Buscar
Mostrando ítems 41-48 de 48
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks
(Elsevier, 2023)
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being ...
Deobfuscating leetspeak with deep learning to improve spam filtering
(UNIR - Universidad Internacional de La Rioja, 2023)
The evolution of anti-spam filters has forced spammers to make greater efforts to bypass filters in order to distribute content over networks. The distribution of content encoded in images or the use of Leetspeak are ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...
Novel email spam detection method using sentiment analysis and personality recognition
(Oxford Academic, 2020)
Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to ...
XII Reunión Española sobre Criptología y Seguridad de la Información
(Mondragon Unibertsitatea, 2012)
Federated Explainability for Network Anomaly Characterization
(ACM, 2023)
Machine learning (ML) based systems have shown promising results for intrusion detection due to their ability to learn complex patterns. In particular, unsupervised anomaly detection approaches offer practical advantages ...
Combined data mining approach for intrusion detection
(Scitepress, 2007)
This paper presents the results of the project MIAU, a data mining approach for intrusion detection alert correlation. MIAU combines different data mining techniques in order to properly solve some existing problems in the ...
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
(UEU, 2023)
Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, ...