Roberto Uribeetxeberria
Roberto Uribeetxeberria
Verified email at
Cited by
Cited by
A review of SCADA anomaly detection systems
I Garitano, R Uribeetxeberria, U Zurutuza
Soft computing models in industrial and environmental applications, 6th …, 2011
Intrusion detection alarm correlation: a survey
U Zurutuza, R Uribeetxeberria
Proceedings of the IADAT international conference on telecommunications and …, 2004
Reputation-based intrusion detection system for wireless sensor networks
K Gerrigagoitia, R Uribeetxeberria, U Zurutuza, I Arenaza
2012 Complexity in Engineering (COMPENG). Proceedings, 1-5, 2012
A data mining approach for analysis of worm activity through automatic signature generation
U Zurutuza, R Uribeetxeberria, D Zamboni
Proceedings of the 1st ACM workshop on Workshop on AISec, 61-70, 2008
Detection and visualization of android malware behavior
O Somarriba, U Zurutuza, R Uribeetxeberria, L Delosières, ...
Journal of Electrical and Computer Engineering 2016, 2016
A method to construct network traffic models for process control systems
I Garitano, C Siaterlis, B Genge, R Uribeetxeberria, U Zurutuza
Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012
On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control
M Iturbe, J Camacho, I Garitano, U Zurutuza, R Uribeetxeberria
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Towards large-scale, heterogeneous anomaly detection systems in industrial networks: A survey of current trends
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
Security and Communication Networks 2017, 2017
Beacon frame spoofing attack detection in IEEE 802.11 networks
A Martínez, U Zurutuza, R Uribeetxeberria, M Fernández, J Lizarraga, ...
2008 Third International Conference on Availability, Reliability and …, 2008
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
VISIGRAPP (2: IVAPP), 101-108, 2016
Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology
A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria
CRC Press, 2017
Understanding honeypot data by an unsupervised neural visualization
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
Computational intelligence in security for information systems 2010, 151-160, 2010
Combined Data Mining Approach for Intrusion Detection.
U Zurutuza, R Uribeetxeberria, E Azketa, G Gil, J Lizarraga, M Fernández
SECRYPT, 67-73, 2007
Revisión del estado actual de la investigación en el uso de data mining para la detección de intrusiones
U Zurutuza, R Uribeetxeberria
Escuela Politécnica Superior de Mondragón, Departamento. Informática, 2005
Security in Embedded Systems
J Lizarraga, R Uribeetxeberria, U Zurutuza, M Fernández
Computer Science Department, Mondragon University, Spain, 2006
On the visualization of honeypot data through projection techniques
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
10th International Conference on Mathematical Methods in Science and …, 2010
Dynamic dns request monitoring of android applications via networking
O Somarriba, LCP Ramos, U Zurutuza, R Uribeetxeberria
2018 IEEE 38th Central America and Panama Convention (CONCAPAN XXXVIII), 1-6, 2018
Cyber physical system based proactive collaborative maintenance
G Papa, U Zurutuza, R Uribeetxeberria
2016 International Conference on Smart Systems and Technologies (SST), 173-178, 2016
Diseno de un banco de pruebas hıbrido para la investigacion de seguridad y resiliencia en redes industriales
M Iturbe, U Izagirre, I Garitano, I Arenaza-Nuno, U Zurutuza, ...
Proceedings of II Jornadas Nacionales de Investigación en Ciberseguridad …, 2016
Secu-audit: Continuous computer security auditing experiences
U Zurutuza, R Uribeetxeberria, J Lizarraga
Mondragon, Spain: Computer Science Department, Mondragon University, 2005
The system can't perform the operation now. Try again later.
Articles 1–20