Publicaciones en colaboración con investigadores/as de Universidad de Mondragón/Mondragon Unibertsitatea (21)

2023

  1. Evaluación del entorno de pruebas MiniCPS para eldesarrollo de experimentos de seguridad de redesindustriales definidas por software

    Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023

  2. Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

    International Journal of Critical Infrastructure Protection, Vol. 42

2022

  1. Aleatorización de direcciones IP para mitigar ataques de reconocimiento de forma proactiva en sistemas de control industrial

    Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) (Fundación Tecnalia Research and Innovation), pp. 180-187

  2. Implantación colectiva de la clase invertida en el grado de informática

    Actas de las Jornadas sobre la Enseñanza Universitaria de la Informática (JENUI), Núm. 7, pp. 231-238

2021

  1. Collective experience of application of an inverted classroom in the computer science degree program

    Proceedings - SEFI 49th Annual Conference: Blended Learning in Engineering Education: Challenging, Enlightening - and Lasting?

  2. Experiencia colectiva de aplicación de la clase invertida en el grado de informática

    Actas de las Jornadas sobre la Enseñanza Universitaria de la Informática (JENUI), Núm. 6, pp. 291-294

  3. Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems

    IEEE Internet of Things Journal, Vol. 8, Núm. 13, pp. 10390-10411

  4. Generalized SMOTE: A universal generation oversampling technique for all data types in imbalanced learning

    XIX Conferencia de la Asociación Española para la Inteligencia Artificial CAEPIA 2021. 22-24, septiembre, 2021. Málaga

2019

  1. Who’s there? evaluating data source integrity and veracity in IIoT using multivariate statistical process control

    Advanced Sciences and Technologies for Security Applications (Springer), pp. 181-198

2018

  1. A mood analysis on youtube comments and a method for improved social spam detection

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  2. Null is not always empty: Monitoring the null space for field-level anomaly detection in industrial IoT environments

    2018 Global Internet of Things Summit, GIoTS 2018

  3. Software defined networking opportunities for intelligent security enhancement of industrial control systems

    Advances in Intelligent Systems and Computing

  4. Truth will out: Departure-based process-level detection of stealthy attacks on control systems

    Proceedings of the ACM Conference on Computer and Communications Security

2016

  1. On the Feasibility of Distinguishing between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control

    Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016

  2. Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting

    Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016)