Searched for: subject%3A%22Detection%22
(1 - 6 of 6)
document
Bustio-Martínez, Lázaro (author), Herrera-Semenets, Vitali (author), García-Mendoza, Juan-Luis (author), González-Ordiano, Jorge Ángel (author), Zúñiga-Morales, Luis (author), Sánchez Rivero, Rubén (author), Quiróz-Ibarra, José Emilio (author), Santander-Molina, Pedro Antonio (author), van den Berg, Jan (author), Buscaldi, Davide (author)
Persuasion is a human activity of influence. In marketing, persuasion can help customers find solutions to their problems, make informed choices, or convince someone to buy a useful (or useless) product or service. In computer crimes, persuasion can trick users into revealing sensitive information, or even performing actions that benefit...
conference paper 2024
document
Herrera-Semenets, Vitali (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size...
journal article 2022
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...
journal article 2021
document
Herrera Semenets, V. (author), Pérez-García, Osvaldo Andrés (author), Hernández-León, Raudel (author), van den Berg, Jan (author), Dörr, C. (author)
In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the...
journal article 2018
document
van der Walle, P (author), Kramer, E. (author), van der Donck, J.C.J. (author), Mulckhuyse, W (author), Nijsten, L. (author), Bernal Arango, F.A. (author), de Jong, A. (author), van Zeijl, E. (author), Spruit, H. E.T. (author), van den Berg, J.H. (author), Nanda, G. (author), van Langen-Suurling, A.K. (author), Alkemade, P.F.A. (author), Pereira, S.F. (author), Maas, D.J. (author)
Particle defects are important contributors to yield loss in semi-conductor manufacturing. Particles need to be detected and characterized in order to determine and eliminate their root cause. We have conceived a process flow for advanced defect classification (ADC) that distinguishes three consecutive steps; detection, review and...
conference paper 2017
Searched for: subject%3A%22Detection%22
(1 - 6 of 6)