Roberto Uribeetxeberria
Roberto Uribeetxeberria
Verified email at
Cited by
Cited by
A review of SCADA anomaly detection systems
I Garitano, R Uribeetxeberria, U Zurutuza
Soft computing models in industrial and environmental applications, 6th …, 2011
Intrusion detection alarm correlation: a survey
U Zurutuza, R Uribeetxeberria
Proceedings of IADAT International Conference on Telecommunications and …, 2004
Reputation-based intrusion detection system for wireless sensor networks
K Gerrigagoitia, R Uribeetxeberria, U Zurutuza, I Arenaza
2012 Complexity in Engineering (COMPENG). Proceedings, 1-5, 2012
Detection and visualization of android malware behavior
O Somarriba, U Zurutuza, R Uribeetxeberria, L Delosières, ...
Journal of Electrical and Computer Engineering 2016, 2016
A data mining approach for analysis of worm activity through automatic signature generation
U Zurutuza, R Uribeetxeberria, D Zamboni
Proceedings of the 1st ACM workshop on Workshop on AISec, 61-70, 2008
Towards large-scale, heterogeneous anomaly detection systems in industrial networks: A survey of current trends
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
Security and Communication Networks 2017, 2017
On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control
M Iturbe, J Camacho, I Garitano, U Zurutuza, R Uribeetxeberria
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
A method to construct network traffic models for process control systems
I Garitano, C Siaterlis, B Genge, R Uribeetxeberria, U Zurutuza
Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012
Beacon frame spoofing attack detection in IEEE 802.11 networks
A Martínez, U Zurutuza, R Uribeetxeberria, M Fernández, J Lizarraga, ...
2008 Third International Conference on Availability, Reliability and …, 2008
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
VISIGRAPP (2: IVAPP), 101-108, 2016
Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology
A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria
CRC Press, 2017
Understanding honeypot data by an unsupervised neural visualization
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
Computational intelligence in security for information systems 2010, 151-160, 2010
Combined Data Mining Approach for Intrusion Detection.
U Zurutuza, R Uribeetxeberria, E Azketa, G Gil, J Lizarraga, M Fernández
SECRYPT, 67-73, 2007
Security in embedded systems
J Lizarraga, R Uribeetxeberria, U Zurutuza, M Fernández
Computer Science Department, Mondragon University, Spain, 2006
Revisión del estado actual de la investigación en el uso de data mining para la detección de intrusiones
U Zurutuza, R Uribeetxeberria
Escuela Politécnica Superior de Mondragón, Departamento. Informática, 2005
Data-driven industrial human-machine interface temporal adaptation for process optimization
D Reguera-Bakhache, I Garitano, R Uribeetxeberria, C Cernuda, ...
2020 25th IEEE International Conference on Emerging Technologies and Factory …, 2020
Cyber physical system based proactive collaborative maintenance
G Papa, U Zurutuza, R Uribeetxeberria
2016 International Conference on Smart Systems and Technologies (SST), 173-178, 2016
On the visualization of honeypot data through projection techniques
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
10th International Conference on Mathematical Methods in Science and …, 2010
Dynamic dns request monitoring of android applications via networking
O Somarriba, LCP Ramos, U Zurutuza, R Uribeetxeberria
2018 IEEE 38th Central America and Panama Convention (CONCAPAN XXXVIII), 1-6, 2018
Diseno de un banco de pruebas hıbrido para la investigacion de seguridad y resiliencia en redes industriales
M Iturbe, U Izagirre, I Garitano, I Arenaza-Nuno, U Zurutuza, ...
Proceedings of II Jornadas Nacionales de Investigación en Ciberseguridad …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20