Group the readeris referred to the group’s URL:

http://www.cem.itesm.mx/catedras/seguridad/

3

Research Grants Held

2008: Metodo estadıstico de deteccion de ataques al DNS. Fondo Regional parala Innovacin Digital en Amrica Latina y el Caribe (FRIDA) 2007 (Asso-ciate Investigator);

2007—8: Pursuit Evasion Problems in 3D Environments. CONACyT — Na-tional Science Foundation (NSF). Grant J110.534/2006 (Associate Inves-tigator);

2005—8: On the Timely Detection of Mimicry Attacks, CONACyT. Convoca-toria de Investigacion cientıfica basica, Grant 47557 (Principal Investiga-tor).

Completed Projects

2007: On Automatically Patching Faulty Security Protocols. Consejo Nacionalde Ciencia y Tecnologıa (CONACyT) — Deutscher Akademischer Aus-tausch Dienst (DAAD). Grant J110.382/2006;

2005—6: On the Timely Detection of Mimicry Attacks, Fondo Regional parala Innovacin Digital en Amrica Latina y el Caribe (FRIDA) 2005 GrantVI;

2003—6: Issues of Computer Security, ITESM—Consorcio InterrectorıasGrant CCEM- 0302-05;

2002—4: Computer Security Based on Immune Systems, together with DieterHutter from DFKI, Germany. CONACyT-BMBF Grant J200.1442/2002;

2001—4: The Use of Proof Planning to Automating the Verification of Au-thentication Protocols, CONACyT Grant 33337-A;

1997-2001: The Use of Proof Planning to Automate Theorem Proving to For-mal Methods of System Development, together with Francisco Cantu andSantiago Negrete. CONACYT REDII.

While doing my PhD, I was associated with the following project:

1992—7: Communication in safety cases: a semantic approach, SERC GrantGR/J/58619.

Research Supervision

PhD Students

• Fernando Godınez Delgado, ‘On an Efficient and Scalable Architecture forMimicry Attacks Detection Using Probabilistic Methods: admitted July,2000; examined November, 2004; awarded May, 2005;

4

• Juan Carlos Lopez Pimentel, ‘On the Automated Correction of Faulty Se-curity Protocols’: admitted January, 2004; examined April, 2008; awardedMay 2998; and

• Karen Azurim Garcıa Gamboa, Karen will be associated with the project‘On the Timely Detection of Mimicry Attacks’, admitted August, 2005.

MSc Students

• Anna Valeska Alvarez Bejar, ‘Administrador de Polıticas de Seguridad:2nda Version’, defended June 2006, awarded December 2006;

• Vıctor Hugo Garcıa Pichardo, ‘Algoritmo ID3 en la Deteccion de Ataquesen Aplicaciones WEB’, awarded May 2006;

• Karen Azurim Garcıa Gamboa, ‘Administrador de Polıticas de Seguridad’,awarded January, 2005;

• Juan Carlos Lopez Pimentel, ‘Verificacion Formal de Protocolos de Se-guridad en HOL usando el Metodo Inductivo’, awarded September, 2004;

• Rosa Saab Asbun, ‘Modelo de un Sistema Inmunologico Natural enAlgebra de Procesos’, awarded September, 2002;

• Alberto Calixto Simon, ‘Analisis del protocolo TLS’, awarded September,2001;

• Maya Carrillo Ruiz, ‘Logicas de Autenticacion Aplicadas al Estudio deProtocolos’, awarded September, 2001;

• Arturo Rodolfo Castro Lloera, ‘Sistema de Monitoreo Experto Aplicado aEquipos de Computo’, awarded December, 2000; and

• Enrique Alejandro Navarrete Paredes, ‘Reconocimiento de Patrones Apli-cado a la Exposicion Fotografica’, awarded December, 1999.

• Anabelem Soberanes, admitted January 2005;

• Raymundo Eybar Pina, admitted January 2005.

Distinctions

2006: Sabbatical leave to carry out research on the “Automated Correction ofFaulty Security Protocols”;

2006: Tecnologico de Monterrey, campus Estado de Mexico: The Golden RamAward for Investigation 2006;

2006: Tecnologico de Monterrey, final to the Romulo Garza Award;

5

2000, 2002, 2005: CONACyT Research Grants 33337-A, J200.1442/2002 and47557;

2005: Fondo Regional para la Innovacion Digital en America Latina y el Caribe(FRIDA) Research Grant;

2005: MICAI’05 best paper award;

2004: IBERAMIA’04 candidate to best paper award;

2003—5: ITESM Research Group Grant, ITESM Consorcio Inter-rectorıas,CCEM- 0302-05;

1998-2005: National Researcher, CONACYT—SNI (12232);

2002: MICAI’02 best paper award;

2000: ASE’00 candidate to best paper award and invited to submit journalversion to the journal of Automated Software Engineering;

1998: ASE’98 candidate to best paper award and invited to submit journalversion to the journal of Automated Software Engineering;

1994: NATO scholarship to participate in the 1994 International Marktober-dorf Summer School, at Germany;

1993-1998: CONACyT scholarship to conduct studies towards a PhD, Artifi-cial Intelligence, at Edinburgh University;

1992: CONACyT scholarship to conduct studies towards a MSc, Artificial In-telligence, at Edinburgh University; and

1987-1991: ITESM scholarship to conduct studies towards a MSc, ComputerSystems, at ITESM.

Administrative Experience andCommittee Membership

University Responsibilities

• 2005-date: Session Track Organiser at the editions 35, 36 and 38 of theCongreso de Investigacion y Desarrollo Tecnologico del ITESM;

• 2004-date: Member of the team that designed the 2005 BSc Programmein Computer Technology;

• 2003-date: Leader of the research group called Computer Networking andSecurity;

• 2004-date: Member of the PhD and the MSc Programme Committee inComputer Science;

6

• 2001: Member of the team that designed the MSc Programme in Com-puter Science;

• 1998,2005,7: Organiser of the MSc/PhD Programme Seminar;

• 1997-1999: Organiser of the MSc Programme in Computer Science;

• 1997: Leader of the team that designed the MSc Programme in ComputerScience;

• 1990-1992: Organiser of three MSc Programmes, one in Computer Sys-tems, one in Information Systems, and one in Manufacturing; and

• 1990: Leader of the team that designed the MSc Programme in ComputerTechnology.

External Responsibilities

• 2007-date: Mexican Society for Artificial Intelligence: Part of TrusteeBoard;

• 1997-date: Served on the Program Committee of the following conferences:ENC’97, ENC’99, MICAI’00, MICAI’02, MICAI’04, IBERAMIA’04, MI-CAI’05, CITA’06, CORE’06, MICAI’07, CORE’07 and MICAI’08;

• 2000-date: Served on Conference Committee of the following conferences:IJCAI’03, MICAI’00, MICAI’02, MICAI’04, MICAI’05, MICAI’06, MI-CAI’07 and MICAI’08;

• 1997-date: Served as an external reviewer for Convocatoria para Investi-gacion Basica, organised by CONACyT.

• 2005-date: Served on the CONACyT committee for the evaluation of ap-plications to student scholarship extensions;

• 1994-date: Served as a paper reviewer for the following conferences:CADE, LICS, IBERAMIA, ENC, IJCAI, etc.

• 2008: guest editor to “Computacion y sistemas”;

• 2008: MICAI local co-chair;

• 2007: MICAI workshops co-chair;

• 2007: Joint organiser of the first MICAI workshop on computer security;

• 2006: Served on the 4th Seminar for the Development of the NationalCompetitiveness;

• 2005: Programme co-chairman of the 4th Mexican International Con-ference on Artificial Intelligence (MICAI’05), to be held in Monterrey,Mexico;

7

• 2004-2005: An editor of Springer-Verlag, LNAI series;

• 2004: Programme co-chairman of the 3rd Mexican International Confer-ence on Artificial Intelligence (MICAI’04), held in Mexico City, Mexico;

• 2000-2006: Secretary Treasurer of the Mexican Society for Artificial Intel-ligence;

• 2000-date: ACM member (7294044)

• 2002: Joint organiser of the workshop on ‘Logic and Computation’, atTAINA’02;

• 1999-2005: Served as a host researcher for Programa de Verano de Inves-tigacion Cientıfica, organised by the Academia Mexicana de Ciencias. Ihave guided the research of about 15 students.

• 1999: Joint organiser of the workshop on ‘Logic and Computation’, atENC’99;

Research Visits

1. January — March 2007: Deutsches Forschungszentrum fur KunstlicheIntelligenz (DFKI). Saarbrucken, Germany;

2. August — December, 2006 and then April — July, 2007: Centre for Intelli-gent Systems and Applications. The University of Edinburgh. Edinburgh,United Kingdom;

3. December 2005: 1 week at the DFKI, Saarbrucken, Germany;

4. December 2004: 2 weeks at the DFKI, Saarbrucken, Germany;

5. June 2004: 1 week at the University of Nottingham. Nottingham, UnitedKingdom;

6. July 2004: 1 week at the Universiyt of Edinburgh. Edinburgh, UnitedKingdom;

7. December 2003: 2 weeks at the DFKI, Saarbrucken, Germany;

8. December 2002: 2 weeks at the DFKI, Saarbrucken, Germany;

9. November 2002: 1 week at the University of Illinois at Urbana-Champaign.Urbana, USA;

10. July 2001: 1 week at the Technological University of Munich at Mu-nich (Germany) and 1 week at the Universiyt of Edinburgh at Edinburgh(United Kingdom);

8

11. June 1999: 5 weeks at the University of Edinburgh at Edinburgh, UnitedKingdom; and

12. July 1994: 1 week at the Technological University of Darmstad. Darm-stad, Germany.

Publications

Journal Papers

1. J.C.-Lopez P. and R. Monroy. Formal Support to Security Protocol De-velopment: a Survey. Computacion y Sistemas, special volume celebrating50 years of Computing in Mexico, 12(1):89-109, CIC del IPN, 2008.

2. Juan C. Lopez P., Raul Monroy and Dieter Hutter. A method for patchinginterleaving-replay attacks in faulty security protocols. Electronic Notesin Theoretical Computer Science 174(4):117-130, 2007.

3. B. Tovar, L. Munoz-Gomez, R. Murrieta-Cid, M. Alencastre-Miranda,R. Monroy and S. Hutchinson. Planning Exploration Strategies for Si-multaneous Localization and Mapping. Journal Robotics and AutonomousSystems 54(4):314-331, 2006.

4. K. Garcıa, R. Monroy and J. Vazquez. An Artificial Manager for SecurityPolicies in Organizations. Journal of Research in Computing Science.17:97–106, 2005.

5. R. Monroy, R. Saab and F. Godınez. On Modelling an Immune System.Computacion y Sistemas. 7(4):249–259, 2004.

6. Raul Monroy. Predicate Synthesis for the Correction of Faulty Conjec-tures: the Proof Planning Paradigm. Automated Software Engineering,10(3):247–269, 2003.

7. A. Calixto and R. Monroy. TLS Analysis Using CADP. Studia InformaticaUniversalis, 2(2):234-249, 2002.

8. R. Monroy and A. Bundy. On the use of proof planning for the correctionof faulty formulae. Computacion y Sistemas, 5(1):25-37, 2001.

9. R. Monroy, A. Bundy, and I. Green. Planning Proofs of Equations inCCS. Journal of Automated Software Engineering 7(3):263–304, 2000.

10. R. Monroy, A. Bundy, and I. Green. On process equivalence = equationsolving in CCS. To be submitted to Journal of Automated Reasoning,2006.

11. E. Navarrete, R. Monroy and G. Garcıa. Applying Pattern Recognitionto Photographic Exposure. Submitted to Journal of CLEI, 2001.

9

Edited Books

• R. Monroy, G. Arroyo-Figueroa, E. Sucar and H. Sossa, editors, Advancesin Artificial Intelligence: Proceedings of the 3rd Mexican InternationalConference on Artificial Intelligence, MICAI‘2004, Springer-Verlag, Lec-ture Notes in Artificial Intelligence, Vol. 2972, 2004.

