Browsing by Research Group "Análisis de datos y ciberseguridad"
Now showing items 1-20 of 73
-
Active Power Optimization of a Turning Process by Cutting Conditions Selection: A Q-Learning Approach
(IEEE, 2022)In the context of Industry 4.0, the optimization of manufacturing processes is a challenge. Although in recent years many of the efforts have been in this direction, there is still improvement opportunities in these ... -
Adaptable and Explainable Predictive Maintenance: Semi-Supervised Deep Learning for Anomaly Detection and Diagnosis in Press Machine Data
(MDPI, 2021)Predictive maintenance (PdM) has the potential to reduce industrial costs by anticipating failures and extending the work life of components. Nowadays, factories are monitoring their assets and most collected data belong ... -
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ... -
Artificial Neural Network Based Reinforcement Learning for Wind Turbine Yaw Control
(MDPI AG, 2019)This paper introduces a novel data driven yaw control algorithm synthesis method based on Reinforcement Learning (RL) for a variable pitch variable speed wind turbine. Yaw control has not been extendedly studied in the ... -
An attribute oriented induction based methodology to aid in predictive maintenance: anomaly detection, root cause analysis and remaining useful life
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2019)Predictive Maintenance is the maintenance methodology that provides the best performance to industrial organisations in terms of time, equipment effectiveness and economic savings. Thanks to the recent advances in technology, ... -
Behavioral modeling for anomaly detection in industrial control systems
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2013)In 1990s, industry demanded the interconnection of corporate and production networks. Thus, Industrial Control Systems (ICSs) evolved from 1970s proprietary and close hardware and software to nowadays Commercial Off-The-Shelf ... -
A Big Data implementation of the MANTIS Reference Architecture for Predictive Maintenance
(Sage Journals, 2019) -
The capacity of statistical features extracted from multiple signals to predict tool wear in the drilling process
(Springer Verlag, 2019)Industrial processes are being developed under a new scenario based on the digitalisation of manufacturing processes.Through this, it is intended to improve the management of resources, decision-making, ... -
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ... -
Cyber Physical System Based Proactive Collaborative Maintenance
(IEEE, 2016)The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent ... -
Cybersecurity Evaluation Methodology based on Metrics for Industrial Embedded Systems
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2022)During the last decades, Embedded Systems (ESs) have evolved from isolated systems into a fully connected devices. Today, due to the development of processing capabilities, ESs have the ability to control or manage a wide ... -
Data minig approaches for analysis of worm activity toward automatic signature generation
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2007)En esta tesis se propone un marco para el análisis de tráfico no solicitado (como intentos de propagación de gusanos informáticos) recopilados por un sistema de monitorización de red. El análisis de esta información puede ... -
Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects
(Springer Science+Business Media, LLC, 2022)Given the growing amount of industrial data in the 4th industrial revolution, deep learning solutions have become popular for predictive maintenance (PdM) tasks, which involve monitoring assets to anticipate their requirements ... -
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ... -
Design and validation of a methodology to implement data-driven predictive maintenance in industrial environments
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2021)New trends in manufacturing and industry lead to digitalise all processes, machines and communicate them forming Cyber Physical Systems (CPS), facilitating process monitoring and data acquisition. The analysis of that ... -
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ... -
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ... -
Dimensionality reduction for the improvement of anti-spam filters
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2022)Nowadays, spam represents more than 45% of the world’s email traffic. Filtering techniques to combat the problem of spam distribution have been the subject of many research studies in recent years. Several combinations of ... -
Drilling test data from new and worn bits
(2019)This directory contains the raw data acquired by Mondragon Unibertsitatea during the execution of drilling tests. These data were used to obtain the results presented in the article "The capacity of statistical features ... -
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...