Search
Now showing items 1-10 of 25
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)
This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ...
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ...
Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis
(World Scientific Publishing, 2017)
Currently, short communication channels are growing up due to the huge increase in the number of smartphones and online social networks users. This growth attracts malicious campaigns, such as spam campaigns, that are a ...
A study of the personalization of spam content using Facebook public information
(Oxford University Press, 2017)
Millions of users per day are affected by unsolicited email campaigns. Spam filters are capable of detecting and avoiding an increasing number of messages, but researchers have quantified a response rate of a 0.006% [1], ...
A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection
(Springer, 2018)
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why signi cant number of users are affected by social spam ...
Short Messages Spam Filtering Using Sentiment Analysis
(Springer International Publishing, 2016)
In the same way that short instant messages are more and more used, spam and non-legitimate campaigns through this type of communication systems are growing up. Those campaigns, besides being an illegal online activity, ...
Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems
(Springer International Publishing, 2017)
In the last years, cyber security of Industrial Control Systems (ICSs) has become an important issue due to the discovery of sophisticated malware that by attacking Critical Infrastructures, could cause catastrophic safety ...
Providing Proactiveness: Data Analysis Techniques Portfolios
(River Publishers, 2018)