• A. Gelbukh and R. Monroy, editors: Advances in Artificial IntelligenceTheory, J. Research on Computing Science, Vol. 16, ISSN 1665-9899, IPN,2005, printing 500;

• A. Gelbukh and R. Monroy, editors: Advances in Artificial IntelligenceApplications, J. Research on Computing Science, Vol. 17, ISSN 1665-9899,IPN, 2005, printing 500.

Book Chapters

• R. Monroy, M. Alvarado and M. Osorio. Logic and Computation, Chapterin, H. Sossa and G. Arroyo, editors, MICAI/TAINA 2002, avances eninteligencia artificial. Centro de Investigacion en Computacion-IPN, 2002.

• A. Aliseda and R. Monroy. Logic and Computation, Chapter in, J. M.-Ahuactzin, editor, Encuentro Nacional de Computacion, ENC‘99. Uni-versidad de las Americas, 1999.

Conference Papers

1. R. Murrieta-Cid, R. Monroy, S. Hutchinson and J.-P. Laumond. A com-plexity result for the Pursuit-Evasion Game of Maintaining Visibility ofa Moving Evader. In Proceedings of the 2008 IEEE International Con-ference on Robotics and Automation, ICRA’08, pages (to appear), USA,2008. IEEE Computer Society Press.

2. Juan C. Lopez P., Raul Monroy and Dieter Hutter. On the AutomatedCorrection of Security Protocols Susceptible to a Replay Attack. In, J.Biskup and J. Lopez, eds., Proceedings of the 12th European SymposiumResearch Computer Security, ESORICS 2007. LNCS Vol. 4734, pages594-609, Germany, 2007. Springer.

3. C. Mex-Perera, R. Posadas, J.-A. Nolazco, R. Monroy, A. Soberanes andL. Trejo. An improved Non-negative Matrix Factorization Method forMasquerade Detection. In, R. Vazquez and J.-A. Dıaz, Proceedings ofthe 1st Mexican International Conference on Informatics Security, MCIS2006, Mexico, 2006. IEEE Computer Society Press.

4. R. Posadas, C. Max-Perera, R. Monroy and J. A. Nolazco. Hybrid Methodfor Detecting Masqueraders Using Session Folding and Hidden MarkovModels. In, A. Gelbukh and C. A. Reyes, editors, Proceedings of the

10

5th Mexican International Conference on AI, MICAI 2006, LNAI Vol (toappear), Mexico, 2006. Springer.

5. Rafael Murrieta and Raul Monroy. A Hybrid Segmentation MethodApplied to Color Images and 3D Information. In, A. Gelbukh andC. A. Reyes, editors, Proceedings of the 5th Mexican International Confer-ence on AI, MICAI 2006, LNAI Vol (to appear), Mexico, 2006. Springer.

6. M. Alencastre-Miranda, L. Munoz-Gomez, R. Murrieta and R. Monroy.Local Reference Frames vs. Global Reference Frame for Mobile RobotLocalization and Planning. In, A. Gelbukh and C. A. Reyes, editors, Pro-ceedings of the Special Session of the 5th Mexican International Conferenceon AI, MICAI 2006, Mexico, 2006. IEEE Computer Society Press.

7. Anna A Alvarez, Karen A Garcıa, Raul Monroy, Luis A Trejo and JesusVazquez. A Tool for Managing Control Access Policies in Organisations.In, H. Yoshiura, K. Sakurai and K. Rannenberg, editors, Proceedings onthe 1st International Workshop on Security, IWSEC 2006, LNCS Vol (toappear), Kyoto Japan, 2006. Springer.

8. Vıctor H. Garcıa-Pichardo, Raul Monroy, Maricela Quintana. Web At-tack Detection Using ID3. In, John Debenham, editor, Proceedings of the2nd IFIP International Symposium on Professional Practice on AI, IFIPVol. 218, pages 323-332, Santiago, Chile, 2006. Springer.

9. Fernando Godınez, Dieter Hutter and Raul Monroy. On the Use of WordNetworks to Mimicry Attack Detection. In, G. Muller and G. Schneider,editors, Proceedings of the International Conference on Emerging Trendsin Information and Computer Security, ETRICS’06, LNCS Vol. 3995,pages 423-435, Freiburg, Germany, 2006. Springer.

10. L.-A. Dennis, R. Monroy and P. Nogueira. Proof-directed Debugging andRepair. In, H. Nilsson and M. van Eekelen, editors, Proceedings of theSeventh Symposium on Trends in Functional Programming, pages 131-140. 2006.

11. R. Murrieta-Cid, A. Sarmiento, T. Muppirala, S. Hutchinson, R. Mon-roy, M. Alencastre-Miranda, L. Muoz-Gmez, R. Swain. A framework forreactive motion and sensing planning: a critical events-based approach.In A. Gelbukh, A. de Albornoz and H. Terashima, Proceedings of theFourth Mexican International Conference in Artificial Intelligence, MI-CAI‘05, LNCS Vol. 3789, pages 999-1009, Monterrey, Nuevo Len, Mexico,Springer-Verlag. Best Paper Award Recipient.

12. F. Godınez, D. Hutter and R. Monroy. On the Role of Information Com-paction to Intrusion Detection. In H. Unger, editor, Proceedings of FifthIEEE International Symposium and School on Advance Distributed Sys-tems ISSADS 2005, LNAI Vol. 3563, pages 83-98, Guadalajara, Jalisco,Mxico, 2005. Springer-Verlag.

11

13. F. Godınez, D. Hutter and R. Monroy. Audit File Reduction Using N-Gram Models. In A. Patrick and M. Yung, editors, Proceedings of theNinth International Conference on Financial Cryptography and Data Se-curity, FC‘05, LNCS Vol. 3570, pages 336-341, Roseau, The Common-wealth Of Dominica, 2005. Springer-Verlag.

14. F. Godınez, D. Hutter and R. Monroy. Service Discrimination and Au-dit File Reduction for Effective Intrusion Detection. In C.H. Lim andM. Yung, editors, Proceedings of the Workshop on Information SecurityApplications, WISA 2005, LNCS Vol. 3325, pages 101-115, Jeju Island,Korea, 2005. Springer-Verlag.

