Bilatu
12-tik 1-10 emaitza erakusten
Cyber Physical System Based Proactive Collaborative Maintenance
(IEEE, 2016)
The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber
Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent ...
On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems using Multivariate Statistical Process Control
(IEEE, 2016)
Process Control Systems (PCSs) are the operat-ing core of Critical Infrastructures (CIs). As such, anomalydetection has been an active research field to ensure CInormal operation. Previous ...
From KPI Dashboards to Advanced Visualization
(River Publishers, 2018)
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
(The Wiley Hindawi Partnership, 2017)
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical
processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...
XII Reunión Española sobre Criptología y Seguridad de la Información
(Mondragon Unibertsitatea, 2012)
SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications
(Mondragon Unibertsitatea, 2012)
In this work a comparison of the SURF and MUSURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)
Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...