


default search action
CISIS-ICEUTE 2022: Salamanca, Spain
- Pablo García Bringas, Hilde Pérez García

, Francisco Javier Martínez de Pisón
, José Ramón Villar Flecha
, Alicia Troncoso Lora
, Enrique A. de la Cal, Álvaro Herrero, Francisco Martínez-Álvarez
, Giuseppe Psaila, Héctor Quintián
, Emilio Corchado
:
International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022) - Proceedings, Salamanca, Spain, 5-7 September. Lecture Notes in Networks and Systems 532, Springer 2023, ISBN 978-3-031-18408-6
CISIS Applications
- Krzysztof Palczynski, Tomasz Andrysiak, Marcin Glowacki, Michal Kierul, Tomasz Kierul:

Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task. 3-11 - Souhila Badra Guendouzi

, Samir Ouchani
, Mimoun Malki
:
Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems. 12-21 - Roberto Viejo-López, Virginia Riego-Del Castillo, Lidia Sánchez-González

:
Hand SOS Gesture Detection by Computer Vision. 22-29 - Lukasz Saganowski

, Tomasz Andrysiak:
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection. 30-39 - Álvaro Michelena

, Francisco Zayas-Gato
, Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Oscar Fontenla-Romero
, José Luís Calvo-Rolle
:
An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids. 40-51 - Madiha Harrabi, Olfa Belkahla Driss

, Khaled Ghédira:
Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints. 52-61 - Nuño Basurto

, Álvaro Michelena
, Daniel Urda
, Héctor Quintián
, José Luís Calvo-Rolle
, Álvaro Herrero
:
Dimensionality-Reduction Methods for the Analysis of Web Traffic. 62-72
Special Session on Cybersecurity in Future Connected Societies
- Miguel Ángel González de la Torre, Luis Hernández Encinas

:
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call. 75-85 - Seiya Otsuka, Hiroki Iimori, Kengo Ando, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi, Naoki Ishikawa:

Analysis of Secret Key Agreement Protocol for Massive MIMO Systems. 86-94 - Guillermo Cotrina, Alberto Peinado, Andrés Ortiz

:
Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices. 95-103 - Óscar Castillo Campo

, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Roberto Álvarez Fernández:
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. 104-113 - Luis Hernández-Álvarez

, Juan José Bullón Pérez, Araceli Queiruga Dios:
Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids. 114-124
Special Session on Cybersecurity and Trusted Supply Chains of ICT
- Rudolf Erdei, Daniela Delinschi

, Emil Pasca
, Oliviu Matei:
Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication. 127-137 - Laura Pérez-Vilarelle

, Eva Sotos Martínez, Javier Yépez Martínez:
A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries. 138-148 - Alberto Miranda-García

, Ignacio Samuel Crespo-Martínez, Ángel Manuel Guerrero-Higueras, Vicente Matellán Olivera:
Evaluation of the Reliability Index of IP Addresses in Reputation Lists. 149-158 - Ovidiu Cosma, Petrica C. Pop

, Cosmin Sabo
, Laura Cosma:
Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models. 159-168
Special Session on Intelligent Solutions for Cybersecurity Systems
- Roberto Casado-Vara, Marcos Severt, Ángel Martín del Rey, Héctor Quintián

, José Luís Calvo-Rolle
:
Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery. 171-180 - Juan Carlos de la Torre

, José Miguel Aragón-Jurado
, Javier Jareño
, Sébastien Varrette
, Bernabé Dorronsoro
:
Obfuscating LLVM Intermediate Representation Source Code with NSGA-II. 181-191 - Francisco Álvarez-Terribas

, Roberto Magán-Carrión
, Gabriel Maciá-Fernández
, Antonio Miguel Mora García
:
A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study. 192-201
ICEUTE
- Daniel Urda

, Nuño Basurto
, Meelis Kull
, Álvaro Herrero
:
Evaluating Classifiers' Performance to Detect Attacks in Website Traffic. 205-215 - Álvaro Ovejero, Jesús Enrique Sierra-García, Matilde Santos:

Evaluation of an Interactive Guide for Robotics Self-learning. 216-223 - Antonio Manuel Durán-Rosal, David Guijo-Rubio, Víctor Manuel Vargas, Antonio M. Gómez-Orellana

, Pedro Antonio Gutiérrez, Juan Carlos Fernández
:
Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study. 224-235 - David Guijo-Rubio, Víctor Manuel Vargas, Javier Barbero-Gómez, Jose V. Die, Pablo González-Moreno:

Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks. 236-246 - Javier Parra-Domínguez

, Sergio Manzano, Susana Herrero, Pablo Chamoso
:
Digital Platforms for Education. The Case of e4you. 247-255 - Francisco Zayas-Gato

, Álvaro Michelena
, Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Elena Arce
, José Luís Calvo-Rolle
:
3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology. 256-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














