Listar Artículos de revista DIEC - IEKS Aldizkari artikuluak por autor UPNA "Izal Azcárate, Mikel"
Mostrando ítems 1-10 de 10
-
Computation of traffic time series for large populations of IoT devices
En este artículo se estudian las tecnicas para clasificar paquetes de tráfico de red en múltiples clases orientadas a la realización de series temporales de tráfico en escenarios de un elevado numero de clases como pueden ... -
Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
Ransomware is considered as a significant threat for home users and enterprises. In corporate scenarios, users’ computers usually store only system and program files, while all the documents are accessed from shared servers. ... -
Network simulation in a TCP-enabled industrial internet of things environment - reproducibility issues for performance evaluation
Network simulation is a tool used to analyse and predict the performance of Industrial Internet of Things deployments while dealing with the complexity of real testbeds. Large network deployments with complex protocols ... -
On the reduction of authoritative DNS cache timeouts: detection and implications for user privacy
The domain name system (DNS) is an Internet network service that is used by hosts to resolve IP addresses from symbolic names. This basic service has been attacked and abused many times, as it is one of the oldest and most ... -
Online classification of user activities using machine learning on network traffic
The daily deployment of new applications, along with the exponential increase in network traffic, entails a growth in the complexity of network analysis and monitoring. Conversely, the increasing availability and decreasing ... -
Open repository for the evaluation of ransomware detection tools
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of ... -
Ransomware early detection by the analysis of file sharing traffic
Crypto ransomware is a type of malware that locks access to user files by encrypting them and demands a ransom in order to obtain the decryption key. This type of malware has become a serious threat for most enterprises. ... -
Remote access protocols for Desktop-as-a-Service solutions
The use of remote desktop services on virtualized machines is a general trend to reduce the cost of desktop seats. Instead of assigning a physical machine with its operating system and software to each user, it is considerably ... -
A survey on detection techniques for cryptographic ransomware
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, ... -
Validation of HTTP response time from network traffic as an alternative to web browser instrumentation
The measurement of response time in hypertext transfer protocol (HTTP) requests is the most basic proxy measurement method for evaluating web browsing quality. It is used in the research literature and in application ...