15. J.C. Lopez and R. Monroy. A Rippling-Based Difference Reduction Tech-nique to Automatically Prove Security Protocol Goals. In C. Lemaıtre,C.A. Reyes and J.A. Gonzales, editors, Proceedings of the IX Ibero-American Conference on Artificial Intelligence, IBERAMIA 2004, LNAIVol. 3315, pages 364-374, Puebla, Mexico, 2004. Springer-Verlag. Candi-date to Best Paper Award.

16. Raul Monroy. A Process Algebra Model of the Immune System. InM.G. Negoita, editor, Proceedings of the 8th Knowledge-Based IntelligentInformation & Engineering Systems, KES‘04, LNAI Vol. 3214, pages 526-533, Wellington, New Zealand, September 2004. Springer-Verlag.

17. F. Godınez, D. Hutter and R. Monroy. Attribute Reduction for EffectiveIntrusion Detection. In J. Favela, E. Menasalvas, and E. Chavez, editors,Proceedings of the 2004 Atlantic Web Intelligence Conference, AWIC‘04,LNAI Vol. 3034, pages 74-83, Cancun, Mexico, 2004. Springer-Verlag.

18. R. Monroy and M. Carrillo. Automatic Formulation of Security PropertiesUnder the Inductive Approach. In M.H. Hamza, editor, Proceedings ofIASTED‘03, Applied Informatics-Software Engineering, pages 1020-1025,Innsbruck, Austria, 2003. Acta Press.

19. M. Carrillo and R. Monroy, Towards Automating the Use of the InductiveApproach for the Verification of Security Protocols. In H. Sossa and G.Arroyo, editors, Proceedings of MICAI/TAINA‘02, avances en inteligenciaartificial, pages 125-134, Merida, Mexico, 2002. Centro de Investigacionen Computacion-IPN, 2002.

20. R. Saab, R. Monroy and F. Godınez. Towards a Model for an ImmuneSystem. In Coello-Coello, C., de Albornoz, A., Sucar, L.E. and Battistutti,O.C., editors, Proceedings of the 2nd Mexican Internation Conference onArtificial Intelligence, MICAI‘02, LNAI vol. 2313, pages 401-410, Merida,Mexico, 2002. Springer-Verlag. Best Paper Award Recipient.

21. R. Monroy. Concept Formation via Proof Planning Failure. In R.Nieuwenhuis and A. Voronkov, editors, Proceedings of the 8th Interna-tional Conference in Logic for Programming, Artificial Intelligence and

12

Reasoning, LPAR‘01, LNAI Vol. 2250, pages 718-731, La Havana Cuba,2001. Springer-Verlag.

22. M. Carrillo and R. Monroy. Logicas de autenticacion aplicadas al estudiode protocolos. In Proceedings of the 27th Conferencia Latinoamericana enInformatica, CLEI‘2001. Merida, Venezuela, 2001. CLEI.

23. R. Monroy. The use of Abduction and Recursion-Editor Techniques for theCorrection of Faulty Conjectures. In P. Flenner and P. Alexander, editors,Proceedings of the 15th Conference on Automated Software Engineering,ASE’00, pages 91-99, Grenoble, Francia, 2000. IEEE Computer SciencePress. Candidate to best paper award.

24. E. Navarrete, E. Garcıa and R. Monroy. Reconocimiento de patronesen la exposicion fotografica. In L.A. Trejo, editor, Proceedings of the26th Conferencia Latinoamericana de Informatica, CLEI 2000, Atizapan,Mexico, 2000. CLEI.

25. R. Monroy, A. Bundy, and I. Green. Searching for a Solution to Pro-gram Verification = Equation Solving in CCS. In O. Cairo and F. Cantu,editors, Proceedings of the Mexican Internation Conference on ArtificialIntelligence, MICAI‘00, LNAI Vol. 1793, pages 1-13, Acapulco, Mexico,2000. Springer-Verlag.

26. R. Monroy. The Use of Proof Planning Failure for Correcting Faulty Con-jectures. In J.M. Ahuactzin, editor, 2nd Mexican Conference in ComputerScience, ENC’99, pages 1-6, Pachuca, Mexico, 1999. Sociedad Mexicanade Ciencia de la Computacion.

27. R. Monroy. On the Correction of Faulty Formulae. In A. de Albornoz, andM. Alvarado, editors, Taller de Inteligencia Artificial, TAINA‘99, pages56 - 68, D. F., Mexico, 1999. Instituto Politecnico Nacional.

28. R. Monroy, A. Bundy, and I. Green. Planning Equational Verification inCCS. In D. Redmiles and B. Nuseibeh, editors, Proceedings of the 13thConference on Automated Software Engineering, ASE‘98, pages 43 - 52,Hawaii, USA, 1998. IEEE Computer Society Press. Candidate to BestPaper Award.

29. R. Monroy, A. Bundy, and I. Green. Annotated Term Rewriting for Decid-ing Observation Congruence. In H. Prade, editor, Proceedings of the 13thEuropean Conference on Artificial Intelligence, ECAI‘98, pages 393-397,Brighton, England, 1998. Wiley & Sons.

30. R. Monroy. Observant: an Annotated Term Rewriting for Deciding Obser-vation Congruence. In S. Negrete, editor, Encuentro Nacional de Com-putacion, ENC’97, pages 40-50, Queretaro, Mexico, 1997. UniversidadAutonoma de Queretaro.

13

31. R. Monroy, A. Bundy, and A. Ireland. Proof Plans for the Correctionof Faulty Conjectures. In F. Pfenning, editor, Proceedings of the 5th In-ternational Conference on Logic Programming and Automated Reasoning,LPAR’94, LNAI Vol. 822, pages 65-68, Kiev, Ukraine, 1994. Springer-Verlag. Also available from Edinburgh as Research paper 681.

Doctoral External Examining

• External examiner, Tecnologico de Monterrey, campus Estado de Mexico,2008, PhD, Benjamın Hernandez;

• External examiner, Tecnologico de Monterrey, campus Monterrey, 2008,PhD, Marcelo Fernandez;

• External examiner, Tecnologico de Monterrey, campus Monterrey, 2003,PhD, Jaime Solano; and

• External examiner, Tecnologico de Monterrey, campus Morelos, 2005,PhD, Juan Segura.

