Zerrendatu Ikerketa-Kongresuak honen arabera: ikerketa taldea "Análisis de datos y ciberseguridad"
25-tik 1-20 emaitza erakusten
-
Active Power Optimization of a Turning Process by Cutting Conditions Selection: A Q-Learning Approach
(IEEE, 2022)In the context of Industry 4.0, the optimization of manufacturing processes is a challenge. Although in recent years many of the efforts have been in this direction, there is still improvement opportunities in these ... -
Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial
(Tecnalia. Incibe, 2022)Los sistemas de control industrial se utilizan en una gran variedad de procesos físicos, incluidas las infraestructuras críticas, convirtiéndose en el principal objetivo de múltiples ataques de seguridad. Un ataque ... -
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ... -
Cyber Physical System Based Proactive Collaborative Maintenance
(IEEE, 2016)The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent ... -
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ... -
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ... -
Federated Explainability for Network Anomaly Characterization
(ACM, 2023)Machine learning (ML) based systems have shown promising results for intrusion detection due to their ability to learn complex patterns. In particular, unsupervised anomaly detection approaches offer practical advantages ... -
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
(IEEE, 2020)Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats ... -
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ... -
Interpreting Remaining Useful Life estimations combining Explainable Artificial Intelligence and domain knowledge in industrial machinery
(IEEE, 2020)This paper presents the implementation and explanations of a remaining life estimator model based on machine learning, applied to industrial data. Concretely, the model has been applied to a bushings testbed, where fatigue ... -
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
(UEU, 2023)Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, ... -
Metodología UCAD: Principios para garantizar el desarrollo de soluciones digitales que tienen en cuenta a los usuarios
(AEIPRO, 2017)The so-called Industry 4.0 has caused the introduction of new digital technologies that increase and improve the production and potential of the new intelligent industry. For that, it’s necessary a good communication between ... -
Monitorización longitudinal de la compliancia pulmonar basada en la TIE en pacientes infectados por COVID-19
(Sociedad Española de Ingeniería Biomédica, 2021)El COVID-19 es una infección vírica que causa complicaciones en el sistema respiratorio. Los síntomas más comunes sugieren que las tecnologías de imagen médica pueden ofrecer información relevante sobre el diagnóstico, ... -
The Neverending Story: Memory Corruption 30 Years Later
(Springer, 2021)Memory errors have been present in software for more than three decades now, leading to numerous security issues. Low-level languages like C and C++ that are prone to this class of errors are in widespread use, meaning ... -
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ... -
On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems using Multivariate Statistical Process Control
(IEEE, 2016)Process Control Systems (PCSs) are the operat-ing core of Critical Infrastructures (CIs). As such, anomalydetection has been an active research field to ensure CInormal operation. Previous ... -
Optimising Maintenance: What are the expectations for Cyber Physical Systems
(IEEE, 2016)The need for maintenance is based on the wear of components of machinery. If this need can be defined reliably beforehand so that no unpredicted failures take place then the maintenance actions can be carried out economically ... -
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ... -
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ... -
Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems
(Springer International Publishing, 2017)In the last years, cyber security of Industrial Control Systems (ICSs) has become an important issue due to the discovery of sophisticated malware that by attacking Critical Infrastructures, could cause catastrophic safety ...