Roberto Uribeetxeberria

Orcid: 0000-0003-2883-2485

According to our database1, Roberto Uribeetxeberria authored at least 15 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Industrial HMI Temporal Adaptation based on Operator-Machine Interaction Sequence Similarity.
Proceedings of the 22nd IEEE International Conference on Industrial Technology, 2021

An Adaptive Industrial Human-Machine Interface to Optimise Operators Working Performance.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2021

2020
Data-Driven Industrial Human-Machine Interface Temporal Adaptation for Process Optimization.
Proceedings of the 25th IEEE International Conference on Emerging Technologies and Factory Automation, 2020

2017
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends.
Secur. Commun. Networks, 2017

2016
Detection and Visualization of Android Malware Behavior.
J. Electr. Comput. Eng., 2016

Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016), 2016

On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2012
A method to construct network traffic models for process control systems.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

Reputation-based Intrusion Detection System for wireless sensor networks.
Proceedings of the Complexity in Engineering, 2012

2011
A Review of SCADA Anomaly Detection Systems.
Proceedings of the Soft Computing Models in Industrial and Environmental Applications, 2011

2010
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Understanding Honeypot Data by an Unsupervised Neural Visualization.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2008
A data mining approach for analysis of worm activity through automatic signature generation.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
Combined Data Mining Approach for Intrusion Detection.
Proceedings of the SECRYPT 2007, 2007


  Loading...