Book Reviews

1. Long, L. and Long, N. Introduccion a las computadoras y a los sistemasde informacion, 5ta edicion, Prentice Hall Hispanoamericana, 1999.

Magazine Papers

Paralelismo en Computacion. Soluciones Avanzadas, Vol. 1, No. 5, pp 4 – 10,Octubre, 1993.

Guest Lectures

1. ‘A complexity result for the Pursuit-Evasion Game of Maintaining Visi-bility of a Moving Evader’. Segundo Taller de Robotica y Planificacion deMovimientos. CIMAT. Mexico. Febrero 2008;

2. ‘On the Automated Correction of Security Protocols Susceptible to a Re-play Attack’, Seminario Internacional en Sistemas y Computacion de laVI Semana Cientıfica “Ciencia y Vida”, Fundaci’on Universitaria Juan deCastellanos, Tunja, Colombia, Octubre 26, 2007;

3. ‘On Patching Faulty Security Protocols’, Scottish Theorem Proving sem-inar, School of Computer Science at St Andrews University, St Andrews,UK, October 13, 2006;

4. ‘A method for patching interleaving-replay attacks in faulty security pro-tocols’, CISA seminar, Centre for Intelligent Systems and Applicationsof the School of Informatics at Edinburgh University, Edinburgh, UK,August 31, 2006;

14

5. ‘On Automatically Patching Faulty Security Protocols, seminario de inves-tigacion, Centro de investigacion en Matematicas, CIMAT, Guanajuato,July 6, 2006;

6. ‘Audit File Reduction Using NGram Models’, 36 congreso de investigaciony desarrollo del Tecnologico de Monterrey, Monterrey, N.L., 2006;

7. ‘Guıa para preparar propuestas de investigacion y artıculos de revista’,36 congreso de investigacion y desarrollo del Tecnologico de Monterrey,Monterrey, N.L., 2006;

8. ‘Seguridad Computacional’, Semana de computacion de la UniversidadAutonoma del Estado de Mexico, Toluca, Mexico, 2005;

9. ‘Errores en el Desarrollo de Sistemas: Amenazas y Soluciones’, Sexto Con-greso Estudiantil de Computacion, CORE’05 at Centro de Investigacionen Computacion del Instituto Politecnico Nacional, Mexico City, Mexico,2005.

10. ‘Predicate Synthesis for the Correction of Faulty Conjectures’, 35 Con-greso de Investigacion y Desarrollo Tecnologico at ITESM, Monterrey,Mexico, 2005.

11. ‘Logica Computacional y Agentes Inteligentes’, Tercer Semana Cientıficaat Fundacion Universitaria Juan Castellanos, Tunja, Colombia, 2004.

12. ‘Automated Formulation of Security Goals under the Inductive Approach’,34 Congreso de Investigacion y Desarrollo Tecnologico at ITESM, Mon-terrey, Mexico, 2004.

13. ‘Modelo Computacional de un Sistema Inmune Humano’, 7o SimposiumInternacional de Sistemas y Computacion at 18th International Joint Con-ference on Artificial Intelligence, IJCAI, Acapulco, Mexico, 2003.

14. ‘Aplicaciones de Inteligencia Artificial en Seguridad Computacional’, Ter-cer Seminario de Seguridad Informatica y Tecnologıas de Informacion,organised by Secretarıa de la Defensa Nacional, 2003.

15. ‘Inteligencia Artificial’, Sexta Semana Academica at Tecnologico de Estu-dios Superiores de Coacalco, Coacalco, Mexico, 2003.

16. ‘Towards a Model for an Immune System’, 33 Congreso de Investigaciony Desarrollo Tecnologico at ITESM, Monterrey, Mexico, 2003.

17. ‘Uso productivo del fracaso en la busqueda de una demostracion’, semi-nario de investigacion, consorcio interrectorıas del Tecnologico de Monter-rey, Atizapan, Mexico, 2003.

18. ‘Concept Formation Via Proof Planning Failure’, 32 Congreso de Investi-gacion y Desarrollo Tecnologico at ITESM, Monterrey, Mexico, 2002.

15

19. ‘Tecnicas de Automatizacion en el Razonamiento para el Desarrollo deSistemas’, Segundo Ciclo de Expoconferencias en Informatica y SistemasComputacionales at Instituto de Educacion Superior de Chiapas, TuxtlaGutierrez, Mexico, 2001.

20. ‘Analisis de Protocolos de Seguridad’, Ciclo de Conferencias y Seminariosen Seguridad Informatica at Universidad Nacional Autonoma de Mexico,Mexico City, Mexico, 2001.

21. ‘The Uses of Abduction and Recursion-Editor Techniques for the Cor-rection of Faulty Conjectures’, 31 Congreso de Investigacion y DesarrolloTecnologico at ITESM, Monterrey, Mexico, 2001.

22. ‘On the Correction of Faulty Conjectures’, Doctoral Research Seminar,Centre for Artificial Intelligence at Tecnologico de Monterrey, Monterrey,Mexico, 2000.

23. ‘Desarrollo de Sistemas Automaticos para la Verificacion de Software yHardware’, Semana de Computacion at Universidad Autonoma del Estadode Mexico, Atizapan, Mexico, 2000.

24. ‘Planeacion de Verificacion de Sistemas Concurrentes’, Octava Semana deComputacion at Benemerita Universidad Autonoma de Puebla, Puebla,Mexico, 1999.

25. ‘Correccion de errores en formulaciones incorrectas’, Computo 99, MexicoCity, Mexico, 1999.

26. ‘Logica de Autenticacion’, Seminario en Seguridad Computacional at Rec-torıa de la Universidad Virtual del Tecnologico de Monterrey, Atizapan,Mexico, 1999.

27. ‘Demostracion Automatica por Induccion Matematica y sus Aplicaciones’,Ciclo de Conferencias en Inteligencia Artificial at Tecnologico de Monter-rey, Atizapan, Mexico, 1999.

28. ‘Por que y Para que Estudiar Inteligencia Artificial’, Ciclo de Conferenciasen Inteligencia Artificial at Tecnologico de Monterrey, Atizapan, Mexico,1999.

