4 found
Order:
  1.  12
    Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and presents (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  17
    A study of the personalization of spam content using Facebook public information.Enaitz Ezpeleta, Urko Zurutuza & José María Gómez Hidalgo - 2017 - Logic Journal of the IGPL 25 (1):30-41.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  7
    Novel email spam detection method using sentiment analysis and personality recognition.Enaitz Ezpeleta, Iñaki Velez de Mendizabal, José María Gómez Hidalgo & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (1):83-94.
    Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to validate the hypothesis that the identification of the email messages’ intention can be approached by sentiment analysis and personality recognition techniques. These techniques will provide new features that improve current spam classification techniques. We combine personality recognition and sentiment analysis techniques to analyse email content. We enrich (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  22
    Different approaches for the detection of SSH anomalous connections.S. González, Á Herrero, J. Sedano, Urko Zurutuza & E. Corchado - 2016 - Logic Journal of the IGPL 24 (1).