eBiltegia

    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
    • Euskara
    • Español
    • English

xmlui.dri2xhtml.structural.fecyt

  • Contact Us
  • English 
    • Euskara
    • Español
    • English
  • About eBiltegia  
    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
  • Login
Search 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-Artikuluak
  • Search
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-Artikuluak
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-9 of 9

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Remote maintenance support with the aid of cyber-physical systems and cloud technology 

Zurutuza, Urko; Gorostegui, Unai (Sage Journals, 2018)
This article discusses how a business model based on traditional maintenance can evolve to generate servitization strategies, with the help of remote maintenance support. The application of cyber-physical systems and cloud ...
Thumbnail

Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis 

Ezpeleta, Enaitz; Garitano, Iñaki; Zurutuza, Urko (World Scientific Publishing, 2017)
Currently, short communication channels are growing up due to the huge increase in the number of smartphones and online social networks users. This growth attracts malicious campaigns, such as spam campaigns, that are a ...
Thumbnail

Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends 

Iturbe, Mikel; Garitano, Iñaki; Zurutuza, Urko; Uribeetxeberria, Roberto (The Wiley Hindawi Partnership, 2017)
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as ...
Thumbnail

The MANTIS Book. Cyber Physical System Based Proactive Collaborative Maintenance 

Zurutuza, Urko (River Publishers, 2018)
Thumbnail

A Big Data implementation of the MANTIS Reference Architecture for Predictive Maintenance 

Larrinaga, Felix; Zugasti, Ekhi; Garitano, Iñaki; Zurutuza, Urko (Sage Journals, 2019)
Thumbnail

A study of the personalization of spam content using Facebook public information 

Ezpeleta, Enaitz; Zurutuza, Urko (Oxford University Press, 2017)
Millions of users per day are affected by unsolicited email campaigns. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006% [1], ...
Thumbnail

A neural-visualization IDS for honeynet data 

Zurutuza, Urko (World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Thumbnail

Detection and Visualization of Android Malware Behavior 

Zurutuza, Urko; Uribeetxeberria, Roberto (Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Thumbnail

Different approaches for the detection of SSH anomalous connections 

Zurutuza, Urko (Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...

Browse

All of eBiltegiaCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished atThis CommunityBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished at

My Account

LoginRegister

Discover

Author
Zurutuza, Urko (9)
Garitano, Iñaki (3)Ezpeleta, Enaitz (2)Uribeetxeberria, Roberto (2)Gorostegui, Unai (1)Iturbe, Mikel (1)Larrinaga, Felix (1)Zugasti, Ekhi (1)SubjectIntrusion Detection (2)security (2)spam (2)Artificial Neural Networks (1)Classifier (1)Condition based maintenance CBM (1)CPS (1)Cross-Validation (1)Cyber Physical Systems (1)Cyber Physical Systems CPS (1)... View MoreDate Issued2017 (3)2016 (2)2018 (2)2012 (1)2019 (1)Has File(s)Yes (9)

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace
 

 

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace