Buscar
Mostrando ítems 581-590 de 590
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A review of “A comprehensive review of the state of the art on security and privacy issues in Healthcare” [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
The healthcare industry plays a crucial role in society, and with the increasing use of technology in this field it has become a prime target for malicious activities. Cyber attacks on healthcare systems can cause serious ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Review of VAASI: Crafting Valid and Abnormal Adversarial Samples for Anomaly Detection Systems in Industrial Scenarios [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
Existing adversarial attacks are not feasible in industrial scenarios since they primarly deals with continuous features and not with categorical features. To enhance cyber security in industrial settings, this paper ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Summary of Adversarial Attacks and Defenses on ML- and Hardware-based IoT Device Fingerprinting and Identification [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
In response to the rapid expansion of Internet of-Things (IoT) devices and associated cybersecurity threats, this work proposes a novel LSTM-CNN architecture for robust individual device identification, leveraging behavior ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Review of SUSAN: A Deep Learning based anomaly detection framework for sustainable industry [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
Nowadays, sustainability is pivotal in green tech nologies, crucial for industries striving to cut carbon emissions and optimize energy use. Alongside this concern, cyberattacks impacting sustainability in industries are ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Review of An Interpretable Semi-Supervised System for Detecting Cyberattacks Using Anomaly Detection in Industrial Scenarios [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
The Anomaly Detection systems based on Ma chine Learning and Deep Learning techniques showed great performance when detecting cyberattacks in industrial scena rios. However, two main limitations hinder using them in a real ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Advanced Detection of Cybersecurity Threat Mutations through Machine Learning and Behavioural Analysis [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
For years, Security Operation Centres (SOC) have relied on detection tools that are becoming less effective in the cybersecurity industry, where sophisticated campaigns made by cybercriminals are not being noticed. ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools. Anomaly-based systems ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Plataforma de demostración para ataques extremo a extremo de dispositivos con interfaz OBD-II [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
La ciberseguridad en vehículos ha cobrado un interés significativo en los últimos años, dada la superficie de ataque que sus sistemas de información exponen y el creciente marco normativo en materia de ciberseguridad. Un ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Review of “A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices” [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
This work proposes to include a low-cost Root of Trust for Measuring and Reporting (RoTMR) in an Internet-of-Thing (IoT) device acting as prover, based on the combination of a Physically Unclonable Function (PUF) and an ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Modelling and verification of post-quantum key encapsulation mechanisms using Maude [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
The security of information systems relies on math ematical problems that are hard to solve. Quantum computing threatens the security of our systems and communications. Kyber, BIKE and Classic McEliece are three candidates ...