Search
Now showing items 1-10 of 17
Early Detection of Cyberbullying on Social Media Networks
(Elsevier BV, 2021-05)
[Abstract]
Cyberbullying is an important issue for our society and has a major negative effect on the victims, that can be highly damaging due to the frequency and high propagation provided by Information Technologies. ...
Time-Aware Detection Systems
(MDPI AG, 2019-08-05)
[Abstract] Communication network data has been growing in the last decades and with the generalisation of the Internet of Things (IoT) its growth has increased. The number of attacks to this kind of infrastructures have ...
Annotated Dataset for Anomaly Detection in a Data Center with IoT Sensors
(MDPI AG, 2020-07-04)
[Abstract]
The relative simplicity of IoT networks extends service vulnerabilities and possibilities to different network failures exhibiting system weaknesses. Therefore, having a dataset with a sufficient number of ...
The Evolution of the (Hidden) Web and its Hidden Data
(IGI Global, 2015)
This paper presents an analysis of the most important features of the Web and its evolution and implications on the tools that traverse it to index its content to be searched later. It is important to remark that some of ...
Twitter: A Good Place to Detect Health Conditions
(PLoS, 2014-01)
[Absctract]: With the proliferation of social networks and blogs, the Internet is increasingly being used to disseminate personal health information rather than just as a source of information. In this paper we exploit the ...
Distributed and Collaborative Web Change Detection System
(ComSIS Consortium, 2015)
[Absctract]: Search engines use crawlers to traverse the Web in order to download
web pages and build their indexes. Maintaining these indexes up-to-date is an
essential task to ensure the quality of search results. ...
Time Aware F-Score for Cybersecurity Early Detection Evaluation
(MDPI, 2024-01)
[Abstract]: With the increase in the use of Internet interconnected systems, security has become of utmost importance. One key element to guarantee an adequate level of security is being able to detect the threat as soon ...
Early Intrusion Detection for OS Scan Attacks
(Institute of Electrical and Electronics Engineers Inc., 2019-09)
[Abstract]: Network Intrusion Detection Systems (NIDS) are concerned with the discovery of unauthorized accesses to computer networks by analyzing the traffic in order to detect malicious activity. In the event of an ...
A Content-Based Approach to Profile Expansion
(World Scientific, 2020-12)
[Abstract]: Collaborative Filtering algorithms suffer from the so-called cold-start problem. In particular, when a user has rated few items, recommendations offered by these algorithms are not too accurate. Profile Expansion ...
Semantic Hierarchical Classification Applied to Anomaly Detection Using System Logs with a BERT Model
(MDPI, 2024-06)
[Abstract]: The compaction and structuring of system logs facilitate and expedite anomaly and cyberattack detection processes using machine-learning techniques, while simultaneously reducing alert fatigue caused by false ...