Bilatu
22-tik 11-20 emaitza erakusten
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
(Springer, 2023)
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these ...
Implantación colectiva de la clase invertida en el grado de informática
(AENUI, 2022)
La educación ha sufrido una gran transformación en las últimas décadas. El alumnado de hoy en día está formado por nativos digitales y la educación tradicional les parece aburrida. Por este motivo, los docentes tratan de ...
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
(Elsevier, 2023)
Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the ...
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
(Springer, 2024)
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. ...
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
(UEU, 2023)
Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, ...
IKARO: plataforma de benchmarking de algoritmos de fuzzing para sistemas embebidos
(Escola Politècnica Superior (EPS) de la Unversitat de Lleida (UdL), 2021)
La presencia de sistemas embebidos conectados aumenta progresivamente representando un desafío el poder actualizar vulnerabilidades una vez han sido desplegados en
campo. Por ello, es necesario optimizar la búsqueda de ...
SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications
(Mondragon Unibertsitatea, 2012)
In this work a comparison of the SURF and MUSURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ...
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)
Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ...