Zerrendatu honen arabera: ikerketa taldea "Análisis de datos y ciberseguridad"
87-tik 21-40 emaitza erakusten
-
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ... -
Dimensionality reduction for the improvement of anti-spam filters
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2022)Nowadays, spam represents more than 45% of the world’s email traffic. Filtering techniques to combat the problem of spam distribution have been the subject of many research studies in recent years. Several combinations of ... -
Drilling test data from new and worn bits
(2019)This directory contains the raw data acquired by Mondragon Unibertsitatea during the execution of drilling tests. These data were used to obtain the results presented in the article "The capacity of statistical features ... -
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ... -
Early diagnosis of disorders based on behavioural shifts and biomedical signals
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2017)There are many disorders that directly affect people’s behaviour. The people that are suffering from such a disorder are not aware of their situation, and too often the disorders are identified by relatives or co-workers ... -
Estimación cualitativa de la rugosidad mediante algoritmos de aprendizaje automático en una operación de taladrado
(Federación de Asociaciones de Ingenieros Industriales de España, 2020) -
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ... -
Federated Explainability for Network Anomaly Characterization
(ACM, 2023)Machine learning (ML) based systems have shown promising results for intrusion detection due to their ability to learn complex patterns. In particular, unsupervised anomaly detection approaches offer practical advantages ... -
From KPI Dashboards to Advanced Visualization
(River Publishers, 2018) -
Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems
(IEEE, 2021)With a growing number of embedded devices that create, transform and send data autonomously at its core, the Internet-of-Things (IoT) is a reality in different sectors such as manufacturing, healthcare or transportation. ... -
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation
(IEEE, 2023)The growing adoption of the Internet of Things (IoT) has brought a significant increase in attacks targeting those devices. Machine learning (ML) methods have shown promising results for intrusion detection; however, the ... -
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
(IEEE, 2020)Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats ... -
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ... -
Impregnation quality diagnosis in Resin Transfer Moulding by machine learning
(Elsevier Ltd., 2021)In recent years, several optimization strategies have been developed which reduce the overall defectiveness of the RTM manufactured part. RTM filling simulations showed that, even using optimized injection strategies, local ... -
Improving fuzzing assessment methods through the analysis of metrics and experimental conditions
(Elsevier, 2023)Fuzzing is nowadays one of the most widely used bug hunting techniques. By automatically generating malformed inputs, fuzzing aims to trigger unwanted behavior on its target. While fuzzing research has matured considerably ... -
Improving Waiting Time and Energy Consumption Performance of a Bi- objective Genetic Algorithm embedded in an Elevator Group Control System through passenger flow estimation
(Springer, 2022)Passenger waiting time is a significant issue related to the quality of service of a multiple lift system; however, energy consumption reduction is also an important concern in the lift industry. In this paper, we evaluate ... -
Incorporation of Synthetic Data Generation Techniques within a Controlled Data Processing Workflow in the Health and Wellbeing Domain
(MDPI, 2022)To date, the use of synthetic data generation techniques in the health and wellbeing domain has been mainly limited to research activities. Although several open source and commercial packages have been released, they have ... -
Interpreting Remaining Useful Life estimations combining Explainable Artificial Intelligence and domain knowledge in industrial machinery
(IEEE, 2020)This paper presents the implementation and explanations of a remaining life estimator model based on machine learning, applied to industrial data. Concretely, the model has been applied to a bushings testbed, where fatigue ... -
Introduction
(River Publishers, 2018)