Exploració per tema "Computer security"
Ara es mostren els items 21-40 de 488
-
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
(Springer, 2011)
Text en actes de congrés
Accés restringit per política de l'editorialRecommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ... -
A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters
(2015)
Text en actes de congrés
Accés obertThe reliability of peers is very important for safe communication in Peer-to-Peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ... -
A study of security for web applications and APIs
(Universitat Politècnica de Catalunya, 2018-10)
Treball Final de Grau
Accés obertEstudio de las vunlerabilidades presentes en aplicaiones web -
A study on vulnerability assessment in a virtual corporate environment
(Universitat Politècnica de Catalunya, 2021-07-06)
Treball Final de Grau
Accés restringit per acord de confidencialitat -
Adding security and privacy to genomic information representation
(2019)
Article
Accés obertProvision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ... -
Adding security and privacy to genomic information representation
(IOS Press, 2019)
Comunicació de congrés
Accés obertProvision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ... -
Adversarial machine learning for cyber security
(Universitat Politècnica de Catalunya, 2022-04-25)
Projecte Final de Màster Oficial
Accés obertThis master thesis aims to take advantage of state of the art and tools that have been developed in Adversarial Machine Learning (AML) and related research branches to strengthen Machine Learning (ML) models used in cyber ... -
AI-assisted attack categorization, prediction, response recommendation & adaptation for specific use cases
(2023-05-18)
Altres
Accés obert -
Ajuda a una pime en matèria de Ciberseguretat
(Universitat Politècnica de Catalunya, 2020-01)
Treball Final de Grau
Accés restringit per acord de confidencialitat -
Almost IPP-codes or provably secure digital fingerprinting codes
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Text en actes de congrés
Accés restringit per política de l'editorialCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ... -
ALTAIR-SIGVI: un nuevo sistema para combatir el cibercrimen mitigando las vulnerabilidades = ALTAIR-SIGVI: mitigate vulnerabilities, a new way to work against cybercrime
(Universidad de Castilla La-Mancha, 2015)
Article
Accés obertUno de los retos a los que se enfrentan los administradores de sistemas informáticos hoy es el evitar que los recursos TIC que gestionan se usen para realizar ciberdelitos, o sufrir el impacto en sus propios servicios de ... -
Altair-T: Sistema de detección y gestión de amenazas sobre activos
(Universitat Politècnica de Catalunya, 2012-01-19)
Projecte/Treball Final de Carrera
Accés obertEl proyecto Altair-T consiste en el desarrollo e implantación de un framework centralizado para la detección y gestión de amenazas sobre activos mediante la integración de una herramienta de escaneo, un servicio de avisos ... -
Ampliació de funcionalitats de l'eina de ciberseguretat "Huntdown"
(Universitat Politècnica de Catalunya, 2023-01-24)
Treball Final de Grau
Accés obertEl continu increment d'atacs informàtics i l'augment del cibercrim té com a conseqüència, que cada cop més organitzacions i empreses pateixin per la confidencialitat, integritat i disponibilitat de les seves dades. Hi ha ... -
Ampliación Android del "MONO" packet capturer
(Universitat Politècnica de Catalunya, 2017-10-31)
Treball Final de Grau
Accés restringit per decisió de l'autorDigital Forensics can be defined as the use of scientific methods to find evidences in digital sources such as computers, tablets, mobile phones, databases, Network Interface Controllers (NICs), smart devices, etc. These ... -
An architecture for providing personalized digital health
(2023)
Article
Accés obertPatients need mechanisms to integrate health information coming from different sources, including personal devices. This would lead to Personalized Digital Health (PDH). HIPAMS (Health Information Protection And Management ... -
An IIoT based ICS to improve safety through fast and accurate hazard detection and differentiation
(Institute of Electrical and Electronics Engineers (IEEE), 2020-11-25)
Article
Accés obertSafety and security of Industrial Control Systems (ICS) applied in many critical infrastructures is essential. In these systems, hazards can be due either to system failure or cyber-attacks factors. Accurate hazard detection ... -
Analisis de seguridad de la red TOR
(Universitat Politècnica de Catalunya, 2018-10-31)
Treball Final de Grau
Accés obertThe TOR network aims at providing anonymity to those users of the Internet who do not want to reveal their identity when browsing specific contents. TOR is composed of a set of routers that make use of cryptography to apply ... -
Analysis and design of a model of OT control and supervision architectures in the field of industrial cybersecurity
(Universitat Politècnica de Catalunya, 2022-05-18)
Treball Final de Grau
Accés obertMoltes empreses han decidit aprofitar els avenços realitzats en l'àmbit dels entorns informàtics per millorar i optimitzar les seves capacitats de producció i/o serveis oferts. Tot i que es tracta d'un gran avenç tecnològic ... -
Analysis and implementation of a security standard
(Universitat Politècnica de Catalunya, 2021-07-01)
Projecte Final de Màster Oficial
Accés obert
Realitzat a/amb: Universitat de BarcelonaThis master's thesis describes the design and implementation of a security standard in a university research department. It has been developed in the framework of the ETSETB Master's Degree in Cybersecurity, in cooperation ... -
Analysis and improvement of security and privacy techniques for genomic information
(Universitat Politècnica de Catalunya, 2021-10-28)
Projecte Final de Màster Oficial
Accés obertThe purpose of this thesis is to review the current literature of privacy preserving techniques for genomic information on the last years. Based on the analysis, we propose a long-term classification system for the reviewed ...