Sistemas Inteligentes y Telemática
Publikationen (1.534) Publikationen, an denen Forscher/innen teilgenommen haben Referenzierte Forschungsdaten aufrufen.
2025
-
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks
Future Generation Computer Systems, Vol. 162
2024
-
A Big Data architecture for early identification and categorization of dark web sites
Future Generation Computer Systems, Vol. 157, pp. 67-81
-
A Convolutional Neural Network approach for image-based anomaly detection in smart agriculture
Expert Systems with Applications, Vol. 247
-
A General Purpose Anomaly-Based Method for Detecting Cheaters in Online Courses
IEEE Transactions on Learning Technologies, Vol. 17, pp. 1-11
-
A Review of Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
A Review of “Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management”
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
A Summary of Adversarial Attacks and Defenses on ML- and Hardware-based IoT Device Fingerprinting and Identification
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
A general and modular framework for dark web analysis
Cluster Computing, Vol. 27, Núm. 4, pp. 4687-4703
-
A multimodal study of the interplay between stress, executive function, and biometrics in game-based assessment
Expert Systems with Applications, Vol. 242
-
A review of “A comprehensive review of the state of the art on security and privacy issues in Healthcare”
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
Adapting Containerized Workloads for the Continuum Computing
IEEE Access, Vol. 12, pp. 104102-104114
-
Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach
CMES - Computer Modeling in Engineering and Sciences, Vol. 141, Núm. 2, pp. 1447-1471
-
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification
Future Generation Computer Systems, Vol. 152, pp. 30-42
-
An NLP-Based Framework to Spot Extremist Networks in Social Media
Complexity, Vol. 2024
-
Analyzing frameworks to modeldisinformation attacks in online social networks
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario
Applied Intelligence, Vol. 54, Núm. 8, pp. 6637-6653
-
Análisis del impacto de ciberataques neuronales aplicados a la visión
IX Jornadas Nacionales de Investigación En Ciberseguridad
-
Attacking O-RAN Interfaces: Threat Modeling, Analysis and Practical Experimentation
IEEE Open Journal of the Communications Society, Vol. 5, pp. 4559-4577
-
Automated CyberExercise and CyberScenariogeneration framework
IX Jornadas Nacionales de Investigación En Ciberseguridad