Ara es mostren els items 21-40 de 488

    • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2011)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters 

      Liu, Yi; Elmazi, Donald; Sakamoto, Shinji; Barolli, Leonard; Xhafa Xhafa, Fatos; Uchida, Kazunori (2015)
      Text en actes de congrés
      Accés obert
      The reliability of peers is very important for safe communication in Peer-to-Peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ...
    • A study of security for web applications and APIs 

      Serrats Bayo, Jaume (Universitat Politècnica de Catalunya, 2018-10)
      Treball Final de Grau
      Accés obert
      Estudio de las vunlerabilidades presentes en aplicaiones web
    • A study on vulnerability assessment in a virtual corporate environment 

      Kanj Bongard, Alexandre (Universitat Politècnica de Catalunya, 2021-07-06)
      Treball Final de Grau
      Accés restringit per acord de confidencialitat
    • Adding security and privacy to genomic information representation 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia; Naro, Daniel (2019)
      Article
      Accés obert
      Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ...
    • Adding security and privacy to genomic information representation 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia; Naro, Daniel (IOS Press, 2019)
      Comunicació de congrés
      Accés obert
      Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ...
    • Adversarial machine learning for cyber security 

      Fonseca Núñez, Juan Esteban (Universitat Politècnica de Catalunya, 2022-04-25)
      Projecte Final de Màster Oficial
      Accés obert
      This master thesis aims to take advantage of state of the art and tools that have been developed in Adversarial Machine Learning (AML) and related research branches to strengthen Machine Learning (ML) models used in cyber ...
    • Ajuda a una pime en matèria de Ciberseguretat 

      Galcerán Porta, Marc (Universitat Politècnica de Catalunya, 2020-01)
      Treball Final de Grau
      Accés restringit per acord de confidencialitat
    • Almost IPP-codes or provably secure digital fingerprinting codes 

      Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Codes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ...
    • ALTAIR-SIGVI: un nuevo sistema para combatir el cibercrimen mitigando las vulnerabilidades = ALTAIR-SIGVI: mitigate vulnerabilities, a new way to work against cybercrime 

      Huerta Cerezuela, Víctor (Universidad de Castilla La-Mancha, 2015)
      Article
      Accés obert
      Uno de los retos a los que se enfrentan los administradores de sistemas informáticos hoy es el evitar que los recursos TIC que gestionan se usen para realizar ciberdelitos, o sufrir el impacto en sus propios servicios de ...
    • Altair-T: Sistema de detección y gestión de amenazas sobre activos 

      Berlanga Fuentes, Juan (Universitat Politècnica de Catalunya, 2012-01-19)
      Projecte/Treball Final de Carrera
      Accés obert
      El proyecto Altair-T consiste en el desarrollo e implantación de un framework centralizado para la detección y gestión de amenazas sobre activos mediante la integración de una herramienta de escaneo, un servicio de avisos ...
    • Ampliació de funcionalitats de l'eina de ciberseguretat "Huntdown" 

      Sánchez Mulero, David (Universitat Politècnica de Catalunya, 2023-01-24)
      Treball Final de Grau
      Accés obert
      El continu increment d'atacs informàtics i l'augment del cibercrim té com a conseqüència, que cada cop més organitzacions i empreses pateixin per la confidencialitat, integritat i disponibilitat de les seves dades. Hi ha ...
    • Ampliación Android del "MONO" packet capturer 

      Alvarez Calixto, Juan Bautista (Universitat Politècnica de Catalunya, 2017-10-31)
      Treball Final de Grau
      Accés restringit per decisió de l'autor
      Digital Forensics can be defined as the use of scientific methods to find evidences in digital sources such as computers, tablets, mobile phones, databases, Network Interface Controllers (NICs), smart devices, etc. These ...
    • An architecture for providing personalized digital health 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia (2023)
      Article
      Accés obert
      Patients need mechanisms to integrate health information coming from different sources, including personal devices. This would lead to Personalized Digital Health (PDH). HIPAMS (Health Information Protection And Management ...
    • An IIoT based ICS to improve safety through fast and accurate hazard detection and differentiation 

      Moradbeikie, Azin; Jamshidi, Kamal; Bohlooli, Ali; García Almiñana, Jordi; Masip Bruin, Xavier (Institute of Electrical and Electronics Engineers (IEEE), 2020-11-25)
      Article
      Accés obert
      Safety and security of Industrial Control Systems (ICS) applied in many critical infrastructures is essential. In these systems, hazards can be due either to system failure or cyber-attacks factors. Accurate hazard detection ...
    • Analisis de seguridad de la red TOR 

      Ballesteros Lopez, Ignacio (Universitat Politècnica de Catalunya, 2018-10-31)
      Treball Final de Grau
      Accés obert
      The TOR network aims at providing anonymity to those users of the Internet who do not want to reveal their identity when browsing specific contents. TOR is composed of a set of routers that make use of cryptography to apply ...
    • Analysis and design of a model of OT control and supervision architectures in the field of industrial cybersecurity 

      Pons Sales, Alexandre (Universitat Politècnica de Catalunya, 2022-05-18)
      Treball Final de Grau
      Accés obert
      Moltes empreses han decidit aprofitar els avenços realitzats en l'àmbit dels entorns informàtics per millorar i optimitzar les seves capacitats de producció i/o serveis oferts. Tot i que es tracta d'un gran avenç tecnològic ...
    • Analysis and implementation of a security standard 

      Hernández Vilalta, David (Universitat Politècnica de Catalunya, 2021-07-01)
      Projecte Final de Màster Oficial
      Accés obert
      Realitzat a/amb:   Universitat de Barcelona
      This master's thesis describes the design and implementation of a security standard in a university research department. It has been developed in the framework of the ETSETB Master's Degree in Cybersecurity, in cooperation ...
    • Analysis and improvement of security and privacy techniques for genomic information 

      García Perez, José Antonio (Universitat Politècnica de Catalunya, 2021-10-28)
      Projecte Final de Màster Oficial
      Accés obert
      The purpose of this thesis is to review the current literature of privacy preserving techniques for genomic information on the last years. Based on the analysis, we propose a long-term classification system for the reviewed ...