Bilatu
45-tik 21-30 emaitza erakusten
Adaptable and Explainable Predictive Maintenance: Semi-Supervised Deep Learning for Anomaly Detection and Diagnosis in Press Machine Data
(MDPI, 2021)
Predictive maintenance (PdM) has the potential to reduce industrial costs by anticipating failures and extending the work life of components. Nowadays, factories are monitoring their assets and most collected data belong ...
A methodology and experimental implementation for industrial robot health assessment via torque signature analysis
(MDPI AG, 2020)
This manuscript focuses on methodological and technological advances in the field of health assessment and predictive maintenance for industrial robots. We propose a non-intrusive methodology for industrial robot joint ...
Data minig approaches for analysis of worm activity toward automatic signature generation
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2007)
En esta tesis se propone un marco para el análisis de tráfico no solicitado (como intentos de propagación de gusanos informáticos) recopilados por un sistema de monitorización de red. El análisis de esta información puede ...
Optimising Maintenance: What are the expectations for Cyber Physical Systems
(IEEE, 2016)
The need for maintenance is based on the wear of components of machinery. If this need can be defined reliably beforehand so that no unpredicted failures take place then the maintenance actions can be carried out economically ...
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)
Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
(Springer, 2023)
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these ...
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ...
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)
Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ...