default search action
CISIS-ICEUTE 2022: Salamanca, Spain
- Pablo García Bringas, Hilde Pérez García, Francisco Javier Martínez de Pisón, José Ramón Villar Flecha, Alicia Troncoso Lora, Enrique A. de la Cal, Álvaro Herrero, Francisco Martínez-Álvarez, Giuseppe Psaila, Héctor Quintián, Emilio Corchado:
International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022) - Proceedings, Salamanca, Spain, 5-7 September. Lecture Notes in Networks and Systems 532, Springer 2023, ISBN 978-3-031-18408-6
CISIS Applications
- Krzysztof Palczynski, Tomasz Andrysiak, Marcin Glowacki, Michal Kierul, Tomasz Kierul:
Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task. 3-11 - Souhila Badra Guendouzi, Samir Ouchani, Mimoun Malki:
Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems. 12-21 - Roberto Viejo-López, Virginia Riego-Del Castillo, Lidia Sánchez-González:
Hand SOS Gesture Detection by Computer Vision. 22-29 - Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection. 30-39 - Álvaro Michelena, Francisco Zayas-Gato, Esteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Oscar Fontenla-Romero, José Luís Calvo-Rolle:
An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids. 40-51 - Madiha Harrabi, Olfa Belkahla Driss, Khaled Ghédira:
Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints. 52-61 - Nuño Basurto, Álvaro Michelena, Daniel Urda, Héctor Quintián, José Luís Calvo-Rolle, Álvaro Herrero:
Dimensionality-Reduction Methods for the Analysis of Web Traffic. 62-72
Special Session on Cybersecurity in Future Connected Societies
- Miguel Ángel González de la Torre, Luis Hernández Encinas:
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call. 75-85 - Seiya Otsuka, Hiroki Iimori, Kengo Ando, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi, Naoki Ishikawa:
Analysis of Secret Key Agreement Protocol for Massive MIMO Systems. 86-94 - Guillermo Cotrina, Alberto Peinado, Andrés Ortiz:
Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices. 95-103 - Óscar Castillo Campo, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Roberto Álvarez Fernández:
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. 104-113 - Luis Hernández-Álvarez, Juan José Bullón Pérez, Araceli Queiruga Dios:
Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids. 114-124
Special Session on Cybersecurity and Trusted Supply Chains of ICT
- Rudolf Erdei, Daniela Delinschi, Emil Pasca, Oliviu Matei:
Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication. 127-137 - Laura Pérez-Vilarelle, Eva Sotos Martínez, Javier Yépez Martínez:
A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries. 138-148 - Alberto Miranda-García, Ignacio Samuel Crespo-Martínez, Ángel Manuel Guerrero-Higueras, Vicente Matellán Olivera:
Evaluation of the Reliability Index of IP Addresses in Reputation Lists. 149-158 - Ovidiu Cosma, Petrica C. Pop, Cosmin Sabo, Laura Cosma:
Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models. 159-168
Special Session on Intelligent Solutions for Cybersecurity Systems
- Roberto Casado-Vara, Marcos Severt, Ángel Martín del Rey, Héctor Quintián, José Luís Calvo-Rolle:
Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery. 171-180 - Juan Carlos de la Torre, José Miguel Aragón-Jurado, Javier Jareño, Sébastien Varrette, Bernabé Dorronsoro:
Obfuscating LLVM Intermediate Representation Source Code with NSGA-II. 181-191 - Francisco Álvarez-Terribas, Roberto Magán-Carrión, Gabriel Maciá-Fernández, Antonio Miguel Mora García:
A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study. 192-201
ICEUTE
- Daniel Urda, Nuño Basurto, Meelis Kull, Álvaro Herrero:
Evaluating Classifiers' Performance to Detect Attacks in Website Traffic. 205-215 - Álvaro Ovejero, Jesús Enrique Sierra-García, Matilde Santos:
Evaluation of an Interactive Guide for Robotics Self-learning. 216-223 - Antonio Manuel Durán-Rosal, David Guijo-Rubio, Víctor Manuel Vargas, Antonio M. Gómez-Orellana, Pedro Antonio Gutiérrez, Juan Carlos Fernández:
Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study. 224-235 - David Guijo-Rubio, Víctor Manuel Vargas, Javier Barbero-Gómez, Jose V. Die, Pablo González-Moreno:
Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks. 236-246 - Javier Parra-Domínguez, Sergio Manzano, Susana Herrero, Pablo Chamoso:
Digital Platforms for Education. The Case of e4you. 247-255 - Francisco Zayas-Gato, Álvaro Michelena, Esteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Elena Arce, José Luís Calvo-Rolle:
3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology. 256-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.