29. ‘Planning Proofs of Equations’, 29 Congreso de Investigacion y DesarrolloTecnologico at ITESM, Monterrey, Mexico, 1999.

30. ‘Verificacion Automatica de Sistemas de Comunicacion’, Taller de In-teligencia Artificial (TAINA’98), Mexico City, Mexico, 1998.

31. ‘Trends in Operating Systems’, United States Trade Center Conference,Mexico City, Mexico, 1991.

32. ‘La Ensenanza en Telecomunicaciones, Mexico y el Mundo: Expectativas yTecnologıa en ese Instituto’, III Seminario “Banca y Telecomunicaciones”,organised by Asociacion Mexicana de Bancos, Guadalajara, Mexico, 1991.

16

Contexts in which my Work Has Been Cited

Type A Citations (48)

• R. Monroy, A. Bundy, and A. Ireland. Proof Plans for the Correctionof Faulty Conjectures. In F. Pfenning, editor, Proceedings of the 5th In-ternational Conference on Logic Programming and Automated Reasoning,LPAR’94, LNAI Vol. 822, pages 65-68, Kiev, Ukraine, 1994. Springer-Verlag. Also available from Edinburgh as Research paper 681.

1. G. Sutcliffe. The SZS Ontologies for Automated Reasoning Software.In, Rudnicki P, Sutcliffe G., Konev B., Schmidt R., Schulz S., editors,Proceedings of the Combined KEAPPA - IWIL Workshops., pp. 38-49, Qatar, 2008;

2. Bernhard Gramlich. Strategic Issues, Problems and Challenges in In-ductive Theorem Proving. Electronic Notes in Theoretical ComputerScience 125(2): 5-43 (2005);

3. S. Colton and A. Pease. Lakatos-Style Methods in Automated Rea-soning. In 16th Eureopean Conference on Artificial Intelligence,ECAI’2004, pp. 977-978, The Netherlands, 2004;

4. F. Alexandre, K. Bsaıes, M. Demba. Predicate Synthesis from In-ductive Proof Attempt of Faulty Conjectures. Lecture Notes in Com-puter Science, Vol. 3018, Germany, pp. 20-33, 2003;

5. W. Ahrendt. Deduktive Fehlersuche in Abstrakten Datentypen, Ger-many, PhD Thesis, 2002;

6. W. Ahrendt. Deductive Search for Errors in Free Data Type Specifi-cations Using Model Generation, Lecture Notes in Computer Science,pp. 211-225, Vol. 2392, Germany, 2002;

7. D. Galmiche and J.M. Notin. Proof Search Proof Nets in MixedLinear Logic, in Electronic Notes in Theoretical Computer Science,Vol. 37, The Netherlands, 2000;

8. J. Richardson. Proof Planning with Program Schemas, Lecture Notesin Computer Science, pp. 313-315, Vol. 1559, Germany, 1998;

9. M. Protzen. Patching Faulty Conjectures. In, M.-A. McRobbie,J.-K. Slaney, editors, Proceedings of the 13th International Confer-ence on Automated Deduction, Lecture Notes in Computer Sciencevol. 1104, pages 77-91, Springer, 1996;

10. M. Protzen. Disproving Conjectures and Lazy Generation of In-duction Hypotheses, Technical University of Darmstad, PhD Thesis,1995;

11. P. Flener and L. Popelinsky. On the Use of Inductive Reasoning inProgram Synthesis: Prejudice Prospects, Lecture Notes in ComputerScience, pp. 69-87, Vol. 883, Germany, 1994.

17

• Raul Monroy. Predicate Synthesis for Correcting Faulty Conjectures: theProof Planning Paradigm, Automated Software Engineering, an Interna-tional Journal, (10):247-269, 2003.

1. Alan Bundy. Cooperating Reasoning Processes: More than just theSum of their Parts. In Proceedings of IJCAI’2007, pp. 2-11, MorganKaufmann, 2007.

2. L. A. Dennis. Program Slicing and Middle-Out Reasoning for ErrorLocation and Repair. IJCAR 2006 workshop on Disproving: Non-Theorems, Non-Validity and Non-Provability, Seattle, Washington,2006.

3. J. Souquiere. Demande d’operation QSL Modelisation formelleMODFORM. Project description, QSL (France), 2006;

4. Louise A. Dennis and Pablo Nogueira. What can be Learned fromFailed Proofs of Non-Theorems? In Proceedings of the EmergingTrends track of TPHOLs 2005. Technical Report. Oxford University,2005.

5. G. Steel. The Importance of Non-theorems and Counterexamplesin Program Verification. In T. Hoare and J. Misra, editors, Proceed-ings of the Verified Software: Theories, Tools, Experiments (VSTTE)Conference. Position paper, 2005;

6. L. Dennis, The Use of Proof Planning Critics to Diagnose Errors inthe Base Cases of Recursive Programs, in 2nd International JointConference On Automated Reasoning, pp. (To appear in ElectronicNotes in Theoretical Computer Science), 2004.

7. G. Steel, Discovering Attacks on Security Protocols by Refuting Incor-rect Inductive Conjectures, PhD Thesis, Edinburgh University, 2003.

• B. Tovar, L. Munoz-Gomez, R. Murrieta-Cid, M. Alencastre-Miranda,R. Monroy and S. Hutchinson. Planning Exploration Strategies for Simul-taneous Localization and Mapping. Journal of Robotics and AutonomousSystems 54(4):314-331, 2006. Elsevier.

1. Francesco Amigoni. Experimental Evaluation of Some ExplorationStrategies for Mobile Robots. In Proceedings of the 2008 IEEE Inter-national Conference on Robotics and Automation, ICRA 2008, pages2818-2823, Pasadena, CA, USA, May 19-23, 2008. IEEE ComputerScience Press.

2. K. Sridharan, P.-R. Kumar. Robotic Exploration and Landmark De-termination: Hardware-Efficient Algorithms and FPGA Implemen-tations. Springer, 2008.

3. B. Lavis, T. Furukawa and H.-F. Durrant-Whyte. Dynamic spacereconfiguration for Bayesian search and tracking with moving targets.Autonomous Robots 24(4): 387-399 (2008). Springer.

