Urko Zurutuza

Orcid: 0000-0003-3720-6048

Affiliations:
  • Mondragon University, Department of Electronics and Computing, Faculty of Engineering, Spain


According to our database1, Urko Zurutuza authored at least 54 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey.
Int. J. Crit. Infrastructure Prot., September, 2023

Multi-objective evolutionary optimization for dimensionality reduction of texts represented by synsets.
PeerJ Comput. Sci., 2023

Deobfuscating Leetspeak With Deep Learning to Improve Spam Filtering.
Int. J. Interact. Multim. Artif. Intell., 2023

Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks.
Comput. Secur., 2023

Federated Explainability for Network Anomaly Characterization.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
A practical and synchronized data acquisition network architecture for industrial robot predictive maintenance in manufacturing assembly lines.
Robotics Comput. Integr. Manuf., 2022

Methodology for data-driven predictive maintenance models design, development and implementation on manufacturing guided by domain knowledge.
Int. J. Comput. Integr. Manuf., 2022

Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects.
Appl. Intell., 2022

2021
Towards manufacturing robotics accuracy degradation assessment: A vision-based data-driven implementation.
Robotics Comput. Integr. Manuf., 2021

An Adaptive Industrial Human-Machine Interface to Optimise Operators Working Performance.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2021

2020
SDRS: A new lossless dimensionality reduction for text corpora.
Inf. Process. Manag., 2020

Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.
Log. J. IGPL, 2020

Novel email spam detection method using sentiment analysis and personality recognition.
Log. J. IGPL, 2020

Deep learning models for predictive maintenance: a survey, comparison, challenges and prospect.
CoRR, 2020

Interpreting Remaining Useful Life estimations combining Explainable Artificial Intelligence and domain knowledge in industrial machinery.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Data-Driven Industrial Human-Machine Interface Temporal Adaptation for Process Optimization.
Proceedings of the 25th IEEE International Conference on Emerging Technologies and Factory Automation, 2020

2019
A Big Data implementation of the MANTIS reference architecture for predictive maintenance.
J. Syst. Control. Eng., 2019

Analyze, Sense, Preprocess, Predict, Implement, and Deploy (ASPPID): An incremental methodology based on data analytics for cost-efficiently monitoring the industry 4.0.
Eng. Appl. Artif. Intell., 2019

An Attribute Oriented Induction based Methodology for Data Driven Predictive Maintenance.
CoRR, 2019

Who's There? Evaluating Data Source Integrity and Veracity in IIoT Using Multivariate Statistical Process Control.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Remote maintenance support with the aid of cyber-physical systems and cloud technology.
J. Syst. Control. Eng., 2018

A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection.
Proceedings of the Hybrid Artificial Intelligent Systems - 13th International Conference, 2018

Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance.
Proceedings of the 5th International Conference on Control, 2018

2017
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends.
Secur. Commun. Networks, 2017

Short Messages Spam Filtering Combining Personality Recognition and Sentiment Analysis.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2017

A study of the personalization of spam content using Facebook public information.
Log. J. IGPL, 2017

Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems.
Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, 2017

Novel Comment Spam Filtering Method on Youtube: Sentiment Analysis and Personality Recognition.
Proceedings of the Current Trends in Web Engineering, 2017

2016
Using Personality Recognition Techniques to Improve Bayesian Spam Filtering.
Proces. del Leng. Natural, 2016

Detection and Visualization of Android Malware Behavior.
J. Electr. Comput. Eng., 2016

Different approaches for the detection of SSH anomalous connections.
Log. J. IGPL, 2016

Short Messages Spam Filtering Using Sentiment Analysis.
Proceedings of the Text, Speech, and Dialogue - 19th International Conference, 2016

Does Sentiment Analysis Help in Bayesian Spam Filtering?
Proceedings of the Hybrid Artificial Intelligent Systems - 11th International Conference, 2016

Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016), 2016

On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Optimising maintenance: What are the expectations for Cyber Physical Systems.
Proceedings of the 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems, 2016

Short Messages Spam Filtering Using Personality Recognition.
Proceedings of the 4th Spanish Conference on Information Retrieval, 2016

2015
An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information.
Proceedings of the International Joint Conference, 2015

2013
Classification of SSH Anomalous Connections.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

2012
A Neural-Visualization IDS for Honeynet Data.
Int. J. Neural Syst., 2012

A method to construct network traffic models for process control systems.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

Reputation-based Intrusion Detection System for wireless sensor networks.
Proceedings of the Complexity in Engineering, 2012

2011
Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data.
Proceedings of the Soft Computing Models in Industrial and Environmental Applications, 2011

A Review of SCADA Anomaly Detection Systems.
Proceedings of the Soft Computing Models in Industrial and Environmental Applications, 2011

Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms.
Proceedings of the 5th International Conference on Next Generation Mobile Applications, 2011

Crowdroid: behavior-based malware detection system for Android.
Proceedings of the SPSM'11, 2011

2010
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

Understanding Honeypot Data by an Unsupervised Neural Visualization.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
Clustering of Windows Security Events by Means of Frequent Pattern Mining.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
A data mining approach for analysis of worm activity through automatic signature generation.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
Combined Data Mining Approach for Intrusion Detection.
Proceedings of the SECRYPT 2007, 2007


  Loading...