Order:
  1.  10
    Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning.Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luis Calvo-Rolle, Álvaro Herrero & Emilio Corchado - 2022 - Logic Journal of the IGPL 30 (6):1056-1073.
    Detecting intrusions in large networks is a highly demanding task. In order to reduce the computation demand of analysing every single packet travelling along one of such networks, some years ago flows were proposed as a way of summarizing traffic information. Very few research works have addressed intrusion detection in flows from a visualizations perspective. In order to bridge this gap, the present paper proposes the application of a novel projection method (Beta Hebbian Learning) under this framework. With the aim (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  23
    Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families.Nuño Basurto, Diego García-Prieto, Héctor Quintián, Daniel Urda, José Luis Calvo-Rolle & Emilio Corchado - 2024 - Logic Journal of the IGPL 32 (2):306-320.
    As it is well known, mobile phones have become a basic gadget for any individual that usually stores sensitive information. This mainly motivates the increase in the number of attacks aimed at jeopardizing smartphones, being an extreme concern above all on Android OS, which is the most popular platform in the market. Consequently, a strong effort has been devoted for mitigating mentioned incidents in recent years, even though few researchers have addressed the application of visualization techniques for the analysis of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  5
    Evaluating the impact of different Feature as a Counter data aggregation approaches on the performance of NIDSs and their selected features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  15
    Hourly pollutants forecasting using a deep learning approach to obtain the AQI.José Antonio Moscoso-López, Javier González-Enrique, Daniel Urda, Juan Jesús Ruiz-Aguilar & Ignacio J. Turias - 2023 - Logic Journal of the IGPL 31 (4):722-738.
    The Air Quality Index (AQI) shows the state of air pollution in a unique and more understandable way. This work aims to forecast the AQI in Algeciras (Spain) 8 hours in advance. The AQI is calculated indirectly through the predicted concentrations of five pollutants (O3, NO2, CO, SO2 and PM10) to achieve this goal. Artificial neural networks (ANNs), sequence-to-sequence long short-term memory networks (LSTMs) and a newly proposed method combing a rolling window with the latter (LSTMNA) are employed as the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark