Bilatu
49-tik 21-30 emaitza erakusten
A methodology and experimental implementation for industrial robot health assessment via torque signature analysis
(MDPI AG, 2020)
This manuscript focuses on methodological and technological advances in the field of health assessment and predictive maintenance for industrial robots. We propose a non-intrusive methodology for industrial robot joint ...
Data minig approaches for analysis of worm activity toward automatic signature generation
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2007)
En esta tesis se propone un marco para el análisis de tráfico no solicitado (como intentos de propagación de gusanos informáticos) recopilados por un sistema de monitorización de red. El análisis de esta información puede ...
Adaptable and Explainable Predictive Maintenance: Semi-Supervised Deep Learning for Anomaly Detection and Diagnosis in Press Machine Data
(MDPI, 2021)
Predictive maintenance (PdM) has the potential to reduce industrial costs by anticipating failures and extending the work life of components. Nowadays, factories are monitoring their assets and most collected data belong ...
Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects
(Springer Science+Business Media, LLC, 2022)
Given the growing amount of industrial data in the 4th industrial revolution, deep learning solutions have become popular for predictive maintenance (PdM) tasks, which involve monitoring assets to anticipate their requirements ...
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
(Springer, 2023)
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks
(Elsevier, 2023)
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being ...
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
(Elsevier, 2023)
Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the ...
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
(Springer, 2024)
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...