Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Adrián Campazas-Vega"'
Autor:
Adrián Campazas-Vega, Ignacio Samuel Crespo-Martínez, Ángel Manuel Guerrero-Higueras, Claudia Álvarez-Aparicio, Vicente Matellán, Camino Fernández-Llamas
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-11 (2023)
Abstract Cyber-attacks are a major problem for users, businesses, and institutions. Classical anomaly detection techniques can detect malicious traffic generated in a cyber-attack by analyzing individual network packets. However, routers that manage
Externí odkaz:
https://doaj.org/article/c9efa32ac4364d83890aae5339adac36
Autor:
Claudia Álvarez-Aparicio, Ángel Manuel Guerrero-Higueras, Miguel Ángel González-Santamarta, Adrián Campazas-Vega, Vicente Matellán, Camino Fernández-Llamas
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-11 (2022)
Abstract The use of people recognition techniques has become critical in some areas. For instance, social or assistive robots carry out collaborative tasks in the robotics field. A robot must know who to work with to deal with such tasks. Using biome
Externí odkaz:
https://doaj.org/article/4c4ed24e437348418f8e85fd3053af93
Autor:
Virginia Riego del Castillo, Lidia Sánchez-González, Adrián Campazas-Vega, Nicola Strisciuglio
Publikováno v:
Sensors, Vol 22, Iss 14, p 5321 (2022)
Livestock farming is assisted more and more by technological solutions, such as robots. One of the main problems for shepherds is the control and care of livestock in areas difficult to access where grazing animals are attacked by predators such as t
Externí odkaz:
https://doaj.org/article/0f9086f4e976422ebedffd0b2bd02122
Autor:
Adrián Campazas-Vega, Ignacio Samuel Crespo-Martínez, Ángel Manuel Guerrero-Higueras, Camino Fernández-Llamas
Publikováno v:
Sensors, Vol 20, Iss 24, p 7294 (2020)
Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining acce
Externí odkaz:
https://doaj.org/article/5fa7ddef70134a34bebfb645213251a4
Autor:
Ignacio Samuel Crespo-Martínez, Adrián Campazas-Vega, Ángel Manuel Guerrero-Higueras, Virginia Riego-DelCastillo, Claudia Álvarez-Aparicio, Camino Fernández-Llamas
[EN] SQL injections rank in the OWASP Top 3. The literature shows that analyzing network datagrams allows for detecting or preventing such attacks. Unfortunately, such detection usually implies studying all packets flowing in a computer network. Ther
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eaed593b9d8b1bc7f754e01ea488be3c
http://hdl.handle.net/10612/15468
http://hdl.handle.net/10612/15468
Autor:
Adrián Campazas-Vega, Ignacio Samuel Crespo-Martínez, Vicente Matellán, Claudia Álvarez-Aparicio, Ángel Manuel Guerrero-Higueras
Publikováno v:
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) ISBN: 9783030878719
CISIS-ICEUTE
CISIS-ICEUTE
Malicious traffic detection allows for preventing cybersecurity-related threats. Machine learning algorithms are commonly used to detect such traffic in computer networks by analyzing packets. In wide-area networks, such as RedCAYLE (Red de Ciencia y
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd60d58d422f109fc897641f66142abc
https://doi.org/10.1007/978-3-030-87872-6_6
https://doi.org/10.1007/978-3-030-87872-6_6
Autor:
Ignacio Samuel Crespo-Martínez, Camino Fernández-Llamas, Ángel Manuel Guerrero-Higueras, Adrián Campazas-Vega
Publikováno v:
Sensors, Vol 20, Iss 7294, p 7294 (2020)
Sensors
Volume 20
Issue 24
Sensors (Basel, Switzerland)
Sensors
Volume 20
Issue 24
Sensors (Basel, Switzerland)
Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining acce
Autor:
Adrián Campazas Vega, Francisco Javier Rodríguez Lera, Camino Fernández-Llamas, David Sobrín-Hidalgo, Ángel Manuel Guerrero Higueras
Publikováno v:
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) ISBN: 9783030578046
Between the most complex security issues faced by private companies and public entities are Advanced Persistent Threats. These threats use multiple techniques and processes to carry out an attack on a specific entity. The need to combat cyber-attacks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ffbd2ff30571393a394ff764a5dcdc64
https://doi.org/10.1007/978-3-030-57805-3_40
https://doi.org/10.1007/978-3-030-57805-3_40