18

4. N. Petrellis, F. Gioulekas, M. Birbas, J. Kikidis, and A. Birbas. Ap-plication of Forward Error Correcting Algorithms to Positioning Sys-tems. In, Peng-Yeng Yin, editor, Pattern Recognition Techniques,Technology and Applications, pages 591-612, 2008. I-Tech.

5. K.-R. Beevers. Mapping with Limited Sensing. PhD Thesis. Rens-selaer Polytechnic Institute. New York, USA, 2007.

6. Z. Wei, G. Huang and P. Wang. The Research on Multi-robot Simul-taneous Localization Mapping Algorithm. Proceedings of the 2007IEEE International Conference on Automation and Logistics, pages1241-1246, 2007. IEEE COmputer Science Press.

7. N. Petrellis, N. Konofaos, and G.-P. Alexiou. Using future positionrestriction rules for stabilizing the results of a noise-sensitive indoorlocalization system. Optical Engineering 46(6):1-15, 2007.

8. N. Petrellis, N. Konofaos, and G.-P. Alexiou. A Sensors Systemfor Indoor Localisation of a Moving Target Based on Infrared Pat-tern Recognition. In, R. Stolkin, editor, Scene Reconstruction PoseEstimation and Tracking, pages 283-304, 2007. I-Tech.

9. B. Lavis, T. Furukawa, H. F.-Durrant-Whyte. Spatially AdaptiveExploration for Autonomous Bayesian Search and Tracking. Sub-mitted to Autonomous Robots, 2007.

10. B. Dimitris. Smart Technologies for Environmental Safety andKnowledge Enhancement in Intermodal Transport. In Proceedings ofthe 46th Conference of the European Regional Science Association,ERSA’06, pages 1-16, Greece, 2006.

• R. Monroy. The use of Abduction and Recursion-Editor Techniques for theCorrection of Faulty Conjectures. In P. Flenner and P. Alexander, editors,Proceedings of the 15th Conference on Automated Software Engineering,ASE’00, pages 91-99, Grenoble, Francia, 2000. IEEE Computer SciencePress.

1. M. Demba, F. Alexandre, and K. Bsaıes. Correction of faulty con-jectures and programs extraction. In, W. Ahrendt, P. Baumgartnerand H. de Neville, editors, Proceedings of the CADE-20 Workshopon Disproving-Non-Theorems, Non-Validity, Non-Provability pages17-27, Tallinn, Estonia, 2005.

2. J. Gow. The Dynamic Creation of Induction Rules Using Proof Plan-ning, PhD Thesis, Edinburgh University, 2004;

3. F. Alexandre, K. Bsaıes, M. Demba. Predicate Synthesis from In-ductive Proof Attempt of Faulty Conjectures. Lecture Notes in Com-puter Science, Vol. 3018, Germany, pp. 20-33, 2003;

4. G. Steel. Discovering Attacks on Security Protocols by Refuting In-correct Inductive Conjectures, PhD Thesis, Edinburgh University,2003.

19

• R. Saab, R. Monroy and F. Godınez. Towards a Model for an ImmuneSystem. In Coello-Coello, C., de Albornoz, A., Sucar, L.E. and Battistutti,O.C., editors, Proceedings of the 2nd Mexican Internation Conference onArtificial Intelligence, MICAI‘02, LNAI vol. 2313, pages 401-410, Merida,Mexico, 2002. Springer-Verlag. Best Paper Award Recipient.

1. M. Villalobos-Arias, C. A. Coello-Coello, O. Hernndez-Lerma. Con-vergence Analysis of a Multiobjective Artificial Immune System Al-gorithm. Lecture Notes in Computer Science, Vol. 3239, Germany,pp. 226-235, 2004;

2. N. Cortez. Sistema inmune artificial para solucionar problemas deoptimizacion. PhD Thesis. Centro de Investigacion y de EstudiosAvanzados del Instituto Politecnico Nacional (CINVESTAV), 2004;

3. M. Villalobos-Arias. Analisis de Heursticas de Optimizacin paraProblemas Multiobjetivo. PhD Thesis. Centro de Investigacion yde Estudios Avanzados del Instituto Politecnico Nacional (CINVES-TAV), 2004.

• L.-A. Dennis, R. Monroy and P. Nogueira. Proof-directed Debugging andRepair. In, H. Nilsson and M. van Eekelen, editors, Proceedings of theSeventh Symposium on Trends in Functional Programming, pages 131-140. 2006.

1. S. Roopsha, J. Deshmukh. and E.-A. Emerson. Automatic Genera-tion of Local Repairs for Boolean Programs. In Formal Methods inComputer-Aided Design, pp. 1-10, 2008.

2. Y. Zhang and Y. Ding. CTL Model Update for System Modifications.Journal of Artificial Intelligence Research 31: 113-155, 2008.

3. J.-S. Fitzgerald and P.-G. Larsen. Balancing Insight and Effort: TheIndustrial Uptake of Formal Methods. In, C.-B. Jones, Z. Liu andJ. Woodcock, editors, Formal Methods and Hybrid Real-Time Sys-tems, Essays in Honor of Dines Bjorner and Chaochen Zhou on theOccasion of Their 70th Birthdays, LNCS Vol. 4700, pages 237-254,Macao, China, 2007. Springer.

• R. Monroy, A. Bundy, and I. Green. Planning Proofs of Equations inCCS. Journal of Automated Software Engineering 7(3):263–304, 2000

1. Bernhard Gramlich. Strategic Issues, Problems and Challenges inInductive Theorem Proving. Electronic Notes in Theoretical Com-pututer Science 125(2): 5-43 (2005);

2. L.-A. Fredlund. A Framework for Reasoning about erlang Code.PhD Thesis. Royal Institute of Technology. Sweden, 2001.

• R. Monroy and M. Carrillo. Automatic Formulation of Security PropertiesUnder the Inductive Approach. In M.H. Hamza, editor, Proceedings of

20

IASTED‘03, Applied Informatics-Software Engineering, pages 1020-1025,Innsbruck, Austria, 2003. Acta Press.

1. G. Steel and A. Bundy. Attacking Group Protocols by RefutingIncorrect Inductive Conjectures. Journal of Automated Reasoning,special issue on Automated Reasoning for Security Protocol Analysis.Kluwer 2005 (to appear).

