Search
Now showing items 1-10 of 38
Data minig approaches for analysis of worm activity toward automatic signature generation
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2007)
En esta tesis se propone un marco para el análisis de tráfico no solicitado (como intentos de propagación de gusanos informáticos) recopilados por un sistema de monitorización de red. El análisis de esta información puede ...
A methodology and experimental implementation for industrial robot health assessment via torque signature analysis
(MDPI AG, 2020)
This manuscript focuses on methodological and technological advances in the field of health assessment and predictive maintenance for industrial robots. We propose a non-intrusive methodology for industrial robot joint ...
SDRS: A new lossless dimensionality reduction for text corpora
(Elsevier Ltd., 2020)
In recent years, most content-based spam filters have been implemented using Machine Learning (ML) approaches by means of token-based representations of textual contents. After introducing multiple performance enhancements, ...
Interpreting Remaining Useful Life estimations combining Explainable Artificial Intelligence and domain knowledge in industrial machinery
(IEEE, 2020)
This paper presents the implementation and explanations of a remaining life estimator model based on machine learning, applied to industrial data. Concretely, the model has been applied to a bushings testbed, where fatigue ...
A neural-visualization IDS for honeynet data
(World Scientific, 2012)
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Methodology for data-driven predictive maintenance models design, development and implementation on manufacturing guided by domain knowledge
(Taylor and Francis, 2022)
The 4th industrial revolution has connected machines and industrial plants, facilitating process monitoring and the implementation of predictive maintenance (PdM) systems that can save up to 60% of maintenance costs. ...
Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects
(Springer Science+Business Media, LLC, 2022)
Given the growing amount of industrial data in the 4th industrial revolution, deep learning solutions have become popular for predictive maintenance (PdM) tasks, which involve monitoring assets to anticipate their requirements ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...