Author of the publication

Different approaches for the detection of SSH anomalous connections.

, , , , and . Logic Journal of the IGPL, 24 (1): 104-114 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zurutuza, Urko
add a person with the name Zurutuza, Urko
 

Other publications of authors with the same name

Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms., , , and . NGMAST, page 154-160. IEEE, (2011)Optimising maintenance: What are the expectations for Cyber Physical Systems., , , and . CoRR, (2019)Crowdroid: behavior-based malware detection system for Android., , and . SPSM@CCS, page 15-26. ACM, (2011)A Review of SCADA Anomaly Detection Systems., , and . SOCO, volume 87 of Advances in Intelligent and Soft Computing, page 357-366. Springer, (2011)A Neural-Visualization IDS for Honeynet Data., , and . Int. J. Neural Syst., (2012)A method to construct network traffic models for process control systems., , , , and . ETFA, page 1-8. IEEE, (2012)Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends., , , and . Security and Communication Networks, (2017)A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection., , , , and . HAIS, volume 10870 of Lecture Notes in Computer Science, page 514-525. Springer, (2018)Does Sentiment Analysis Help in Bayesian Spam Filtering?, , and . HAIS, volume 9648 of Lecture Notes in Computer Science, page 79-90. Springer, (2016)Detection and Visualization of Android Malware Behavior., , , , and . J. Electrical and Computer Engineering, (2016)