Search
Now showing items 1-9 of 9
Remote maintenance support with the aid of cyber-physical systems and cloud technology
(Sage Journals, 2018)
This article discusses how a business model based on traditional maintenance can evolve to generate servitization strategies, with the help of remote maintenance support. The application of cyber-physical systems and cloud ...
Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis
(World Scientific Publishing, 2017)
Currently, short communication channels are growing up due to the huge increase in the number of smartphones and online social networks users. This growth attracts malicious campaigns, such as spam campaigns, that are a ...
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
(The Wiley Hindawi Partnership, 2017)
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical
processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as ...
The MANTIS Book. Cyber Physical System Based Proactive Collaborative Maintenance
(River Publishers, 2018)
A study of the personalization of spam content using Facebook public information
(Oxford University Press, 2017)
Millions of users per day are affected by unsolicited email campaigns. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006% [1], ...
A neural-visualization IDS for honeynet data
(World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...