
Mario Vega-BarbasUniversidad Politécnica de Madrid | UPM · Departamento de Ingeniería Telemática y Electrónica
Mario Vega-Barbas
PhD in Applied Medical Technology (KTH-Royal Institute of Technology) + PhD in Telematics Engineering (Universidad Politécnica de Madrid)
About
44
Publications
15,047
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
483
Citations
Introduction
Additional affiliations
March 2019 - present
March 2018 - present
May 2017 - December 2017
Education
April 2013 - May 2016
October 2011 - December 2015
September 2002 - September 2008
Publications
Publications (44)
The increased use of wearables in recent years has fostered a great technological development in this area, although without the appropriate supervision usability may go first than security. In addition to this, the fact that wearables have been requiring more and more personal data from the user makes them attractive devices for an attacker. In th...
The requirement of continuous risk assessment and management is attracting growing attention because of the need of keeping risk under control. Over the years, companies are dealing with a growing number of malicious actions coming from heterogeneous sources, so risk management must be dynamic in real-time to define action strategies and validate t...
El incremento de uso de los wearables en los últimos años ha fomentado un desarrollo tecnológico en este ámbito que ha permitido la evolución de estos dispositivos a lo que actualmente conocemos. El hecho de que cada vez hayan ido requiriendo mayor cantidad de datos personales del usuario convierte a los wearables en dispositivos atractivos para un...
Los avances en los campos de la Internet de las Cosas, el Reconocimiento del Habla y la Inteligencia Artificial han facilitado el desarrollo de los Asistentes Personales Inteligentes. Esta familia de aplicaciones y dispositivos permiten, a través de la voz, solicitar una amplia gama de tareas de manera natural e intuitiva. La enorme popularidad alc...
Actualmente, la gestión de riesgos es vital en el entorno de ciberseguridad para cualquier empresa, ya que están constantemente bajo amenaza. Por ello, este proceso debe ser dinámico en tiempo real, con el objetivo de definir estrategias de actuación ante ataques, y debe abarcar fuentes heterogéneas, aprovechando sistemas basados en sensores para d...
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users’ security and privacy have been compromised due to some weaknesses in connected devices and underl...
Estimating the number of people present in a given venue in real-time is extremely useful
from security, management, and resource optimization perspective. This article presents the architecture of a system based on the use ofWi-Fi sensor devices that allows estimating, almost in real-time, the number of people attending an event that is taking pla...
Cybersecurity has been highlighted in recent years to protect information systems. Various methods, techniques, and tools have been used to make the most of the existing vulnerabilities of these systems. Therefore, it is essential to develop and improve new technologies, as well as intrusion detection systems to detect possible threats. However, th...
Security in IoT networks is currently mandatory, due to the high amount of data that has to be handled. These systems are vulnerable to several cybersecurity attacks, which are increasing in number and sophistication. Due to this reason, new intrusion detection techniques have to be developed, being as accurate as possible for these scenarios. Intr...
Las competencias digitales forman parte del currículum escolar, siendo una de ellas la programación. Este estudio se centra en el análisis del conocimiento científico disponible para la implantación que se ha llevado a cabo de Scratch en España para cumplir con los objetivos de aprendizaje de las competencias digitales. Se ha realizado un análisis...
Currently, the use of machine learning models for developing intrusion detection systems is a technology trend which improvement has been proven. These intelligent systems are trained with labeled datasets, including different types of attacks and the normal behavior of the network. Most of the studies use a unique machine learning model, identifyi...
Traditional static risk assessment and management are currently not enough in most of the scenarios where the cybersecurity context of an organization varies dynamically. New threats that may affect to the organization can appear, suspicious activity is detected, etc. These changes are not taken into account by a static risk assessment as it is car...
The evolution of technologies in the sensors/actuators field, together with the improvement in mobile communications, has allowed the growth and consolidation of the Internet of Things concept. Among the current challenges in the scenarios based on this paradigm, it is possible to highlight those related to security and access control to informatio...
New computational and technological paradigms that currently guide developments in the information society, i.e., Internet of things, pervasive technology, or Ubicomp, favor the appearance of new intrusion vectors that can directly affect people's daily lives. This, together with advances in techniques and methods used for developing new cyber-atta...
Artificial intelligence algorithms have a leading role in the field of cybersecurity and attack detection, being able to present better results in some scenarios than classic intrusion detection systems such as Snort or Suricata. In this sense, this research focuses on the evaluation of characteristics for different well-established Machine Leaning...
The increasing number of cyber-attacks, their potential destructive capabilities, and the enormous threat they pose for organizations, require the constant design and development of new, faster, and easier to use systems to address them. The automation of security enforcement systems is one of the most important techniques for enabling a fast respo...
With the increasing complexity of cyberthreats, it is necessary to have tools to understand the changing context in real-time. This document will present architecture and a prototype designed to model the risk of administrative domains, exemplifying the case of a country in real-time, specifically, Spain. In order to carry out this task, a modeling...