2. G. Steel and A. Bundy. Attacking a Group Multicast Key Manage-ment Protocol using CORAL. Electronic Notes in Theoretical Com-puter Science 125(1):125-144.

• Vıctor H. Garcıa-Pichardo, Raul Monroy, Maricela Quintana. Web At-tack Detection Using ID3. In, John Debenham, editor, Proceedings of the2nd IFIP International Symposium on Professional Practice on AI, IFIPVol. 218, pages 323-332, Santiago, Chile, 2006. Springer.

1. Lee, Joong-Hee Lee, Jong-Hyouk Sohn, Seon-Gyoung Ryu, Jong-HoChung, Tai-Myoung. Effective Value of Decision Tree with KDD99 Intrusion Detection Datasets for Intrusion Detection System. InProceedings of 10th International Conference on Advanced Commu-nication Technology, 2008. ICACT 2008, Vol. 2, pages 1170-1175,Gangwon-Do, South Korea, 2008. IEEE Computer Science Press.

2. Zeng Jin-quan, Zhao Hui,Lili Cai-ming,PENG Ling-xi. PrinciplesInspired Approach to Detection of Web Attacks. Journal of Univer-sity of Electronic Science and Technology of China 366:1215-1218,December 2007. ISSN 1001-0548

• F. Godınez, D. Hutter and R. Monroy. Attribute Reduction for EffectiveIntrusion Detection. In J. Favela, E. Menasalvas, and E. Chavez, editors,Proceedings of the 2004 Atlantic Web Intelligence Conference, AWIC‘04,LNAI Vol. 3034, pages 74-83, Cancun, Mexico, 2004. Springer-Verlag.

1. W. Chimphlee, A.-H. Abdullah, M.-N. Md Sap, S. Chimphlee andS. Srinoy. Unsupervised Clustering Methods for Identifying RareEvents in Anomaly Detection. Transactions on Engineering, Com-puting and Technology 8:253-258, 2005.

• R. Monroy. Concept Formation via Proof Planning Failure. In R.Nieuwenhuis and A. Voronkov, editors, Proceedings of the 8th Interna-tional Conference in Logic for Programming, Artificial Intelligence andReasoning, LPAR‘01, LNAI Vol. 2250, pages 718-731, La Havana Cuba,2001. Springer-Verlag.

1. Alan Bundy. Cooperating Reasoning Processes: More than just theSum of their Parts. In Proceedings of IJCAI’2007, pp. 2-11, MorganKaufmann, 2007;

21

• J.C. Lopez and R. Monroy. A Rippling-Based Difference Reduction Tech-nique to Automatically Prove Security Protocol Goals. In C. Lemaıtre,C.A. Reyes and J.A. Gonzales, editors, Proceedings of the IX Ibero-American Conference on Artificial Intelligence, IBERAMIA 2004, LNAIVol. 3315, pages 364-374, Puebla, Mexico, 2004. Springer-Verlag.

1. Bernhard Gramlich. Strategic Issues, Problems and Challenges in In-ductive Theorem Proving. Electronic Notes in Theoretical ComputerScience 125(2): 5-43 (2005).

• F. Godınez, D. Hutter and R. Monroy. Audit File Reduction Using N-Gram Models. In A. Patrick and M. Yung, editors, Proceedings of theNinth International Conference on Financial Cryptography and Data Se-curity, FC‘05, LNCS Vol. 3570, pages 336-341, Roseau, The Common-wealth Of Dominica, 2005. Springer-Verlag.

1. Ulf Larson. Aspects of Adapting Data Collection to Intrusion De-tection. BSc Thesis. Chalmers University of Technology. Goteborg,Sweden, 2006.

Type B Citations (9)

• R. Monroy, A. Bundy, and A. Ireland. Proof Plans for the Correctionof Faulty Conjectures. In F. Pfenning, editor, Proceedings of the 5th In-ternational Conference on Logic Programming and Automated Reasoning,LPAR’94, LNAI Vol. 822, pages 65-68, Kiev, Ukraine, 1994. Springer-Verlag. Also available from Edinburgh as Research paper 681.

1. Alan Bundy. Cooperating Reasoning Processes: More than just theSum of their Parts. In Proceedings of IJCAI’2007, pp. 2-11, MorganKaufmann, 2007;

2. A. Ireland, B.-J. Ellis, A. Cook, R. Chapman and J. Barnes. AnIntegrated Approach to High Integrity Software Verification. Jour-nal of Automated Reasoning: Special Issue on Empirically SuccessfulAutomated Reasoning 36(4), 379-410 (2006).

3. Andrew Ireland. Towards Automatic Assertion Refinement for Sep-aration Logic. In Proceedings of the 21st IEEE International Con-ference on Automated Software Engineering (ASE’06), pp. 309-312,IEEE Computer Society Press, 2006;

4. A. Bundy. Planning and Patching Proof, Lecture Notes in ComputerScience, Vol. 3249, pp. 26-37, Germany, 2004;

5. A Bundy, R.S. Boyer, D.K.C. Walther. The Automation of Proof byMathematical Induction, Handbook of Automated Reasoning, pp.845-911, Vol. 1, 2001;

6. A. Bundy. The Automation of Proof by Mathematical Induction.Informatics Research Report No. 2. University of Edinburgh, 1999.

22

7. A. Ireland and A. Bundy. Productive Use of Failure in InductiveProof, Journal of Automated Reasoning, pp. 79-111, Vol. 16, TheNetherlands, 1996;

• L.-A. Dennis, R. Monroy and P. Nogueira. Proof-directed Debugging andRepair. In, H. Nilsson and M. van Eekelen, editors, Proceedings of theSeventh Symposium on Trends in Functional Programming, pages 131-140. 2006.

1. L.-A. Dennis. Enhancing Theorem Prover Interfaces with ProgramSlice Information. Electronic Notes in Theoretical Computer Science174(2):19-33. 2007

2. L. A. Dennis. Program Slicing and Middle-Out Reasoning for ErrorLocation and Repair. IJCAR 2006 workshop on Disproving: Non-Theorems, Non-Validity and Non-Provability, Seattle, Washington,2006.

23