Roberto Uribeetxeberria

Roberto Uribeetxeberria
  • Mondragon University

About

44
Publications
36,186
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
361
Citations
Current institution
Mondragon University

Publications

Publications (44)
Conference Paper
Adaptive User Interfaces (AUI) have the potentialto deliver advantageous solutions for a wide range of industrial applications. Their ability to adapt to operator interaction patterns and achieve a more personalised interaction can lead to greater efficiency and productivity in the manufacturing process. However, in certain industrial contexts mult...
Conference Paper
The incorporation of Artificial Intelligence (AI) into Industrial Environments has brought about a Smart Industry revolution, improving efficiency and simplifying complex industrial processes. However, these technological advances remain primarily focused on the process, and pay little attention to industrial Human-Machine Interfaces (HMI), the bri...
Conference Paper
The application of Artificial Intelligence (AI) into Industrial Human-Machine Interfaces (HMIs) moved old systems with physical buttons and analogue actuators into adaptive interaction models and context-based self adjusted interfaces. To date, little attention has been paid to industrial Human-Machine Interfaces (HMI) which play a vital role in th...
Chapter
Full-text available
New technologies are being developed towards Industry 4.0 such as the establishment of smart factories, smart products and smart services embedded in an internet of things and of services. As a result, the development of prognostic and collaborative technologies have become a necessity. New technological solutions that can make the best use of exis...
Book
Full-text available
We are at the beginning of a new age of business, where dynamic interaction is the driving force for whatever kind of business. To draw from a known analogy, “bring your own device” (BYOD) exemplifes the trends of devices accessing processes and information on enterprises. In the upcoming years, not only phones, tablets, and computers will demand a...
Article
Full-text available
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as such, IN protection is an active research field. Among different types of security solutions, IN Anomaly Detection Systems (ADSs)...
Article
Full-text available
Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As such, anomaly detection has been an active research field to ensure CI normal operation. Previous approaches have leveraged network level data for anomaly detection, or have disregarded the existence of process disturbances, thus opening the possibility of m...
Preprint
Full-text available
Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As such, anomaly detection has been an active research field to ensure CI normal operation. Previous approaches have leveraged network level data for anomaly detection, or have disregarded the existence of process disturbances, thus opening the possibility of m...
Conference Paper
The aim of the MANTIS project is to provide a proactive maintenance service platform architecture based on Cyber Physical Systems. The platform will allow estimating future performance, predicting and preventing imminent failures and scheduling proactive maintenance. Maintenance is an important element that creates added value in the business proce...
Article
Full-text available
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious applications targeting Android devices raises the demand for analyzing them to find where the malcode is triggered when user int...
Conference Paper
The European project called Arrowhead addresses efficiency and flexibility at a global scale by means of collaborative automation for several domains. The multi-billion device/service perspective places a very strong demand on the interoperability and integrality of devices and services provided by the multitude of players in the market place. We a...
Conference Paper
Full-text available
Las Infraestructuras Críticas (ICs) de hoy en día se basan en las Tecnologías de la Información y Comunicación (TIC). Debido a la simplicidad y al ratio eficiencia-coste de las TIC, los Sistemas de Control y Adquisición de Datos (SCADA) han encontrado su camino en los Sistemas de Control de Procesos (SCPs) mediante el uso de hardware y software est...
Conference Paper
Full-text available
Nowadays, it is a well-known fact that modern Critical Infrastructures (CIs) depend on Information and Communication Technologies (ICT). Supervisory Control and Data Acquisition (SCADA) systems with off-the-shelf ICT hardware and software found their way in Process Control Systems (PCSs) due to their simplicity and cost-efficiency. However, recent...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area...
Conference Paper
Full-text available
n this work a comparison of the SURF and MU-SURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in counting correspondences and correct matches between ten image pairs. Image pairs have different transformations (rotation, scale c...
Conference Paper
Full-text available
The security of critical infrastructures is decreasing due to the apparition of new cyber threats against Supervisory Control and Data Acquisition (SCADA) systems. The evolution they have experienced; the use of standard hardware and software components or the increase of interconnected devices in order to reduce costs and improve efficiency, have...
Conference Paper
Full-text available
SHA-3 [3] drives the design and analysis of efficient cryptographic hash functions. This paper foresees to summarise the selection process, its present status and forthcoming events highlighting the main novelties found. Some relevant criteria to compare the different candidates are described and finally special attention is paid to the impact of t...
Conference Paper
Full-text available
Neural projection techniques can adaptively map high-dimensional data into a low-dimensional space, for the user-friendly visualization of data collected by different security tools. Such techniques are applied in this study for the visual inspection of honeypot data, which may be seen as a complementary network security tool that sheds light on i...
Conference Paper
Full-text available
This paper proposes a novel framework to automatically discover and analyze traffic generated by computer worms and other anomalous behaviors that interact with a non-solicited traffic monitoring system. Network packets are analyzed by an Intrusion Detection System (IDS), and new signatures are generated clustering those which remain unknown for th...
Conference Paper
Full-text available
A great variety of well-known attacks exist for the IEEE 802.11 protocol. The lack of mechanisms for management frame authentication and the complexity of the protocol itself have derived into a considerable number of denial of service and identity spoofing attacks. As most denial of service attacks are based on spoofing of MAC addresses, spoofed f...
Conference Paper
Full-text available
This paper presents the results of the project MIAU, a data mining approach for intrusion detection alert correlation. MIAU combines different data mining techniques in order to properly solve some existing problems in the management and analysis of alerts generated by actual intrusion detection systems. Some of these data mining methods and their...
Article
Full-text available
Security has traditionally been a subject of intensive research in the area of computing and networking. However, security of embedded systems is often ignored during the design and development period of the product, thus leaving many devices vulnerable to attacks. The growing number of embedded systems today (mobile phones, pay-tv devices, househo...
Article
Full-text available
Researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several environments. A boundlessness of methods for misuse detection as well as anomaly detection have been applied. Many of the technologies proposed are complementary to each other, since for different kind of environments some approaches perform better...
Article
Full-text available
This paper presents an approach to a methodology for continuous computer security auditing. It consists on measuring and controlling the security level of any organisation as a continuous process. This process establishes a method that permits organisations to control and to monitor the security level in real time, to be able to take the appropriat...
Article
Multicarrier CDMA is a major candidate to fulfil the requirements of 3G mobile systems. A novel scheme is developed combining modulo-S ring TCM with RNN-based adaptive space diversity for multicarrier CDMA systems with single-antenna transmitter and multiple-antenna receiver. The nonlinear RTRL algorithm for antenna diversity combining combats the...
Article
Full-text available
Code Division Multiple Access (CDMA) techniques have been considered as candidates to support multimedia services in mobile radio communications [1]. On the other hand, the Multicarrier Modulation (MCM) schemes, often called Orthogonal Frequency Division Multiplexing (OFDM), have drawn a lot of attention in the field of radio communications, [2, 3,...
Article
Full-text available
The application of adaptive space diversity combining algorithms in a mobile radio system is presented in this paper. Linear Square Root Kalman and non-linear Recurrent Neural Network based combining algorithms are applied to a Multicarrier Code Division Multiple Access (CDMA) system for simulation. This novel approach is evaluated over multipath f...
Article
Full-text available
Resumen En este trabajo se muestran inicialmente ciertos aspectos que motivan la investigación en torno a la seguridad informática, y más concretamente en los sistemas de detección de intrusiones (IDS). Se da una perspectiva general de aquellos campos en los que actúan los IDS, haciendo mayor hincapié en las técnicas de data mining que han sido uti...
Article
Full-text available
It is 17 years since Dorothy Denning proposed the first intrusion detection model. These systems have evolved rapidly from that model to present alarm correlation methods. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several environments. A boundlessness of methods for misuse detecti...
Article
Full-text available
In this paper, we present the experience obtained by the application of a methodology designed in Mondragon University. In this experience, three different security tools where combined: Nessus, Snort and Nagios. This way, the security administrator and even the enterprise management can easily analyse the organizations information system's securit...
Article
Resumen Los sistemas trampa constituyen una herramienta en auge en el mundo de la seguridad informática. En este artículo se hace una descripción general de los sistemas trampa. Qué son, para qué se utilizan, qué tipos de sistemas trampa existen, qué arquitecturas se pueden utilizar, etc.

Network

Cited By