![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
CISIS-ICEUTE 2022: Salamanca, Spain
- Pablo García Bringas, Hilde Pérez García
, Francisco Javier Martínez de Pisón
, José Ramón Villar Flecha
, Alicia Troncoso Lora
, Enrique A. de la Cal, Álvaro Herrero, Francisco Martínez-Álvarez
, Giuseppe Psaila, Héctor Quintián
, Emilio Corchado
:
International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022) - Proceedings, Salamanca, Spain, 5-7 September. Lecture Notes in Networks and Systems 532, Springer 2023, ISBN 978-3-031-18408-6
CISIS Applications
- Krzysztof Palczynski, Tomasz Andrysiak, Marcin Glowacki, Michal Kierul, Tomasz Kierul:
Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task. 3-11 - Souhila Badra Guendouzi
, Samir Ouchani
, Mimoun Malki
:
Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems. 12-21 - Roberto Viejo-López, Virginia Riego-Del Castillo, Lidia Sánchez-González
:
Hand SOS Gesture Detection by Computer Vision. 22-29 - Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection. 30-39 - Álvaro Michelena
, Francisco Zayas-Gato
, Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Oscar Fontenla-Romero
, José Luís Calvo-Rolle
:
An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids. 40-51 - Madiha Harrabi, Olfa Belkahla Driss
, Khaled Ghédira:
Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints. 52-61 - Nuño Basurto
, Álvaro Michelena
, Daniel Urda
, Héctor Quintián
, José Luís Calvo-Rolle
, Álvaro Herrero
:
Dimensionality-Reduction Methods for the Analysis of Web Traffic. 62-72
Special Session on Cybersecurity in Future Connected Societies
- Miguel Ángel González de la Torre, Luis Hernández Encinas
:
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call. 75-85 - Seiya Otsuka, Hiroki Iimori, Kengo Ando, Giuseppe Thadeu Freitas de Abreu, Koji Ishibashi, Naoki Ishikawa:
Analysis of Secret Key Agreement Protocol for Massive MIMO Systems. 86-94 - Guillermo Cotrina, Alberto Peinado, Andrés Ortiz
:
Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices. 95-103 - Óscar Castillo Campo, Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, Roberto Álvarez Fernández:
State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility. 104-113 - Luis Hernández-Álvarez
, Juan José Bullón Pérez, Araceli Queiruga Dios:
Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids. 114-124
Special Session on Cybersecurity and Trusted Supply Chains of ICT
- Rudolf Erdei, Daniela Delinschi
, Emil Pasca, Oliviu Matei:
Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication. 127-137 - Laura Pérez-Vilarelle
, Eva Sotos Martínez, Javier Yépez Martínez:
A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries. 138-148 - Alberto Miranda-García
, Ignacio Samuel Crespo-Martínez, Ángel Manuel Guerrero-Higueras, Vicente Matellán Olivera:
Evaluation of the Reliability Index of IP Addresses in Reputation Lists. 149-158 - Ovidiu Cosma, Petrica C. Pop
, Cosmin Sabo
, Laura Cosma:
Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models. 159-168
Special Session on Intelligent Solutions for Cybersecurity Systems
- Roberto Casado-Vara, Marcos Severt, Ángel Martín del Rey, Héctor Quintián
, José Luís Calvo-Rolle
:
Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery. 171-180 - Juan Carlos de la Torre
, José Miguel Aragón-Jurado
, Javier Jareño
, Sébastien Varrette
, Bernabé Dorronsoro
:
Obfuscating LLVM Intermediate Representation Source Code with NSGA-II. 181-191 - Francisco Álvarez-Terribas
, Roberto Magán-Carrión
, Gabriel Maciá-Fernández
, Antonio Miguel Mora García
:
A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study. 192-201
ICEUTE
- Daniel Urda
, Nuño Basurto
, Meelis Kull
, Álvaro Herrero
:
Evaluating Classifiers' Performance to Detect Attacks in Website Traffic. 205-215 - Álvaro Ovejero, Jesús Enrique Sierra-García, Matilde Santos:
Evaluation of an Interactive Guide for Robotics Self-learning. 216-223 - Antonio Manuel Durán-Rosal, David Guijo-Rubio, Víctor Manuel Vargas, Antonio M. Gómez-Orellana
, Pedro Antonio Gutiérrez, Juan Carlos Fernández
:
Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study. 224-235 - David Guijo-Rubio, Víctor Manuel Vargas, Javier Barbero-Gómez, Jose V. Die, Pablo González-Moreno:
Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks. 236-246 - Javier Parra-Domínguez
, Sergio Manzano, Susana Herrero, Pablo Chamoso
:
Digital Platforms for Education. The Case of e4you. 247-255 - Francisco Zayas-Gato
, Álvaro Michelena
, Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Elena Arce
, José Luís Calvo-Rolle
:
3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology. 256-265
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.