Bilatu
45-tik 21-30 emaitza erakusten
Data minig approaches for analysis of worm activity toward automatic signature generation
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2007)
En esta tesis se propone un marco para el análisis de tráfico no solicitado (como intentos de propagación de gusanos informáticos) recopilados por un sistema de monitorización de red. El análisis de esta información puede ...
A neural-visualization IDS for honeynet data
(World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Adaptable and Explainable Predictive Maintenance: Semi-Supervised Deep Learning for Anomaly Detection and Diagnosis in Press Machine Data
(MDPI, 2021)
Predictive maintenance (PdM) has the potential to reduce industrial costs by anticipating failures and extending the work life of components. Nowadays, factories are monitoring their assets and most collected data belong ...
Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects
(Springer Science+Business Media, LLC, 2022)
Given the growing amount of industrial data in the 4th industrial revolution, deep learning solutions have become popular for predictive maintenance (PdM) tasks, which involve monitoring assets to anticipate their requirements ...
Methodology for data-driven predictive maintenance models design, development and implementation on manufacturing guided by domain knowledge
(Taylor and Francis, 2022)
The 4th industrial revolution has connected machines and industrial plants, facilitating process monitoring and the implementation of predictive maintenance (PdM) systems that can save up to 60% of maintenance costs. ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)
Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ...
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)
Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ...
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...