Search
Now showing items 11-20 of 22
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ...
Improving fuzzing assessment methods through the analysis of metrics and experimental conditions
(Elsevier, 2023)
Fuzzing is nowadays one of the most widely used bug hunting techniques. By automatically generating malformed inputs, fuzzing aims to trigger unwanted behavior on its target. While fuzzing research has matured considerably ...
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)
Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
Collective experience of application of an inverted classroom in the computer science degree program
(SEFI, 2021)
In the last years, higher education is immersed in the transformation of the teaching experience with the aim of involving students more, as well as motivating them. Nowadays, students are very familiarized with new ...
Experiencia colectiva de aplicación de la clase invertida en el grado de informática
(2021)
As information consumption habits change, higher education is facing the challenge of transforming the teaching experience in order to maximize student involvement and motivation. This transformation, based on multimedia ...
An experience in the implementation of the flipped classroom instructional model in the computer science degree
(Wiley, 2023)
In recent years, education has undergone a profound transformation process, having gone from relying only on the traditional lecture to making full use of digital formats. This gradual process, accelerated by the COVID-19 ...
SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications
(Mondragon Unibertsitatea, 2012)
In this work a comparison of the SURF and MUSURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in ...
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
(UEU, 2023)
Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, ...
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
(Springer, 2024)
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. ...