Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Jorge Maestre Vidal"'
Publikováno v:
IEEE Access, Vol 9, Pp 60971-60996 (2021)
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial role for human beings, providing essential services at astonishing speed. Nevertheless, such a centrality of those infrastructures attracts the interest of ill-mo
Externí odkaz:
https://doaj.org/article/33015a17b2344352a804a6ad58062cfe
Tackling Verification and Validation Techniques to Evaluate Cyber Situational Awareness Capabilities
Autor:
Salvador Llopis Sanchez, David Sandoval Rodriguez-Bermejo, Roumen Daton Medenou, Ramis Pasqual de Riquelme, Francesco Torelli, Jorge Maestre Vidal
Publikováno v:
Mathematics, Vol 10, Iss 15, p 2617 (2022)
Since cyberspace was identified as a domain of operations, defence practitioners started a race with academy, researchers, and industry and military organizations working together towards defining related lines of capability development (e.g., DOTMLP
Externí odkaz:
https://doaj.org/article/a01d1589c7624be7a7f62f682ac0d85a
Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness
Autor:
Roumen Daton Medenou Choumanof, Salvador Llopis Sanchez, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Alvaro Luis Martinez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Gerardo Ramis Pasqual de Riquelme, Marco Antonio Sotelo Monge, Antonio Berardi, Paolo De Santis, Francesco Torelli, Jorge Maestre Vidal
Publikováno v:
Sensors, Vol 22, Iss 14, p 5104 (2022)
The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making
Externí odkaz:
https://doaj.org/article/cd0a7832c77540a48078a7ec1574ffdf
Publikováno v:
Sensors, Vol 20, Iss 16, p 4501 (2020)
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud and other adversarial tact
Externí odkaz:
https://doaj.org/article/071a93476a8a403b921c5446e0cde87b
Publikováno v:
Sensors, Vol 20, Iss 7, p 2084 (2020)
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intent
Externí odkaz:
https://doaj.org/article/5f98869f08634094bccc7b2527e164be
Publikováno v:
Entropy, Vol 19, Iss 12, p 649 (2017)
In recent years, an important increase in the amount and impact of Distributed Denial of Service (DDoS) threats has been reported by the different information security organizations. They typically target the depletion of the computational resources
Externí odkaz:
https://doaj.org/article/ec95773d80c645659f8b77f7b161e93b
Publikováno v:
Sensors, Vol 17, Iss 10, p 2405 (2017)
Autonomic self-management is a key challenge for next-generation networks. This paper proposes an automated analysis framework to infer knowledge in 5G networks with the aim to understand the network status and to predict potential situations that mi
Externí odkaz:
https://doaj.org/article/a7c386e70d114299b4cea4982ba3ea08
Publikováno v:
Entropy, Vol 19, Iss 2, p 74 (2017)
5G networks expect to provide significant advances in network management compared to traditional mobile infrastructures by leveraging intelligence capabilities such as data analysis, prediction, pattern recognition and artificial intelligence. The ke
Externí odkaz:
https://doaj.org/article/591b9d3b85c04dc3b15485caa9af4b7a
Autor:
Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García Villalba
Publikováno v:
Future Internet, Vol 9, Iss 1, p 3 (2017)
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying faster networks, with hundreds of thousands of simultaneous connections and massive data transfer. For this purpose, several emerging technologies are implement
Externí odkaz:
https://doaj.org/article/8a6208c17cbc4f7fa07ae6e38b314f27
Autor:
Pedro Ramón y Cajal Ramo, Claudia Castillo Arias, Jorge Carlos Manzanares Martínez, Jorge Maestre Vidal
Publikováno v:
Computer Security. ESORICS 2022 International Workshops ISBN: 9783031254598
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd9ecaeb140de635adde5acda17d41d3
https://doi.org/10.1007/978-3-031-25460-4_25
https://doi.org/10.1007/978-3-031-25460-4_25