Our objective is to develop and validate a predictive model based on the random forest algorithm to estimate the readmission risk to an outpatient rheumatology clinic after discharge. We included patients from the Hospital Clínico San Carlos rheumatology outpatient clinic, from 1 April 2007 to 30 November 2016, and followed-up until 30 November 201...
Los algoritmos de inteligencia artificial ya tienen un papel protagonista en el ámbito de la ciberseguridad y la detección de ataques, pudiendo presentar mejores resultados en algunos escenarios que sistemas de detección de intrusiones clásicos como Snort o Suricata. Dentro de los algoritmos de aprendizaje automático, este artículo se centra en la...
This section contains lessons learnt mainly from several different projects funded by different private and public financiers. The projects were funded from Swedish national and European financiers. The project consortia had significantly different composition with both public and private partners being national, international or cross-national. Al...
Life expectancy is increasing, and we are all expected to work for longer as a result. A balance must be found between the demands of work and human capabilities, and this makes the prevention of workplace-related health problems more important than ever. Emerging technologies, such as smart textiles, wearable devices, and the Internet of Things ha...
Preventive healthcare has attracted much attention recently. Improving people's lifestyles and promoting a healthy diet and wellbeing are important, but the importance of work-related diseases should not be undermined. Musculoskeletal disorders (MSDs) are among the most common work-related health problems. Ergonomists already assess MSD risk factor...
Emerging information and communication technologies are expected to foster new, efficient and accessible services for citizens, while guaranteeing the core principles of equality and privacy. Telehealth services are a clear example of a service in which technology can help enhance efficiency. The security of telehealth services is essential due to...
An analysis of the costs related to the processes involved in a pathological analysis of a biopsy justifies the traditional view of digital pathology. However, this traditional conception has left aside another important aspect of this process, the writing of pathological reports. The efficiency and effectiveness of this subprocess has been raised...
Life expectancy is increasing and population is aging significantly, which to keep the current social system sustainable pushes retirement age up. The fact, than more than 95% of world population has one or more conditions or health disorders makes the target of keeping people healthy and fit for work longer a difficult challenge. Especially consid...
Intelligent environments are a natural tool for the creation of intelligent workplaces. However, in order to be used in this way, it is necessary to face the challenge posed by the variability of the elements included in the space and the need to adjust the smart elements to the preferences of the users. This paper presents a service-based architec...
Smart spaces represent a powerful tool for deploying the new pervasive sensitive services based on Internet of Things products and developed in current Information Society close to users. Researchers have focused their efforts on new techniques to improve systems and products in this area but neglecting the human factors related to psychological as...
Ubiquitous computing and pervasive technology represent enabling technologies which have conditioned the evolution of the current information society. These ICT are transforming society and particularly changing the interfacing methods between services and user as well as their expectations from services. Such changes are related to arising of new...
Emerging pervasive technologies like smart textiles make it possible to develop new and more accessible healthcare services for patients independently of their location or time. However, none of these new e-health solutions guarantee a complete user acceptance, especially in cases requiring extensive interaction between the user and the solution. S...
Smart spaces foster the development of natural and appropriate forms of human-computer interaction by taking advantage of home customization. The interaction potential of the Smart Home, which is a special type of smart space, is of particular interest in fields in which the acceptance of new technologies is limited and restrictive. The integration...
Pervasive computing offers new scenarios where users are surrounded by invisible and proactive technology making smart spaces. Although the utility and power of solutions developed using this computer paradigm are proved, there are unresolved problems that hinder their acceptance and inclusion in our private life. Users have problems understanding...
La computación ubicua se ha convertido en un paradigma de referencia para el diseño de espacios inteligentes y los desarrollos actuales en el campo de la inteligencia ambiental están cada vez más relacionados con el concepto de Internet de las Cosas y la Internet del Futuro. A pesar de que este paradigma ofrece soluciones verdaderamente rentables e...
The paradigm of ubiquitous computing has become a reference for the design of Smart Spaces. Current trends in Ambient Intelligence are in-creasingly related to the scope of Internet of Things. This paradigm has the po-tential to support cost-effective solutions in the fields of telecare, e-health and Ambient Assisted Living. Nevertheless, ubiquitou...
The presented work aims to contribute towards the standardization and the interoperability off the Future Internet through an open and scalable architecture design. We present S3OiA as a syntactic/semantic Service-Oriented Architecture that allows the integration of any type of object or device, not mattering their nature, on the Internet of Things...
Resumen—El trabajo presentado pretende realizar una apor-tación hacia la estandarización y la interoperabilidad, a través de sistemas abiertos y accesibles, de los diferentes actores y tecnologías en el Internet del Futuro. Para ello se presenta S 3 OiA, una arquitectura orientada a servicios que permite integrar cualquier tipo de objeto o disposit...