Buscar
Mostrando ítems 1-10 de 14
Artículo
Smart home anomaly-based IDS: architecture proposal and case study
(Elsevier, 2023)
The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context ...
Artículo
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
(MDPI, 2022)
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which ...
Artículo
How much training data is enough?. A case study for HTTP anomaly-based intrusion detection
(Institute of Electrical and Electronics Engineers, 2020)
Most anomaly-based intrusion detectors rely on models that learn from a training dataset whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of ...
Informe
Reflexiones sobre la Gestión de Riesgos en la Evaluación Telemática dentro del contexto de la E.T.S.I de la Universidad de Sevilla
(2020-04-30)
Es imposible suprimir el riesgo en un examen telemático, como también lo es en un examen presencial. De forma natural, lo exámenes telemáticos abren un mayor número de oportunidades a quién desea sortear las normas ...
Artículo
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS
(Elsevier, 2022-09-01)
Unmanned Aerial Vehicle (UAV) networks have emerged as a promising means to provide wireless coverage in open geographical areas. Nevertheless, in wireless networks such as WiFi, signal coverage alone is insufficient to ...
Ponencia
Generación automática de firmas para detección de ciberataques basados en URI
(Universidade da Coruña, 2021)
La mayor parte de los sistemas de detección de intrusiones (IDS) operativos se basan en el uso de firmas que permiten identificar ataques conocidos. La dependencia de estos IDS con la actualización de las bases de ...
Artículo
Energy-Efficient UAVs Deployment for QoS-Guaranteed VoWiFi Service
(MDPI, 2020-08)
This paper formulates a new problem for the optimal placement of Unmanned Aerial Vehicles (UAVs) geared towards wireless coverage provision for Voice over WiFi (VoWiFi) service to a set of ground users confined in an open ...
Artículo
Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing
(Institute of Electrical and Electronics Engineers Inc., 2023)
Continuity of care requires the exchange of health information among organizations and care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of care should give explicit consent to the ...
Artículo
QoS-Aware Multilayer UAV Deployment to Provide VoWiFi Service over 5G Networks
(WILEY-HINDAWI, 2022-01)
Drones equipped with wireless network cards can provide communication services in open areas. This paper proposes a hierarchical two-layered network architecture with two types of drones according to their communication ...
Artículo
CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks
(Elsevier, 2023-01)
Voice over IP (VoIP) requires a Call Admission Control (CAC) mechanism in WiFi networks to preserve VoIP packet flows from excessive network delay or packet loss. Ideally, this mechanism should be integrated with the ...