Urko Zurutuza
Urko Zurutuza
Verified email at mondragon.edu - Homepage
Cited by
Cited by
Crowdroid: behavior-based malware detection system for Android
I Burguera, U Zurutuza, S Nadjm-Tehrani
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
A review of SCADA anomaly detection systems
I Garitano, R Uribeetxeberria, U Zurutuza
Soft computing models in industrial and environmental applications, 6th …, 2011
A neural-visualization ids for honeynet data
A Herrero, U Zurutuza, E Corchado
International Journal of Neural Systems 22 (02), 1250005, 2012
Intrusion detection alarm correlation: a survey
U Zurutuza, R Uribeetxeberria
Proceedings of the IADAT international conference on telecommunications and …, 2004
Reputation-based Intrusion Detection System for wireless sensor networks
K Gerrigagoitia, R Uribeetxeberria, U Zurutuza, I Arenaza
2012 IEEE Workshop on Complexity in Engineering (COMPENG), 2012
Detection and visualization of android malware behavior
O Somarriba, U Zurutuza, R Uribeetxeberria, L Delosières, ...
Journal of Electrical and Computer Engineering 2016, 2016
Optimising maintenance: What are the expectations for cyber physical systems
E Jantunen, U Zurutuza, LL Ferreira, P Varga
2016 3rd International Workshop on Emerging Ideas and Trends in Engineering …, 2016
A data mining approach for analysis of worm activity through automatic signature generation
U Zurutuza, R Uribeetxeberria, D Zamboni
Proceedings of the 1st ACM workshop on Workshop on AISec, 61-70, 2008
Does sentiment analysis help in bayesian spam filtering?
E Ezpeleta, U Zurutuza, JMG Hidalgo
International Conference on Hybrid Artificial Intelligence Systems, 79-90, 2016
Towards large-scale, heterogeneous anomaly detection systems in industrial networks: A survey of current trends
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
Security and Communication Networks 2017, 2017
The way cyber physical systems will revolutionise maintenance
E Jantunen, U Zurutuza, M Albano, G di Orio, P Maló, C Hegedus
30th Conference on Condition Monitoring and Diagnostic Engineering Management, 2017
A method to construct network traffic models for process control systems
I Garitano, C Siaterlis, B Genge, R Uribeetxeberria, U Zurutuza
Proceedings of 2012 IEEE 17th International Conference on Emerging …, 2012
Resource footprint of a manycast protocol implementation on multiple mobile platforms
EJ Vergara, S Nadjm-Tehrani, M Asplund, U Zurutuza
Next Generation Mobile Applications, Services and Technologies (NGMAST …, 2011
Beacon frame spoofing attack detection in IEEE 802.11 networks
A Martínez, U Zurutuza, R Uribeetxeberria, M Fernández, J Lizarraga, ...
2008 Third International Conference on Availability, Reliability and …, 2008
On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control
M Iturbe, J Camacho, I Garitano, U Zurutuza, R Uribeetxeberria
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting.
M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria
VISIGRAPP (2: IVAPP), 101-108, 2016
Visualization of misuse-based intrusion detection: Application to honeynet data
U Zurutuza, E Ezpeleta, Á Herrero, E Corchado
Soft Computing Models in Industrial and Environmental Applications, 6th …, 2011
A study of the personalization of spam content using facebook public information
E Ezpeleta, U Zurutuza, JMG Hidalgo
Logic Journal of the IGPL 25 (1), 30-41, 2017
Using personality recognition techniques to improve Bayesian spam filtering
E Ezpeleta, U Zurutuza, JMG Hidalgo
Procesamiento del Lenguaje Natural 57, 125-132, 2016
Short messages spam filtering using personality recognition
E Ezpeleta, U Zurutuza, JMG Hidalgo
Proceedings of the 4th Spanish Conference on Information Retrieval, 1-7, 2016
The system can't perform the operation now. Try again later.
Articles 1–20