Now showing items 21-32 of 32

    • Machine Learning for malware detection and classification 

      Bruna Moralejo, Lourdes (Universitat Politècnica de Catalunya, 2023-07-03)
      Master thesis
      Open Access
      Malware is any intrusive program that exploits system vulnerabilities on a computing system. A malware infection can be disastrous for any organization. It can cripple networks and systems, as well as destroy, delete, ...
    • Modelos de predicción del precio de Bitcoin mediante algoritmos de Machine Learning 

      Jimenez Bujalance, Eric (Universitat Politècnica de Catalunya, 2022-10-21)
      Bachelor thesis
      Open Access
      Bitcoin was the origin of the cryptocurrency market in 2008, when a technical document was presented under the pseudonym "Satoshi Nakamoto", in which the concept, characteristics and vision of this cryptocurrency were set ...
    • Módulo de entrada para sistemas middleware HL7 

      Teruel Luceno, Antonio (Universitat Politècnica de Catalunya, 2015-09-22)
      Bachelor thesis
      Open Access
      In hospital centers, informatic systems are of paramount importance in order to trace patients and register their medical tests and diagnostics. However, it is frequently very hard to integrate systems from different ...
    • On the security of the IEEE 802.11 fine time measurement (FTM) protocol 

      Huacho Flores, Franks Jonathan (Universitat Politècnica de Catalunya, 2024-07-15)
      Master thesis
      Restricted access - confidentiality agreement
      Wi-Fi has been widely deployed around the world for more than 2 decades, and across that amount of time, the standard continues to improve in terms of bandwidth, security, etc. In 2016, the 802.11mc standard, also known ...
    • PBFT-based consensus algorithms for blockchain: a case study 

      Hernández López, David (Universitat Politècnica de Catalunya, 2020-07-20)
      Master thesis
      Open Access
      Blockchain technology is an emerging and innovative technology that came out more than 10 years ago with the appearance of Bitcoin. Blockchain allows for a distributed monetary in which no central entity exists and where ...
    • Performance evaluation of cooperative sensing mechanisms in cognitive radio networks 

      Quesada Gordo, Kilian (Universitat Politècnica de Catalunya, 2015-09-22)
      Bachelor thesis
      Open Access
      C ognitive radio networks consist of intelligent devices that perform continuo us monitoring of the RF spectrum to locate and use frequency bands that are temporarily free . That is , those bands used ...
    • Seguretat en dispositius IoT 

      Hermoso Juste, Meritxell (Universitat Politècnica de Catalunya, 2023-10-30)
      Bachelor thesis
      Restricted access - confidentiality agreement
      This project is based on the viable and secure integration of a set of IoT devices into the network of an insurance company. Being a double degree work in Telecommunication Systems Engineering and Telematics Engineering, ...
    • Seguretat en sistemes SCADA en aeroports 

      Zubiaurre Alias, Gorka (Universitat Politècnica de Catalunya, 2021-07-27)
      Bachelor thesis
      Open Access
      Airports are critical facilities mostly controlled by SCADA systems, which can be vulnerable to cyberattacks if not properly protected. In this document, we present an analysis of such systems from the security point of ...
    • Seguridad en redes de sensores 

      Frago Alvarez, Ivan (Universitat Politècnica de Catalunya, 2017-07-13)
      Bachelor thesis
      Open Access
      Wireless sensor networks are rapidly expanding due to advances in wireless technologies but also due to their multiple applications in different fields, such as monitoring processes in industrial environments, monitoring ...
    • Software use & integration in CI/CD to reduce vulnerabilites and perform work/stress load 

      Fraga Lobato, Manuel (Universitat Politècnica de Catalunya, 2022-07-14)
      Bachelor thesis
      Open Access
      Covenantee:   Giesecke & Devrient
      This final degree project deals with the use of tools in order to find security vulnerabilities and performance limitations in order to make applications more robust and solid against attacks. In addition, it also explains ...
    • Study of consensus protocols and improvement of the Federated Byzantine Agreement (FBA) algorithm 

      Zoi, Aspasia (Universitat Politècnica de Catalunya, 2019-10)
      Master thesis
      Open Access
      At a present time, it has been proven that blockchain technology has influenced to a great extent the way of human interaction in a digital world. The operation of the blockchain systems allows the peers to implement digital ...
    • Técnicas de machine learning para detección de intrusos en redes 

      López Donoso, Sheila (Universitat Politècnica de Catalunya, 2021-07-15)
      Bachelor thesis
      Restricted access - author's decision
      Cyberattacks are sets of actions directed against information systems that operate on the network, canceling their services. With the increasing complexity of websites and the rapid development of applications today, the ...