Buscar
Mostrando ítems 11-20 de 26
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
(The Wiley Hindawi Partnership, 2017)
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical
processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as ...
The MANTIS Book. Cyber Physical System Based Proactive Collaborative Maintenance
(River Publishers, 2018)
Success Stories on Real Pilots
(River Publishers, 2018)
A study of the personalization of spam content using Facebook public information
(Oxford University Press, 2017)
Millions of users per day are affected by unsolicited email campaigns. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006% [1], ...
A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection
(Springer, 2018)
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why signi cant number of users are affected by social spam ...
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ...
A neural-visualization IDS for honeynet data
(World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...