Roberto Uribeetxeberria
Roberto Uribeetxeberria
Verified email at
TitleCited byYear
A review of SCADA anomaly detection systems
I Garitano, R Uribeetxeberria, U Zurutuza
Soft Computing Models in Industrial and Environmental Applications, 6th …, 2011
Intrusion detection alarm correlation: a survey
U Zurutuza, R Uribeetxeberria
Proceedings of the IADAT international conference on telecommunications and …, 2004
Reputation-based intrusion detection system for wireless sensor networks
K Gerrigagoitia, R Uribeetxeberria, U Zurutuza, I Arenaza
2012 Complexity in Engineering (COMPENG). Proceedings, 1-5, 2012
A data mining approach for analysis of worm activity through automatic signature generation
U Zurutuza, R Uribeetxeberria, D Zamboni
Proceedings of the 1st ACM workshop on Workshop on AISec, 61-70, 2008
Detection and visualization of android malware behavior
O Somarriba, U Zurutuza, R Uribeetxeberria, L Delosières, ...
Journal of Electrical and Computer Engineering 2016, 2016
A method to construct network traffic models for process control systems
I Garitano, C Siaterlis, B Genge, R Uribeetxeberria, U Zurutuza
Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012
Towards large-scale, heterogeneous anomaly detection systems in industrial networks: A survey of current trends
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
Security and Communication Networks 2017, 2017
On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control
M Iturbe, J Camacho, I Garitano, U Zurutuza, R Uribeetxeberria
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Beacon frame spoofing attack detection in IEEE 802.11 networks
A Martínez, U Zurutuza, R Uribeetxeberria, M Fernández, J Lizarraga, ...
2008 Third International Conference on Availability, Reliability and …, 2008
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
VISIGRAPP (2: IVAPP), 101-108, 2016
Understanding honeypot data by an unsupervised neural visualization
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
Computational intelligence in security for information systems 2010, 151-160, 2010
Combined Data Mining Approach for Intrusion Detection.
U Zurutuza, R Uribeetxeberria, E Azketa, G Gil, J Lizarraga, M Fernández
SECRYPT, 67-73, 2007
Revisión del estado actual de la investigación en el uso de data mining para la detección de intrusiones
U Zurutuza, R Uribeetxeberria
Escuela Politécnica Superior de Mondragón, Departamento. Informática, 2005
Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology
A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria
CRC Press, 2017
Security in Embedded Systems
J Lizarraga, R Uribeetxeberria, U Zurutuza, M Fernández
Computer Science Department, Mondragon University, Spain, 2006
On the visualization of honeypot data through projection techniques
Á Alonso, S Porras, E Ezpeleta, E Vergara, I Arenaza, R Uribeetxeberria, ...
10th International Conference on Mathematical Methods in Science and …, 2010
Diseno de un banco de pruebas hıbrido para la investigacion de seguridad y resiliencia en redes industriales
M Iturbe, U Izagirre, I Garitano, I Arenaza-Nuno, U Zurutuza, ...
Proceedings of II Jornadas Nacionales de Investigación en Ciberseguridad …, 2016
Secu-audit: Continuous computer security auditing experiences
U Zurutuza, R Uribeetxeberria, J Lizarraga
Mondragon, Spain: Computer Science Department, Mondragon University, 2005
A methodology for continuous computer security auditing
U Zurutuza, R Uribeetxeberria, J Lizarraga, IV De Mendizabal
e-Society 2004, 1024, 2004
Neural network space diversity combination and ring coding for multicarrier CDMA over fast fading channels
RA Carrasco, R Uribeetxeberria
IEE Proceedings-Communications 150 (2), 121-128, 2003
The system can't perform the operation now. Try again later.
Articles 1–20