Mario Vega-Barbas

Mario Vega-Barbas
Universidad Politécnica de Madrid | UPM · Departamento de Ingeniería Telemática y Electrónica

PhD in Applied Medical Technology (KTH-Royal Institute of Technology) + PhD in Telematics Engineering (Universidad Politécnica de Madrid)

About

44
Publications
15,047
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
483
Citations
Additional affiliations
March 2019 - present
Universidad Politécnica de Madrid
Position
  • Professor (Assistant)
March 2018 - present
Karolinska Institutet
Position
  • PostDoc Position
Description
  • Cloud Computing and Data Analysis
May 2017 - December 2017
KTH Royal Institute of Technology
Position
  • PostDoc Position
Education
April 2013 - May 2016
KTH Royal Institute of Technology
Field of study
  • Applied Medical Tecnology
October 2011 - December 2015
Universidad Politécnica de Madrid
Field of study
  • Computer Engineering
September 2002 - September 2008
University of Alcalá
Field of study
  • Lic., M.Sc.Eng

Publications

Publications (44)
Article
Full-text available
The increased use of wearables in recent years has fostered a great technological development in this area, although without the appropriate supervision usability may go first than security. In addition to this, the fact that wearables have been requiring more and more personal data from the user makes them attractive devices for an attacker. In th...
Article
The requirement of continuous risk assessment and management is attracting growing attention because of the need of keeping risk under control. Over the years, companies are dealing with a growing number of malicious actions coming from heterogeneous sources, so risk management must be dynamic in real-time to define action strategies and validate t...
Conference Paper
Full-text available
El incremento de uso de los wearables en los últimos años ha fomentado un desarrollo tecnológico en este ámbito que ha permitido la evolución de estos dispositivos a lo que actualmente conocemos. El hecho de que cada vez hayan ido requiriendo mayor cantidad de datos personales del usuario convierte a los wearables en dispositivos atractivos para un...
Conference Paper
Full-text available
Los avances en los campos de la Internet de las Cosas, el Reconocimiento del Habla y la Inteligencia Artificial han facilitado el desarrollo de los Asistentes Personales Inteligentes. Esta familia de aplicaciones y dispositivos permiten, a través de la voz, solicitar una amplia gama de tareas de manera natural e intuitiva. La enorme popularidad alc...
Conference Paper
Full-text available
Actualmente, la gestión de riesgos es vital en el entorno de ciberseguridad para cualquier empresa, ya que están constantemente bajo amenaza. Por ello, este proceso debe ser dinámico en tiempo real, con el objetivo de definir estrategias de actuación ante ataques, y debe abarcar fuentes heterogéneas, aprovechando sistemas basados en sensores para d...
Article
Full-text available
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users’ security and privacy have been compromised due to some weaknesses in connected devices and underl...
Article
Full-text available
Estimating the number of people present in a given venue in real-time is extremely useful from security, management, and resource optimization perspective. This article presents the architecture of a system based on the use ofWi-Fi sensor devices that allows estimating, almost in real-time, the number of people attending an event that is taking pla...
Article
Cybersecurity has been highlighted in recent years to protect information systems. Various methods, techniques, and tools have been used to make the most of the existing vulnerabilities of these systems. Therefore, it is essential to develop and improve new technologies, as well as intrusion detection systems to detect possible threats. However, th...
Article
Full-text available
Security in IoT networks is currently mandatory, due to the high amount of data that has to be handled. These systems are vulnerable to several cybersecurity attacks, which are increasing in number and sophistication. Due to this reason, new intrusion detection techniques have to be developed, being as accurate as possible for these scenarios. Intr...
Article
Full-text available
Las competencias digitales forman parte del currículum escolar, siendo una de ellas la programación. Este estudio se centra en el análisis del conocimiento científico disponible para la implantación que se ha llevado a cabo de Scratch en España para cumplir con los objetivos de aprendizaje de las competencias digitales. Se ha realizado un análisis...
Article
Full-text available
Currently, the use of machine learning models for developing intrusion detection systems is a technology trend which improvement has been proven. These intelligent systems are trained with labeled datasets, including different types of attacks and the normal behavior of the network. Most of the studies use a unique machine learning model, identifyi...
Conference Paper
Traditional static risk assessment and management are currently not enough in most of the scenarios where the cybersecurity context of an organization varies dynamically. New threats that may affect to the organization can appear, suspicious activity is detected, etc. These changes are not taken into account by a static risk assessment as it is car...
Conference Paper
The evolution of technologies in the sensors/actuators field, together with the improvement in mobile communications, has allowed the growth and consolidation of the Internet of Things concept. Among the current challenges in the scenarios based on this paradigm, it is possible to highlight those related to security and access control to informatio...
Article
Full-text available
New computational and technological paradigms that currently guide developments in the information society, i.e., Internet of things, pervasive technology, or Ubicomp, favor the appearance of new intrusion vectors that can directly affect people's daily lives. This, together with advances in techniques and methods used for developing new cyber-atta...
Article
Full-text available
Artificial intelligence algorithms have a leading role in the field of cybersecurity and attack detection, being able to present better results in some scenarios than classic intrusion detection systems such as Snort or Suricata. In this sense, this research focuses on the evaluation of characteristics for different well-established Machine Leaning...
Article
Full-text available
The increasing number of cyber-attacks, their potential destructive capabilities, and the enormous threat they pose for organizations, require the constant design and development of new, faster, and easier to use systems to address them. The automation of security enforcement systems is one of the most important techniques for enabling a fast respo...
Article
Full-text available
With the increasing complexity of cyberthreats, it is necessary to have tools to understand the changing context in real-time. This document will present architecture and a prototype designed to model the risk of administrative domains, exemplifying the case of a country in real-time, specifically, Spain. In order to carry out this task, a modeling...
Article
Full-text available
Our objective is to develop and validate a predictive model based on the random forest algorithm to estimate the readmission risk to an outpatient rheumatology clinic after discharge. We included patients from the Hospital Clínico San Carlos rheumatology outpatient clinic, from 1 April 2007 to 30 November 2016, and followed-up until 30 November 201...
Conference Paper
Full-text available
Los algoritmos de inteligencia artificial ya tienen un papel protagonista en el ámbito de la ciberseguridad y la detección de ataques, pudiendo presentar mejores resultados en algunos escenarios que sistemas de detección de intrusiones clásicos como Snort o Suricata. Dentro de los algoritmos de aprendizaje automático, este artículo se centra en la...
Chapter
This section contains lessons learnt mainly from several different projects funded by different private and public financiers. The projects were funded from Swedish national and European financiers. The project consortia had significantly different composition with both public and private partners being national, international or cross-national. Al...
Book
Life expectancy is increasing, and we are all expected to work for longer as a result. A balance must be found between the demands of work and human capabilities, and this makes the prevention of workplace-related health problems more important than ever. Emerging technologies, such as smart textiles, wearable devices, and the Internet of Things ha...
Article
Full-text available
Preventive healthcare has attracted much attention recently. Improving people's lifestyles and promoting a healthy diet and wellbeing are important, but the importance of work-related diseases should not be undermined. Musculoskeletal disorders (MSDs) are among the most common work-related health problems. Ergonomists already assess MSD risk factor...
Article
Full-text available
Emerging information and communication technologies are expected to foster new, efficient and accessible services for citizens, while guaranteeing the core principles of equality and privacy. Telehealth services are a clear example of a service in which technology can help enhance efficiency. The security of telehealth services is essential due to...
Conference Paper
Full-text available
An analysis of the costs related to the processes involved in a pathological analysis of a biopsy justifies the traditional view of digital pathology. However, this traditional conception has left aside another important aspect of this process, the writing of pathological reports. The efficiency and effectiveness of this subprocess has been raised...
Chapter
Full-text available
Life expectancy is increasing and population is aging significantly, which to keep the current social system sustainable pushes retirement age up. The fact, than more than 95% of world population has one or more conditions or health disorders makes the target of keeping people healthy and fit for work longer a difficult challenge. Especially consid...
Chapter
Full-text available
Intelligent environments are a natural tool for the creation of intelligent workplaces. However, in order to be used in this way, it is necessary to face the challenge posed by the variability of the elements included in the space and the need to adjust the smart elements to the preferences of the users. This paper presents a service-based architec...
Article
Full-text available
Smart spaces represent a powerful tool for deploying the new pervasive sensitive services based on Internet of Things products and developed in current Information Society close to users. Researchers have focused their efforts on new techniques to improve systems and products in this area but neglecting the human factors related to psychological as...
Chapter
Ubiquitous computing and pervasive technology represent enabling technologies which have conditioned the evolution of the current information society. These ICT are transforming society and particularly changing the interfacing methods between services and user as well as their expectations from services. Such changes are related to arising of new...
Article
Full-text available
Emerging pervasive technologies like smart textiles make it possible to develop new and more accessible healthcare services for patients independently of their location or time. However, none of these new e-health solutions guarantee a complete user acceptance, especially in cases requiring extensive interaction between the user and the solution. S...
Article
Full-text available
Smart spaces foster the development of natural and appropriate forms of human-computer interaction by taking advantage of home customization. The interaction potential of the Smart Home, which is a special type of smart space, is of particular interest in fields in which the acceptance of new technologies is limited and restrictive. The integration...
Conference Paper
Full-text available
Pervasive computing offers new scenarios where users are surrounded by invisible and proactive technology making smart spaces. Although the utility and power of solutions developed using this computer paradigm are proved, there are unresolved problems that hinder their acceptance and inclusion in our private life. Users have problems understanding...
Conference Paper
Full-text available
La computación ubicua se ha convertido en un paradigma de referencia para el diseño de espacios inteligentes y los desarrollos actuales en el campo de la inteligencia ambiental están cada vez más relacionados con el concepto de Internet de las Cosas y la Internet del Futuro. A pesar de que este paradigma ofrece soluciones verdaderamente rentables e...
Chapter
Full-text available
The paradigm of ubiquitous computing has become a reference for the design of Smart Spaces. Current trends in Ambient Intelligence are in-creasingly related to the scope of Internet of Things. This paradigm has the po-tential to support cost-effective solutions in the fields of telecare, e-health and Ambient Assisted Living. Nevertheless, ubiquitou...
Conference Paper
Full-text available
The presented work aims to contribute towards the standardization and the interoperability off the Future Internet through an open and scalable architecture design. We present S3OiA as a syntactic/semantic Service-Oriented Architecture that allows the integration of any type of object or device, not mattering their nature, on the Internet of Things...
Conference Paper
Full-text available
Resumen—El trabajo presentado pretende realizar una apor-tación hacia la estandarización y la interoperabilidad, a través de sistemas abiertos y accesibles, de los diferentes actores y tecnologías en el Internet del Futuro. Para ello se presenta S 3 OiA, una arquitectura orientada a servicios que permite integrar cualquier tipo de objeto o disposit...

Network

Cited By