Bilatu
26-tik 11-20 emaitza erakusten
A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection
(Springer, 2018)
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why signi cant number of users are affected by social spam ...
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ...
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)
This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ...
Introduction
(River Publishers, 2018)
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
(The Wiley Hindawi Partnership, 2017)
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical
processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as ...
The MANTIS Book. Cyber Physical System Based Proactive Collaborative Maintenance
(River Publishers, 2018)
Success Stories on Real Pilots
(River Publishers, 2018)
A neural-visualization IDS for honeynet data
(World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...