Bilatu
7-tik 1-7 emaitza erakusten
Cyber Physical System Based Proactive Collaborative Maintenance
(IEEE, 2016)
The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber
Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent ...
Short Messages Spam Filtering Using Sentiment Analysis
(Springer International Publishing, 2016)
In the same way that short instant messages are more and more used, spam and non-legitimate campaigns through this type of communication systems are growing up. Those campaigns, besides being an illegal online activity, ...
On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems using Multivariate Statistical Process Control
(IEEE, 2016)
Process Control Systems (PCSs) are the operat-ing core of Critical Infrastructures (CIs). As such, anomalydetection has been an active research field to ensure CInormal operation. Previous ...
Optimising Maintenance: What are the expectations for Cyber Physical Systems
(IEEE, 2016)
The need for maintenance is based on the wear of components of machinery. If this need can be defined reliably beforehand so that no unpredicted failures take place then the maintenance actions can be carried out economically ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...