Buscar
Mostrando ítems 1-9 de 9
Artículo
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
(MDPI, 2022)
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which ...
Artículo
How much training data is enough?. A case study for HTTP anomaly-based intrusion detection
(Institute of Electrical and Electronics Engineers, 2020)
Most anomaly-based intrusion detectors rely on models that learn from a training dataset whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of ...
Artículo
Designing Cost-Effective Reliable Networks from a Risk Analysis Perspective: A Case Study for a Hospital Campus
(Institute of Electrical and Electronics Engineers, 2019)
The unavailability of information and communication services due to network-related incidents may have a significant impact on large organizations. Network incidents can hence be viewed as a risk for organizations whose ...
Artículo
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS
(Elsevier, 2022-09-01)
Unmanned Aerial Vehicle (UAV) networks have emerged as a promising means to provide wireless coverage in open geographical areas. Nevertheless, in wireless networks such as WiFi, signal coverage alone is insufficient to ...
Artículo
Energy-Efficient UAVs Deployment for QoS-Guaranteed VoWiFi Service
(MDPI, 2020-08)
This paper formulates a new problem for the optimal placement of Unmanned Aerial Vehicles (UAVs) geared towards wireless coverage provision for Voice over WiFi (VoWiFi) service to a set of ground users confined in an open ...
Artículo
Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing
(Institute of Electrical and Electronics Engineers Inc., 2023)
Continuity of care requires the exchange of health information among organizations and care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of care should give explicit consent to the ...
Artículo
Tool for Validation Software Projects in Programming Labs
(International Society for Engineering Education (IGIP), 2012)
This work shows a testing tool used in Fundamentals of Programming II laboratory in Telecommunication Technologies Engineering Degree at University of Sevilla to check the student project. This tool allows students to ...
Artículo
RPL Cross-Layer Scheme for IEEE 802.15.4 IoT Devices With Adjustable Transmit Power
(Institute of Electrical and Electronics Engineers Inc., 2021)
We propose a novel cross-layer scheme to reduce energy consumption in wireless sensor networks composed of IEEE 802.15.4 IoT devices with adjustable transmit power. Our approach is based on the IETF’s Routing Protocol ...
Artículo
Deploying a Reliable UAV-Aided Communication Service in Disaster Areas
(Hindawi Limited, 2019)
When telecommunication infrastructure is damaged by natural disasters, creating a network that can handle voice channels can be vital for search and rescue missions. Unmanned Aerial Vehicles (UAV) equipped with WiFi access ...