Zerrendatu honen arabera: ikerketa taldea "Análisis de datos y ciberseguridad"
99-tik 21-40 emaitza erakusten
-
Deobfuscating leetspeak with deep learning to improve spam filtering
(UNIR - Universidad Internacional de La Rioja, 2023)The evolution of anti-spam filters has forced spammers to make greater efforts to bypass filters in order to distribute content over networks. The distribution of content encoded in images or the use of Leetspeak are ... -
Design and validation of a methodology to implement data-driven predictive maintenance in industrial environments
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2021)New trends in manufacturing and industry lead to digitalise all processes, machines and communicate them forming Cyber Physical Systems (CPS), facilitating process monitoring and data acquisition. The analysis of that ... -
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ... -
Dialogue based management of user feedback in an autonomous preference learning system
(Scitepress, 2010)We present an enhanced method for user feedback in an autonomous learning system that includes a spoken dialogue system to manage the interactions between the users and the system. By means of a rule-based natural language ... -
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ... -
Dimensionality reduction for the improvement of anti-spam filters
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2022)Nowadays, spam represents more than 45% of the world’s email traffic. Filtering techniques to combat the problem of spam distribution have been the subject of many research studies in recent years. Several combinations of ... -
Drilling test data from new and worn bits
(2019)This directory contains the raw data acquired by Mondragon Unibertsitatea during the execution of drilling tests. These data were used to obtain the results presented in the article "The capacity of statistical features ... -
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ... -
Early diagnosis of disorders based on behavioural shifts and biomedical signals
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2017)There are many disorders that directly affect people’s behaviour. The people that are suffering from such a disorder are not aware of their situation, and too often the disorders are identified by relatives or co-workers ... -
Error estimation in current noisy quantum computers
(Springer Nature, 2024)One of the main important features of the noisy intermediate-scale quantum (NISQ) era is the correct evaluation and consideration of errors. In this paper, we analyse the main sources of errors in current (IBM) quantum ... -
Estimación cualitativa de la rugosidad mediante algoritmos de aprendizaje automático en una operación de taladrado
(Federación de Asociaciones de Ingenieros Industriales de España, 2020) -
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ... -
Federated Explainability for Network Anomaly Characterization
(ACM, 2023)Machine learning (ML) based systems have shown promising results for intrusion detection due to their ability to learn complex patterns. In particular, unsupervised anomaly detection approaches offer practical advantages ... -
From KPI Dashboards to Advanced Visualization
(River Publishers, 2018) -
Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems
(IEEE, 2021)With a growing number of embedded devices that create, transform and send data autonomously at its core, the Internet-of-Things (IoT) is a reality in different sectors such as manufacturing, healthcare or transportation. ... -
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation
(IEEE, 2023)The growing adoption of the Internet of Things (IoT) has brought a significant increase in attacks targeting those devices. Machine learning (ML) methods have shown promising results for intrusion detection; however, the ... -
Guardianes de la Galaxia: concienciación en Ciberseguridad
(Universidad de Sevilla, 2024)En este artículo se presenta una iniciativa de formación denominada “Guardianes de la Galaxia”, orientada a concienciar y formar a los participantes en la identificación, detección y prevención de ciberataques de tipo ... -
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
(IEEE, 2020)Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats ... -
IKARO: plataforma de benchmarking de algoritmos de fuzzing para sistemas embebidos
(Escola Politècnica Superior (EPS) de la Unversitat de Lleida (UdL), 2021)La presencia de sistemas embebidos conectados aumenta progresivamente representando un desafío el poder actualizar vulnerabilidades una vez han sido desplegados en campo. Por ello, es necesario optimizar la búsqueda de ... -
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ...