Achegas congreso (50) Publicacións nas que participase algún/ha investigador/a

2011

  1. A Review of SCADA Anomaly Detection Systems

    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011

  2. A TV Platform to improve older people.'s quality of life: Lessons learned from the evaluation of the VITAL project with Spanish Elderly Users

    ACM International Conference Proceeding Series

  3. A case study on the use of community platforms for inter-enterprise innovation

    2011 17th International Conference on Concurrent Enterprising, ICE 2011 - Conference Proceedings

  4. A new method for Scheimpflug camera calibration

    2011 10th International Workshop on Electronics, Control, Measurement and Signals, ECMS 11

  5. A review of SCADA anomaly detection systems

    Advances in Intelligent and Soft Computing

  6. ANOMALY-BASED SPAM FILTERING

    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY

  7. Anomaly detection for high precision foundries

    IEEE International Conference on Industrial Informatics (INDIN)

  8. Anomaly detection for the prediction of ultimate tensile strength in iron casting production

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  9. Anomaly-based spam filtering

    SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography

  10. Challenges and limitations in current botnet detection

    Proceedings - International Workshop on Database and Expert Systems Applications, DEXA

  11. Collective classification for packed executable identification

    ACM International Conference Proceeding Series

  12. Collective classification for spam filtering

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  13. Collective classification for unknown malware detection

    SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography

  14. Crowdroid: Behavior-based malware detection system for android

    Proceedings of the ACM Conference on Computer and Communications Security

  15. Enhancing scalability in anomaly-based email spam filtering

    ACM International Conference Proceeding Series

  16. Explicit hybrid model predictive control: Discontinuous piecewise-affine approximation and FPGA implementation

    IFAC Proceedings Volumes (IFAC-PapersOnline)

  17. FOC and DTC comparison in PMSM for railway traction application

    Proceedings of the 2011 14th European Conference on Power Electronics and Applications, EPE 2011

  18. Fuzzy linguistic reporting in driving simulators

    IEEE SSCI 2011: Symposium Series on Computational Intelligence - CIVTS 2011: 2011 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems

  19. HIGH-THROUGHPUT IMPLEMENTATION OF TREE-SEARCH ALGORITHMS FOR VECTOR PRECODING

    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING

  20. High-throughput implementation of tree-search algorithms for vector precoding

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings