{"id":274,"date":"2016-11-10T16:41:00","date_gmt":"2016-11-10T16:41:00","guid":{"rendered":"https:\/\/oceanwp.org\/architect\/?page_id=274"},"modified":"2025-07-28T12:10:21","modified_gmt":"2025-07-28T10:10:21","slug":"jedv","status":"publish","type":"page","link":"https:\/\/dtstc.ugr.es\/neus-cslab\/personal\/jedv\/","title":{"rendered":"JEDV"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"274\" class=\"elementor elementor-274\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3df70ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3df70ea\" data-element_type=\"section\" data-e-type=\"section\" id=\"inicio\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0912e23\" data-id=\"0912e23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-334888d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"334888d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-864a093\" data-id=\"864a093\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbbfd09 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"dbbfd09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-f0e0043\" data-id=\"f0e0043\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3d10b9 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"c3d10b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-2e121db\" data-id=\"2e121db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2e9cff elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"b2e9cff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-e7a1b87\" data-id=\"e7a1b87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d4c09a elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"4d4c09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-a38f604\" data-id=\"a38f604\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a8ec39 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"0a8ec39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-8959ea3\" data-id=\"8959ea3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49df8f5 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"49df8f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b1cea88 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1cea88\" data-element_type=\"section\" data-e-type=\"section\" id=\"inicio\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-14b4b45\" data-id=\"14b4b45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-284ff81 elementor-widget elementor-widget-image\" data-id=\"284ff81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"195\" height=\"300\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2022\/03\/jesus-195x300.jpg\" class=\"attachment-medium size-medium wp-image-490\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7926b07 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"7926b07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-map-marked-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tdirecci\u00f3n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDespacho 2.5<br>Dpto. Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y Comunicaciones<br>ETS de Ingenier\u00edas Inform\u00e1tica y Telecomunicaci\u00f3n<br>c\/ Daniel Saucedo Aranda,  s\/n<br>18071 - Granada\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-011ec19 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"011ec19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-envelope\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tContacto\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tjedv @ ugr.es\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-f9b9590\" data-id=\"f9b9590\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26608e9 elementor-widget elementor-widget-heading\" data-id=\"26608e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><br>JES\u00daS ESTEBAN D\u00cdAZ VERDEJO<br><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ae587a elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3ae587a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-landmark\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPUESTOS\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCatedr\u00e1tico de Ingenier\u00eda Telem\u00e1tica<br>Dpto. Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y Comunicaciones<br>Universidad de Granada\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bb0997 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"9bb0997\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-award\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tfORMACI\u00d3N acad\u00e9mica\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t Doctor en Ciencias F\u00edsicas - Universidad de Granada\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a2bf4c elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"9a2bf4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-graduation-cap\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDocencia reglada\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64c48cb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"64c48cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/grados.ugr.es\/telecomunicacion\/docencia\/plan-estudios\/transmision-datos-y-redes-computadores\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Transmisi\u00f3n de datos y redes de computadores - Grado Ing. Tecnolog\u00edas Telecomunicaci\u00f3n<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fd3b63 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6fd3b63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/grados.ugr.es\/informatica\/docencia\/plan-estudios\/tecnologias-red-especialidad-ingenieria-computadores\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tecnolog\u00edas de red - Grado Ing. Inform\u00e1tica<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3ce845 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c3ce845\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ugrcat.ugr.es\/asignatura\/seguridad-avanzada-en-redes-2023-2024\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seguridad avanzada en redes - M\u00e1ster Ing. Telecomunicaci\u00f3n<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a97f6e0 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"a97f6e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-microscope\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tl\u00edneas de investigaci\u00f3n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-185b642 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"185b642\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ac5bb5c\" data-id=\"ac5bb5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32e5bd1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"32e5bd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/lineas-de-investigacion\/web\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ciberseguridad<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/web\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seguridad en web<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/iot\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seguridad en entornos industriales e IoT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/ueba\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sistemas UEBA<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eb6dd36\" data-id=\"eb6dd36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1940281 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1940281\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/ids\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detecci\u00f3n de intrusiones<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/id-trafico\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Modelado y clasificaci\u00f3n de tr\u00e1fico<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/lineas-de-investigacion\/nms\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sistemas de monitorizaci\u00f3n de la seguridad (NSM)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-a452680 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"a452680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-barcode\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tORCID\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<a href=\"https:\/\/orcid.org\/0000-0002-8424-9932\">0000-0002-8424-9932<\/a>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-pzwqexz elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"pzwqexz\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-ewfpo96\" data-id=\"ewfpo96\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2u8aexn elementor-widget elementor-widget-counter\" data-id=\"2u8aexn\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Pub. JCR<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"32\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-1dlilng\" data-id=\"1dlilng\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dyk3q4o elementor-widget elementor-widget-counter\" data-id=\"dyk3q4o\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">PUBLICACIONES<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"170\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-fruxxnf\" data-id=\"fruxxnf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9f6pev elementor-widget elementor-widget-counter\" data-id=\"d9f6pev\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">PROYECTOS INV. <\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"17\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-1c2a25b\" data-id=\"1c2a25b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dc5d27 elementor-widget elementor-widget-counter\" data-id=\"4dc5d27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">acciones TRANSF. <\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"20\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-js68ssv\" data-id=\"js68ssv\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-drd6enc elementor-widget elementor-widget-counter\" data-id=\"drd6enc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">ACCIONES INNOVACI\u00d3N DOCENTE<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"15\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-0367f78\" data-id=\"0367f78\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eab3d6 elementor-widget elementor-widget-counter\" data-id=\"3eab3d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">ASIGNATURAS IMPARTIDAS<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"30\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-4877693\" data-id=\"4877693\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6540eba elementor-widget elementor-widget-counter\" data-id=\"6540eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">DIRECCI\u00d3N ALUMNOS<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"50\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-12 elementor-top-column elementor-element elementor-element-d089a09\" data-id=\"d089a09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf0dd73 elementor-widget elementor-widget-counter\" data-id=\"cf0dd73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">PREMIOS<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"8\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b74fc5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b74fc5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2345b86\" data-id=\"2345b86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-216230b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"216230b\" data-element_type=\"section\" data-e-type=\"section\" id=\"resumen\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-c8ec0c2\" data-id=\"c8ec0c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03ff33e elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"03ff33e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-f9361d2\" data-id=\"f9361d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8591159 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"8591159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-23d9a36\" data-id=\"23d9a36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0ef201 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"f0ef201\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-1781ef6\" data-id=\"1781ef6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c7624e elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"3c7624e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-ddf767e\" data-id=\"ddf767e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-161ed6a elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"161ed6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-2a8d68f\" data-id=\"2a8d68f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b010ea2 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"b010ea2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-804df8a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"804df8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6fbf9f\" data-id=\"a6fbf9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e5a23e elementor-widget elementor-widget-heading\" data-id=\"8e5a23e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resumen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e27c7af elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e27c7af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify; text-indent: 21.25pt; margin: 6.0pt 0cm 0cm 0cm;\"><span style=\"font-family: 'Arial',sans-serif; mso-bidi-font-weight: bold;\">Jes\u00fas E. D\u00edaz Verdejo es actualmente Catedr\u00e1tico de Ingenier\u00eda Telem\u00e1tica en el Departamento de Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y Comunicaciones de la Universidad de Granada.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Su labor investigadora y docente se centra en el campo de las redes y las comunicaciones, especialmente en el \u00e1mbito de la seguridad de redes y sistemas, sin excluir otros aspectos como el e-learning, la ingenier\u00eda de tr\u00e1fico y las aplicaciones telem\u00e1ticas. Su principal l\u00ednea de investigaci\u00f3n se orienta al an\u00e1lisis y modelizaci\u00f3n de actividades y eventos para la detecci\u00f3n de incidentes de seguridad y la respuesta a los mismos, tanto mediante la detecci\u00f3n de anomal\u00edas como mediante el uso de t\u00e9cnicas h\u00edbridas. Asimismo, con una orientaci\u00f3n a la seguridad de las comunicaciones y redes, ha desarrollado trabajos en el campo de la identificaci\u00f3n del tr\u00e1fico de red y la correlaci\u00f3n de alertas. En todos estos campos ha aplicado conocimientos y t\u00e9cnicas relacionadas con el machine learning y la miner\u00eda de datos, el modelado de procesos mediante modelos de Markov y el an\u00e1lisis y modelado de protocolos de comunicaci\u00f3n. Anteriormente, desarroll\u00f3 su investigaci\u00f3n en procesamiento y reconocimiento del habla, en la que tambi\u00e9n ha realizado importantes contribuciones.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Su actividad investigadora es extensa y de impacto internacional, como se puede juzgar por el completo curr\u00edculum. As\u00ed, en su curr\u00edculum se recogen veinte libros y cap\u00edtulos de libros, alrededor de medio centenar de publicaciones en prestigiosas revistas internacionales y alrededor de 70 contribuciones en congresos nacionales e internacionales. Ha dirigido 6 tesis doctorales, 4 de ellas en el \u00e1mbito de la seguridad de redes.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-bidi-font-weight: bold;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Ha participado como investigador en 34 proyectos: 15 del Plan Nacional y Regional de Investigaci\u00f3n y Desarrollo, 1 proyecto del 6\u00ba programa marco de la UE y 18 contratos de transferencia de investigaci\u00f3n. Entre ellos, ha liderado tres proyectos del Plan Nacional de Investigaci\u00f3n y Desarrollo y 3 contratos de transferencia tecnol\u00f3gica; correspondiendo la mayor\u00eda de las publicaciones cient\u00edficas mencionadas anteriormente a la publicaci\u00f3n de los resultados de estos proyectos.<span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-bidi-font-weight: bold;\"><span style=\"mso-tab-count: 1;\">\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Es revisor de numerosas revistas y congresos cient\u00edficos internacionales y nacionales, evaluador de proyectos, organizador de diversas reuniones y actividades t\u00e9cnicas, as\u00ed como miembro del CITIC-UGR. Desde 2017 est\u00e1 adscrito al grupo de investigaci\u00f3n TIC154 de PAIDI, desarrollando una l\u00ednea de investigaci\u00f3n en ciberseguridad.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Ha participado activamente en la implantaci\u00f3n del \u00e1rea de Ing. Telem\u00e1tica y de los t\u00edtulos relacionados con la Ingenier\u00eda de Telecomunicaci\u00f3n en la Universidad de Granada.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">En el contexto de la seguridad de redes, ha desarrollado sistemas de detecci\u00f3n de intrusos (IDS), especialmente para sistemas web, para los que existen prototipos que han sido objeto de contratos de transferencia. Tambi\u00e9n ha desarrollado t\u00e9cnicas para la clasificaci\u00f3n de flujos y para la correlaci\u00f3n de alertas y eventos en entornos de monitorizaci\u00f3n de redes. En ambos casos, existen prototipos operativos.<\/span><\/p>\n<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 21.3pt;\"><span style=\"font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: ES;\">Su objetivo a medio\/largo plazo es consolidar la l\u00ednea de investigaci\u00f3n en seguridad en el NEUS Cybersecurity Lab (https:\/\/dtst.ugr.es\/neus-cslab), desarrollando soluciones reales y efectivas que puedan ser transferibles, tanto para la prevenci\u00f3n y respuesta a intrusiones como para la monitorizaci\u00f3n de la seguridad de la red.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16d4eca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16d4eca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fc2f5b\" data-id=\"3fc2f5b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5826f62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5826f62\" data-element_type=\"section\" data-e-type=\"section\" id=\"publicaciones\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-5109143\" data-id=\"5109143\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06415d6 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"06415d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-96a3dff\" data-id=\"96a3dff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3d708f elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"c3d708f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-296fc45\" data-id=\"296fc45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e28cb2e elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"e28cb2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-63e0f63\" data-id=\"63e0f63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef87ead elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"ef87ead\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-4f4188d\" data-id=\"4f4188d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b64a69d elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"b64a69d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-f9792f7\" data-id=\"f9792f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dce329 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"4dce329\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5e1ed1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5e1ed1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9bcffad\" data-id=\"9bcffad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aed0d2f elementor-widget elementor-widget-heading\" data-id=\"aed0d2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publicaciones<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8920788 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8920788\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"tablenav\"><div class=\"tablenav-pages\"><span class=\"displaying-num\">156 registros<\/span> <a class=\"page-numbers button disabled\">&laquo;<\/a> <a class=\"page-numbers button disabled\">&lsaquo;<\/a> 1 de 8 <a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/personal\/jedv\/?limit=2&amp;tgid=&amp;yr=&amp;type=&amp;usr=&amp;auth=&amp;tsr=#tppubs\" title=\"p\u00e1gina siguiente\" class=\"page-numbers button\">&rsaquo;<\/a> <a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/personal\/jedv\/?limit=8&amp;tgid=&amp;yr=&amp;type=&amp;usr=&amp;auth=&amp;tsr=#tppubs\" title=\"\u00faltima p\u00e1gina\" class=\"page-numbers button\">&raquo;<\/a> <\/div><\/div><div class=\"teachpress_publication_list\"><h3 class=\"tp_h3\" id=\"tp_h3_2025\">2025<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Mayor, V.;  Alonso, R. Estepa;  Verdejo, J. D\u00edaz;  Alonso, A. Estepa<\/p><p class=\"tp_pub_title\">UEBA design for insider detection within IAM systems  <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las XVII Jornadas de Ingenier\u00eda Telem\u00e1tica (JITEL 2025), <\/span><span class=\"tp_pub_additional_pages\">pp. 21-28, <\/span><span class=\"tp_pub_additional_publisher\">Universidad de Extremadura. Servicio de publicaciones, <\/span><span class=\"tp_pub_additional_year\">2025<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 978-84-9127-339-4<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_502\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('502','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_502\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{jitel25-ueba,<br \/>\r\ntitle = {UEBA design for insider detection within IAM systems },<br \/>\r\nauthor = {V. Mayor and R. Estepa Alonso and J. D\u00edaz Verdejo and A. Estepa Alonso },<br \/>\r\nisbn = {978-84-9127-339-4},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-11-12},<br \/>\r\nurldate = {2025-11-12},<br \/>\r\nbooktitle = {Actas de las XVII Jornadas de Ingenier\u00eda Telem\u00e1tica (JITEL 2025)},<br \/>\r\npages = {21-28},<br \/>\r\npublisher = {Universidad de Extremadura. Servicio de publicaciones},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('502','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Mu\u00f1oz-Calle, J.;  D\u00edaz-Verdejo, J.;  Alonso, R. Estepa;  Alonso, A. Estepa<\/p><p class=\"tp_pub_title\">An\u00e1lisis comparativo de las capacidades de SIDS <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las X Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad, <\/span><span class=\"tp_pub_additional_pages\">pp. 169-176, <\/span><span class=\"tp_pub_additional_year\">2025<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 78-84-10169-61-6<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_500\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('500','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_500\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('500','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_500\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{2025-jnic-smart,<br \/>\r\ntitle = {An\u00e1lisis comparativo de las capacidades de SIDS},<br \/>\r\nauthor = { J. {Mu\u00f1oz-Calle} and J. {D\u00edaz-Verdejo} and R. {Estepa Alonso} and A. {Estepa Alonso} },<br \/>\r\nisbn = {78-84-10169-61-6},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-06-06},<br \/>\r\nurldate = {2025-06-06},<br \/>\r\nbooktitle = {Actas de las X Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad},<br \/>\r\npages = {169-176},<br \/>\r\nabstract = {Cada vez son m\u00e1s los dispositivos desplegados en entornos SmartHome residenciales para conseguir funcionalidades de control relativamente simples. Su bajo coste y facilidad de uso propician una fuerte expansi\u00f3n, lo que a su vez representa un desaf\u00edo desde el punto de vista de la ciberseguridad, aumentando<br \/>\r\nsignificativamente la exposici\u00f3n de las redes residenciales. La utilizaci\u00f3n de sistemas de detecci\u00f3n de intrusiones adaptados al contexto podr\u00eda mejorar la seguridad. Este trabajo estudia la idoneidad de los IDS para la detecci\u00f3n de ciberataques en un escenario tipo SmartHome real, utilizando tanto detectores<br \/>\r\nde dominio p\u00fablico como comerciales. Para ello se analizan trazas reales disponibles con 3 IDS ampliamente utilizados: Snort, Palo Alto NGFW y FortiGate. Los resultados obtenidos ilustran la imposibilidad de su despliegue en su configuraci\u00f3n por defecto, planteando algunas cuestiones relativas al rendimiento<br \/>\r\ny la dificultad de comparar sus rendimientos debido al punto de operaci\u00f3n elegido en los equipos comerciales frente a Snort.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('500','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_500\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Cada vez son m\u00e1s los dispositivos desplegados en entornos SmartHome residenciales para conseguir funcionalidades de control relativamente simples. Su bajo coste y facilidad de uso propician una fuerte expansi\u00f3n, lo que a su vez representa un desaf\u00edo desde el punto de vista de la ciberseguridad, aumentando<br \/>\r\nsignificativamente la exposici\u00f3n de las redes residenciales. La utilizaci\u00f3n de sistemas de detecci\u00f3n de intrusiones adaptados al contexto podr\u00eda mejorar la seguridad. Este trabajo estudia la idoneidad de los IDS para la detecci\u00f3n de ciberataques en un escenario tipo SmartHome real, utilizando tanto detectores<br \/>\r\nde dominio p\u00fablico como comerciales. Para ello se analizan trazas reales disponibles con 3 IDS ampliamente utilizados: Snort, Palo Alto NGFW y FortiGate. Los resultados obtenidos ilustran la imposibilidad de su despliegue en su configuraci\u00f3n por defecto, planteando algunas cuestiones relativas al rendimiento<br \/>\r\ny la dificultad de comparar sus rendimientos debido al punto de operaci\u00f3n elegido en los equipos comerciales frente a Snort.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('500','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, Jes\u00fas E.;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  Mu\u00f1oz-Calle, F. J.;  Madinabeitia, German<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('496','tp_links')\" style=\"cursor:pointer;\">Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 <\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">Cybersecurity, <\/span><span class=\"tp_pub_additional_volume\">vol. 8, <\/span><span class=\"tp_pub_additional_number\">no 35, <\/span><span class=\"tp_pub_additional_year\">2025<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 2523-3246<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_496\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('496','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_496\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('496','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_496\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('496','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_496\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{Biblio24,<br \/>\r\ntitle = {Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 },<br \/>\r\nauthor = {Jes\u00fas E. {D\u00edaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and F. J. {Mu\u00f1oz-Calle} and German {Madinabeitia}},<br \/>\r\ndoi = {https:\/\/doi.org\/10.1186\/s42400\u2011024\u201100336\u20113},<br \/>\r\nissn = {2523-3246},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-06-05},<br \/>\r\nurldate = {2025-06-05},<br \/>\r\njournal = {Cybersecurity},<br \/>\r\nvolume = {8},<br \/>\r\nnumber = {35},<br \/>\r\nabstract = {This paper introduces Biblio-US17, a labeled dataset collected over 6 months from the log files of a popular public website at the University of Seville. It contains 47 million records, each including the method, uniform resource identifier (URI) and associated response code and size of every request received by the web server. Records have been classified as either normal or attack using a comprehensive semi-automated process, which involved signature-based detection, assisted inspection of URIs vocabulary, and substantial expert manual supervision. Unlike comparable datasets, this one offers a genuine real-world perspective on the normal operation of an active website, along with an unbiased proportion of actual attacks (i.e., non-synthetic). This makes it ideal for evaluating and comparing anomalybased approaches in a realistic environment. Its extensive size and duration also make it valuable for addressing challenges like data shift and insufficient training. This paper describes the collection and labeling processes, dataset structure, and most relevant properties. We also include an example of an application for assessing the performance of a simple anomaly detector. Biblio-US17, now available to the scientific community, can also be used to model the URIs used by current web servers.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('496','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_496\" style=\"display:none;\"><div class=\"tp_abstract_entry\">This paper introduces Biblio-US17, a labeled dataset collected over 6 months from the log files of a popular public website at the University of Seville. It contains 47 million records, each including the method, uniform resource identifier (URI) and associated response code and size of every request received by the web server. Records have been classified as either normal or attack using a comprehensive semi-automated process, which involved signature-based detection, assisted inspection of URIs vocabulary, and substantial expert manual supervision. Unlike comparable datasets, this one offers a genuine real-world perspective on the normal operation of an active website, along with an unbiased proportion of actual attacks (i.e., non-synthetic). This makes it ideal for evaluating and comparing anomalybased approaches in a realistic environment. Its extensive size and duration also make it valuable for addressing challenges like data shift and insufficient training. This paper describes the collection and labeling processes, dataset structure, and most relevant properties. We also include an example of an application for assessing the performance of a simple anomaly detector. Biblio-US17, now available to the scientific community, can also be used to model the URIs used by current web servers.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('496','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_496\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/https:\/\/doi.org\/10.1186\/s42400\u2011024\u201100336\u20113\" title=\"DOI de seguimiento:https:\/\/doi.org\/10.1186\/s42400\u2011024\u201100336\u20113\" target=\"_blank\">doi:https:\/\/doi.org\/10.1186\/s42400\u2011024\u201100336\u20113<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('496','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2024\">2024<\/h3><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Lara, Agust\u00edn;  Estepa, Antonio;  Estepa, Rafael;  D\u00edaz-Verdejo, Jes\u00fas E.;  Mayor, Vicente<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('495','tp_links')\" style=\"cursor:pointer;\">Anomaly-based Intrusion Detection System for smart lighting<\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">Internet of Things, <\/span><span class=\"tp_pub_additional_volume\">vol. 28, <\/span><span class=\"tp_pub_additional_pages\">pp. 101427, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 2542-6605<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_495\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('495','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_495\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('495','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_495\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('495','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_495\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{LARA2024101427,<br \/>\r\ntitle = {Anomaly-based Intrusion Detection System for smart lighting},<br \/>\r\nauthor = {Agust\u00edn Lara and Antonio Estepa and Rafael Estepa and Jes\u00fas E. D\u00edaz-Verdejo and Vicente Mayor},<br \/>\r\nurl = {https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660524003688},<br \/>\r\ndoi = {https:\/\/doi.org\/10.1016\/j.iot.2024.101427},<br \/>\r\nissn = {2542-6605},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\njournal = {Internet of Things},<br \/>\r\nvolume = {28},<br \/>\r\npages = {101427},<br \/>\r\nabstract = {Smart Lighting Systems (SLS) are essential to smart cities, offering enhanced energy efficiency and public safety. However, they are susceptible to security threats, potentially leading to safety risks and service disruptions, making the protection of this infrastructure critical. This paper presents an anomaly-based Intrusion Detection System (IDS) designed for a real-world operational SLS. As commercial deployments vary in components, protocols, and functionalities, IDSs must be tailored to the specific characteristics of each deployment to perform effectively. Our anomaly-based IDS has been defined based on the properties of the available data and the types of attacks we aim to detect, offering both explainability and low complexity. The proposed system identifies anomalies in seven features of network traffic and in the telemetry data received at the central control (O&M) server. For the latter, we designed three customized detectors to identify abnormal data points, persistent deviations in street lamp power consumption, and abnormal power value based on the time of day. Validation with real-world data and simulated attacks demonstrates the effectiveness of our approach. Network attacks (e.g., DoS, scanning) were detected by at least one of the seven flow-related anomaly detectors, while simulated data poisoning attacks and operational technology (OT) issues were detected with nearly 90% accuracy. The datasets used in this work are publicly available and may serve as reference for the design of future IDSs. While our detectors were designed specifically for our dataset, the variables examined and vulnerabilities addressed are common in most commercial SLSs.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('495','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_495\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Smart Lighting Systems (SLS) are essential to smart cities, offering enhanced energy efficiency and public safety. However, they are susceptible to security threats, potentially leading to safety risks and service disruptions, making the protection of this infrastructure critical. This paper presents an anomaly-based Intrusion Detection System (IDS) designed for a real-world operational SLS. As commercial deployments vary in components, protocols, and functionalities, IDSs must be tailored to the specific characteristics of each deployment to perform effectively. Our anomaly-based IDS has been defined based on the properties of the available data and the types of attacks we aim to detect, offering both explainability and low complexity. The proposed system identifies anomalies in seven features of network traffic and in the telemetry data received at the central control (O&amp;M) server. For the latter, we designed three customized detectors to identify abnormal data points, persistent deviations in street lamp power consumption, and abnormal power value based on the time of day. Validation with real-world data and simulated attacks demonstrates the effectiveness of our approach. Network attacks (e.g., DoS, scanning) were detected by at least one of the seven flow-related anomaly detectors, while simulated data poisoning attacks and operational technology (OT) issues were detected with nearly 90% accuracy. The datasets used in this work are publicly available and may serve as reference for the design of future IDSs. While our detectors were designed specifically for our dataset, the variables examined and vulnerabilities addressed are common in most commercial SLSs.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('495','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_495\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660524003688\" title=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660524003688\" target=\"_blank\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660524003688<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/https:\/\/doi.org\/10.1016\/j.iot.2024.101427\" title=\"DOI de seguimiento:https:\/\/doi.org\/10.1016\/j.iot.2024.101427\" target=\"_blank\">doi:https:\/\/doi.org\/10.1016\/j.iot.2024.101427<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('495','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Mu\u00f1oz-Calle, Javier;  Alonso, Rafael Estepa;  Alonso, Antonio Estepa;  D\u00edaz-Verdejo, Jes\u00fas E.;  Fern\u00e1ndez, Elvira Castillo;  Madinabeitia, Germ\u00e1n<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('494','tp_links')\" style=\"cursor:pointer;\">A Flexible Multilevel System for Mitre ATT&amp;CK Model-driven Alerts and Events Correlation in Cyberattacks Detection<\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">JUCS &#8211; Journal of Universal Computer Science, <\/span><span class=\"tp_pub_additional_volume\">vol. 30, <\/span><span class=\"tp_pub_additional_number\">no 9, <\/span><span class=\"tp_pub_additional_pages\">pp. 1184-1204, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 0948-695X<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_494\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('494','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_494\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('494','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_494\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('494','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_494\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{10.3897\/jucs.131686,<br \/>\r\ntitle = {A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection},<br \/>\r\nauthor = {Javier Mu\u00f1oz-Calle and Rafael Estepa Alonso and Antonio Estepa Alonso and Jes\u00fas E. D\u00edaz-Verdejo and Elvira Castillo Fern\u00e1ndez and Germ\u00e1n Madinabeitia},<br \/>\r\nurl = {https:\/\/doi.org\/10.3897\/jucs.131686},<br \/>\r\ndoi = {10.3897\/jucs.131686},<br \/>\r\nissn = {0948-695X},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\njournal = {JUCS - Journal of Universal Computer Science},<br \/>\r\nvolume = {30},<br \/>\r\nnumber = {9},<br \/>\r\npages = {1184-1204},<br \/>\r\npublisher = {Journal of Universal Computer Science},<br \/>\r\nabstract = {Network monitoring systems can struggle to detect the full sequence of actions in a multi-step cyber attack, frequently resulting in multiple alerts (some of which are false positive (FP)) and missed actions. The challenge of easing the job of security analysts by triggering a single and accurate alert per attack requires developing and evaluating advanced event correlation techniques and models that have the potential to devise relationships between the different observed events\/alerts.This work introduces a flexible architecture designed for hierarchical and iterative correlation of alerts and events. Its key feature is the sequential correlation of operations targeting specific attack episodes or aspects. This architecture utilizes IDS alerts or similar cybersecurity sensors, storing events and alerts in a non-relational database. Modules designed for knowledge creation then query these stored items to generate meta-alerts, also stored in the database. This approach facilitates creating a more refined knowledge that can be built on top of existing one by creating specialized modules. For illustrative purposes, we make a case study where we use this architectural approach to explore the feasibility of monitoring the progress of attacks of increased complexity by increasing the levels of the hyperalerts defined, including a case of a multi-step attack that adheres to the ATT&amp;CK model. Although the mapping between the observations and the model components (i.e., techniques and tactics) is challenging, we could fully monitor the progress of two attacks and up to 5 out of 6 steps of the most complex attack by building up to three specialized modules. Despite some limitations due to the sensors and attack scenarios tested, the results indicate the architecture&rsquo;s potential for enhancing the detection of complex cyber attacks, offering a promising direction for future cybersecurity research.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('494','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_494\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Network monitoring systems can struggle to detect the full sequence of actions in a multi-step cyber attack, frequently resulting in multiple alerts (some of which are false positive (FP)) and missed actions. The challenge of easing the job of security analysts by triggering a single and accurate alert per attack requires developing and evaluating advanced event correlation techniques and models that have the potential to devise relationships between the different observed events\/alerts.This work introduces a flexible architecture designed for hierarchical and iterative correlation of alerts and events. Its key feature is the sequential correlation of operations targeting specific attack episodes or aspects. This architecture utilizes IDS alerts or similar cybersecurity sensors, storing events and alerts in a non-relational database. Modules designed for knowledge creation then query these stored items to generate meta-alerts, also stored in the database. This approach facilitates creating a more refined knowledge that can be built on top of existing one by creating specialized modules. For illustrative purposes, we make a case study where we use this architectural approach to explore the feasibility of monitoring the progress of attacks of increased complexity by increasing the levels of the hyperalerts defined, including a case of a multi-step attack that adheres to the ATT&amp;amp;CK model. Although the mapping between the observations and the model components (i.e., techniques and tactics) is challenging, we could fully monitor the progress of two attacks and up to 5 out of 6 steps of the most complex attack by building up to three specialized modules. Despite some limitations due to the sensors and attack scenarios tested, the results indicate the&amp;nbsp;architecture&amp;rsquo;s potential for enhancing the detection of complex cyber attacks, offering a promising direction for future cybersecurity research.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('494','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_494\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.3897\/jucs.131686\" title=\"https:\/\/doi.org\/10.3897\/jucs.131686\" target=\"_blank\">https:\/\/doi.org\/10.3897\/jucs.131686<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.3897\/jucs.131686\" title=\"DOI de seguimiento:10.3897\/jucs.131686\" target=\"_blank\">doi:10.3897\/jucs.131686<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('494','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, Jes\u00fas E.;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  Mu\u00f1oz-Calle, Javier;  Madinabeitia, Germ\u00e1n<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('492','tp_links')\" style=\"cursor:pointer;\">Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">European Interdisciplinary Cybersecurity Conference (EICC 2024), <\/span><span class=\"tp_pub_additional_pages\">pp. 217\u2013218, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 9798400716515<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_492\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('492','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_492\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('492','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_492\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('492','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_492\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Diaz-Verdejo2024b,<br \/>\r\ntitle = {Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development},<br \/>\r\nauthor = {Jes\u00fas E. D\u00edaz-Verdejo and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Javier Mu\u00f1oz-Calle and Germ\u00e1n Madinabeitia},<br \/>\r\ndoi = {10.1145\/3655693.3661319},<br \/>\r\nisbn = {9798400716515},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {European Interdisciplinary Cybersecurity Conference (EICC 2024)},<br \/>\r\npages = {217\u2013218},<br \/>\r\nabstract = {The development of anomaly-based intrusion detection systems is hindered by the scarcity of adequate datasets. An ideal dataset should contain real traffic, genuine attacks and cover a large time period that may demonstrate time shift. To be useful, the dataset must be labeled to provide accurate ground-truth, This paper presents a dataset of URLs that possesses these qualities. It can therefore be used to effectively train, test, and validate URL-based anomaly detection systems. The dataset is publicly available and contains 47M registers, including 320k attacks, and spans for 6.5 months. It is partitioned acording to two schemes to allow for time dependent and time independent experiments.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('492','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_492\" style=\"display:none;\"><div class=\"tp_abstract_entry\">The development of anomaly-based intrusion detection systems is hindered by the scarcity of adequate datasets. An ideal dataset should contain real traffic, genuine attacks and cover a large time period that may demonstrate time shift. To be useful, the dataset must be labeled to provide accurate ground-truth, This paper presents a dataset of URLs that possesses these qualities. It can therefore be used to effectively train, test, and validate URL-based anomaly detection systems. The dataset is publicly available and contains 47M registers, including 320k attacks, and spans for 6.5 months. It is partitioned acording to two schemes to allow for time dependent and time independent experiments.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('492','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_492\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3655693.3661319\" title=\"DOI de seguimiento:10.1145\/3655693.3661319\" target=\"_blank\">doi:10.1145\/3655693.3661319<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('492','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, J.;  Alonso, R. Estepa;  Alonso, A. Estepa;  Mu\u00f1oz-Calle, F. J.<\/p><p class=\"tp_pub_title\">Impacto de la evoluci\u00f3n temporal de datasets reales en el rendimiento de un IDS basados en anomal\u00edas: estudio experimental sobre HTTP <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">XI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad, <\/span><span class=\"tp_pub_additional_pages\">pp. 302\u2013309, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_493\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('493','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_493\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('493','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_493\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DiazVerdejo2024,<br \/>\r\ntitle = {Impacto de la evoluci\u00f3n temporal de datasets reales en el rendimiento de un IDS basados en anomal\u00edas: estudio experimental sobre HTTP},<br \/>\r\nauthor = {J. D\u00edaz-Verdejo and R. Estepa Alonso and A. Estepa Alonso and F. J. Mu\u00f1oz-Calle},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {XI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad},<br \/>\r\npages = {302\u2013309},<br \/>\r\nabstract = {El desarrollo y evaluaci\u00f3n de sistemas de detecci\u00f3n de intrusiones basados en anomal\u00edas es de vital importancia en el contexto de la ciberseguridad, especialmente en relaci\u00f3n a los ataques de d\u00eda cero. La naturaleza altamente diamica tanto de los sistemas a proteger como de los ataques hace que la detecci\u00f3n de anomal\u00edas resulte una tarea compleja, ya que esta evoluci\u00f3n temporal puede afectar a las capacidades de los modelos estimados en un escenario y periodo determinados. A pesar de su importancia, este efecto ha sido explorado de forma limitada en la literatura, especialmente por la pr\u00e1tica inexistencia de datos reales convenientemente etiquetados con la suficiente extensi\u00f3n temporal. En el presente trabajo evaluamos experimentalmente el impacto de la evoluci\u00f3n temporal en un sistema para la detecci\u00f3n de ataques basados en URL utilizando datos reales capturados en un escenario real durante un periodo de tiempo relativamente extenso. Nuestros an\u00e1lisis demuestran una degradaci\u00f3n de creciente con la distancia temporal entre el entrenamiento y la evaluaci\u00f3n. Esta degradaci\u00f3n es debida a la combinaci\u00f3n de la p\u00e9rdida de calidad del modelo con el tiempo as\u00ed como a la propia variaci\u00f3n del comportamiento del servicio y\/o ataques a lo largo del tiempo.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('493','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_493\" style=\"display:none;\"><div class=\"tp_abstract_entry\">El desarrollo y evaluaci\u00f3n de sistemas de detecci\u00f3n de intrusiones basados en anomal\u00edas es de vital importancia en el contexto de la ciberseguridad, especialmente en relaci\u00f3n a los ataques de d\u00eda cero. La naturaleza altamente diamica tanto de los sistemas a proteger como de los ataques hace que la detecci\u00f3n de anomal\u00edas resulte una tarea compleja, ya que esta evoluci\u00f3n temporal puede afectar a las capacidades de los modelos estimados en un escenario y periodo determinados. A pesar de su importancia, este efecto ha sido explorado de forma limitada en la literatura, especialmente por la pr\u00e1tica inexistencia de datos reales convenientemente etiquetados con la suficiente extensi\u00f3n temporal. En el presente trabajo evaluamos experimentalmente el impacto de la evoluci\u00f3n temporal en un sistema para la detecci\u00f3n de ataques basados en URL utilizando datos reales capturados en un escenario real durante un periodo de tiempo relativamente extenso. Nuestros an\u00e1lisis demuestran una degradaci\u00f3n de creciente con la distancia temporal entre el entrenamiento y la evaluaci\u00f3n. Esta degradaci\u00f3n es debida a la combinaci\u00f3n de la p\u00e9rdida de calidad del modelo con el tiempo as\u00ed como a la propia variaci\u00f3n del comportamiento del servicio y\/o ataques a lo largo del tiempo.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('493','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, J.;  Mu\u00f1oz-Calle, J.;  Alonso, R. Estepa;  Alonso, A. Estepa<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('491','tp_links')\" style=\"cursor:pointer;\">InspectorLog : A New Tool for Offline Attack Detection over Web Log<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), <\/span><span class=\"tp_pub_additional_pages\">pp. 692\u2013697, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 9789897587092<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_491\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('491','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_491\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('491','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_491\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('491','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_491\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Diaz-Verdejo2024a,<br \/>\r\ntitle = {InspectorLog : A New Tool for Offline Attack Detection over Web Log},<br \/>\r\nauthor = {J. D\u00edaz-Verdejo and J. Mu\u00f1oz-Calle and R. Estepa Alonso and A. Estepa Alonso},<br \/>\r\ndoi = {10.5220\/0012764000003767},<br \/>\r\nisbn = {9789897587092},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024)},<br \/>\r\nnumber = {Secrypt},<br \/>\r\npages = {692\u2013697},<br \/>\r\nabstract = {InspectorLog is a novel tool for offline analysis of HTTP logs. The tool processes web server logs to identify attacks using diverse rule sets, focusing primarily on the URI field. It is compatible with standard rule formats from systems such as Snort, Nemesida, and ModSecurity. This paper describes InspectorLog functionalities, architecture and applications to the scientific community. We also experimentally validate InspectorLog by comparing its detection power with that of the IDS from which rules are taken. Inspector log fills a gap in available tools in cybersecurity practices in forensic analysis, dataset sanitization, and signature tuning. Future enhancements are planned to support additionalWeb Application Firewalls (WAFs), new rule types, and HTTP protocol methods, aiming to broaden its scope and utility in the ever-evolving domain of network security.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('491','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_491\" style=\"display:none;\"><div class=\"tp_abstract_entry\">InspectorLog is a novel tool for offline analysis of HTTP logs. The tool processes web server logs to identify attacks using diverse rule sets, focusing primarily on the URI field. It is compatible with standard rule formats from systems such as Snort, Nemesida, and ModSecurity. This paper describes InspectorLog functionalities, architecture and applications to the scientific community. We also experimentally validate InspectorLog by comparing its detection power with that of the IDS from which rules are taken. Inspector log fills a gap in available tools in cybersecurity practices in forensic analysis, dataset sanitization, and signature tuning. Future enhancements are planned to support additionalWeb Application Firewalls (WAFs), new rule types, and HTTP protocol methods, aiming to broaden its scope and utility in the ever-evolving domain of network security.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('491','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_491\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.5220\/0012764000003767\" title=\"DOI de seguimiento:10.5220\/0012764000003767\" target=\"_blank\">doi:10.5220\/0012764000003767<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('491','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, Jes\u00fas;  Alonso, Rafael Estepa;  Alonso, Antonio Estepa;  Mu\u00f1oz-Calle, Javier<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('490','tp_links')\" style=\"cursor:pointer;\">Insights into anomaly-based intrusion detection systems usability. A case study using real http requests<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Proc. European Interdisciplinary Cybersecurity Conference (EICC 2024), <\/span><span class=\"tp_pub_additional_pages\">pp. 82\u201389, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 9798400716515<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_490\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('490','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_490\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('490','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_490\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('490','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_490\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Diaz-Verdejo2024,<br \/>\r\ntitle = {Insights into anomaly-based intrusion detection systems usability. A case study using real http requests},<br \/>\r\nauthor = {Jes\u00fas D\u00edaz-Verdejo and Rafael Estepa Alonso and Antonio Estepa Alonso and Javier Mu\u00f1oz-Calle},<br \/>\r\ndoi = {10.1145\/3655693.3655745},<br \/>\r\nisbn = {9798400716515},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2024)},<br \/>\r\npages = {82\u201389},<br \/>\r\nabstract = {Intrusion detection systems based on anomalies (A-IDS) are crucial for detecting cyberattacks, especially zero-day attacks. Numerous A-IDS proposals in the literature report excellent performance according to established metrics and settings in a laboratory. However, finding systems implementing these proposals in real-world scenarios is challenging. This work explores, through a case study, the suitability of performance metrics commonly used in the scientific literature to real-world scenarios. Our case study will consider a Web attack detector based on URIs and a real, large-scale dataset. Our results show significant limitations in the performance metrics commonly used to select the system&#039;s operating point and its practical use in real-world scenarios.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('490','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_490\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Intrusion detection systems based on anomalies (A-IDS) are crucial for detecting cyberattacks, especially zero-day attacks. Numerous A-IDS proposals in the literature report excellent performance according to established metrics and settings in a laboratory. However, finding systems implementing these proposals in real-world scenarios is challenging. This work explores, through a case study, the suitability of performance metrics commonly used in the scientific literature to real-world scenarios. Our case study will consider a Web attack detector based on URIs and a real, large-scale dataset. Our results show significant limitations in the performance metrics commonly used to select the system&#039;s operating point and its practical use in real-world scenarios.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('490','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_490\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3655693.3655745\" title=\"DOI de seguimiento:10.1145\/3655693.3655745\" target=\"_blank\">doi:10.1145\/3655693.3655745<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('490','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2023\">2023<\/h3><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Walabonso Lara, Agust\u00edn;  Mayor, Vicente;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  D\u00edaz-Verdejo, Jes\u00fas E.<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('265','tp_links')\" style=\"cursor:pointer;\">Smart home anomaly-based IDS: Architecture proposal and case study<\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">Internet of Things, <\/span><span class=\"tp_pub_additional_volume\">vol. 22, <\/span><span class=\"tp_pub_additional_pages\">pp. 100773, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 2542-6605<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_265\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('265','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_265\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('265','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_265\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('265','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_265\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{Lara2023,<br \/>\r\ntitle = {Smart home anomaly-based IDS: Architecture proposal and case study},<br \/>\r\nauthor = { {Walabonso Lara}, Agust\u00edn and Vicente Mayor and {Estepa Alonso}, Rafael and {Estepa Alonso} , Antonio and Jes\u00fas E. {D\u00edaz-Verdejo}},<br \/>\r\nurl = {https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523000963},<br \/>\r\ndoi = {10.1016\/J.IOT.2023.100773},<br \/>\r\nissn = {2542-6605},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-07-01},<br \/>\r\nurldate = {2023-07-01},<br \/>\r\njournal = {Internet of Things},<br \/>\r\nvolume = {22},<br \/>\r\npages = {100773},<br \/>\r\npublisher = {Elsevier},<br \/>\r\nabstract = {The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison. In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('265','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_265\" style=\"display:none;\"><div class=\"tp_abstract_entry\">The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison. In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('265','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_265\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523000963\" title=\"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523000963\" target=\"_blank\">https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523000963<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1016\/J.IOT.2023.100773\" title=\"DOI de seguimiento:10.1016\/J.IOT.2023.100773\" target=\"_blank\">doi:10.1016\/J.IOT.2023.100773<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('265','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Castillo-Fern\u00e1ndez, Elvira;  Mu\u00f1oz, Escol\u00e1stico;  Diaz-Verdejo, J.;  Estepa Alonso, R;  Estepa Alonso, A.<\/p><p class=\"tp_pub_title\">Dise\u00f1o y despliegue de un laboratorio para formaci\u00f3n e investigaci\u00f3n  en ciberseguridad <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC23) , <\/span><span class=\"tp_pub_additional_pages\">pp. 445-452, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 978-84-8158-970-2<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_480\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('480','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_480\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('480','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_480\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{jnic23-cslab,<br \/>\r\ntitle = {Dise\u00f1o y despliegue de un laboratorio para formaci\u00f3n e investigaci\u00f3n  en ciberseguridad},<br \/>\r\nauthor = {Elvira Castillo-Fern\u00e1ndez and Escol\u00e1stico Mu\u00f1oz and J. Diaz-Verdejo and {Estepa Alonso}, R and {Estepa Alonso}, A.},<br \/>\r\nisbn = {978-84-8158-970-2},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-21},<br \/>\r\nurldate = {2023-06-21},<br \/>\r\nbooktitle = {Actas de las VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC23) },<br \/>\r\njournal = {Actas de las VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC23) - En revisi\u00f3n},<br \/>\r\npages = {445-452},<br \/>\r\nabstract = {La realizaci\u00f3n de simulacros y\/o experimentos para actividades de formaci\u00f3n e investigaci\u00f3n en ciberseguridad plantea serias dificultades pr\u00e1cticas por la ejecuci\u00f3n de ataques a los sistemas que conforman la propia infraestructura. Se presentan m\u00faltiples requisitos, en ocasiones, incompatibles entre s\u00ed, como la necesidad de preservar la seguridad de los sistemas externos y de monitorizaci\u00f3n sin perder la conectividad hacia Internet, la capacidad de monitorizaci\u00f3n y adquisici\u00f3n de trazas de una forma segura, la flexibilidad que permita m\u00faltiples escenarios lo m\u00e1s realistas posible y una f\u00e1cil reusabilidad del laboratorio. En el presente trabajo se propone e implementa una arquitectura para un laboratorio de ciberseguridad que presenta un equilibrio entre flexibilidad, funcionalidad, usabilidad y seguridad de las operaciones. La propuesta se basa en la divisi\u00f3n en una red de supervisi\u00f3n y una red de laboratorio sobre la que, mediante virtualizaci\u00f3n de bajo nivel, se pueden desarrollar los diferentes experimentos y ataques con riesgo m\u00ednimo de impacto sobre la red de supervisi\u00f3n. Para ello se establecen diferentes barreras, tanto f\u00edsicas como l\u00f3gicas, que permiten filtrar el tr\u00e1fico entre ambas y la conectividad hacia Internet. Para mostrar la operaci\u00f3n y capacidades de la arquitectura propuesta se presenta un caso de uso con un ataque multietapa que involucra diversos sistemas operativos y equipos.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('480','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_480\" style=\"display:none;\"><div class=\"tp_abstract_entry\">La realizaci\u00f3n de simulacros y\/o experimentos para actividades de formaci\u00f3n e investigaci\u00f3n en ciberseguridad plantea serias dificultades pr\u00e1cticas por la ejecuci\u00f3n de ataques a los sistemas que conforman la propia infraestructura. Se presentan m\u00faltiples requisitos, en ocasiones, incompatibles entre s\u00ed, como la necesidad de preservar la seguridad de los sistemas externos y de monitorizaci\u00f3n sin perder la conectividad hacia Internet, la capacidad de monitorizaci\u00f3n y adquisici\u00f3n de trazas de una forma segura, la flexibilidad que permita m\u00faltiples escenarios lo m\u00e1s realistas posible y una f\u00e1cil reusabilidad del laboratorio. En el presente trabajo se propone e implementa una arquitectura para un laboratorio de ciberseguridad que presenta un equilibrio entre flexibilidad, funcionalidad, usabilidad y seguridad de las operaciones. La propuesta se basa en la divisi\u00f3n en una red de supervisi\u00f3n y una red de laboratorio sobre la que, mediante virtualizaci\u00f3n de bajo nivel, se pueden desarrollar los diferentes experimentos y ataques con riesgo m\u00ednimo de impacto sobre la red de supervisi\u00f3n. Para ello se establecen diferentes barreras, tanto f\u00edsicas como l\u00f3gicas, que permiten filtrar el tr\u00e1fico entre ambas y la conectividad hacia Internet. Para mostrar la operaci\u00f3n y capacidades de la arquitectura propuesta se presenta un caso de uso con un ataque multietapa que involucra diversos sistemas operativos y equipos.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('480','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Castillo-Fern\u00e1ndez, E.;  Diaz-Verdejo, J.;  Estepa Alonso, R.;  Estepa Alonso, A.<\/p><p class=\"tp_pub_title\">Riesgos en la Smart Home: estudio experimental <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC23), <\/span><span class=\"tp_pub_additional_pages\">pp. 375-382, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 978-84-8158-970-2<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_476\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('476','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_476\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('476','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_476\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{jnic23-iot,<br \/>\r\ntitle = {Riesgos en la Smart Home: estudio experimental},<br \/>\r\nauthor = {E. Castillo-Fern\u00e1ndez and J. Diaz-Verdejo and {Estepa Alonso}, R. and {Estepa Alonso}, A.},<br \/>\r\nisbn = {978-84-8158-970-2},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-21},<br \/>\r\nurldate = {2023-06-21},<br \/>\r\nbooktitle = {Actas de las VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC23)},<br \/>\r\npages = {375-382},<br \/>\r\nabstract = {En este trabajo realizamos una evaluaci\u00f3n preliminar de los riesgos de ciberseguridad en un escenario de aplicaci\u00f3n t\u00edpico de SmartHome: una vivienda unifamiliar. Para ello se han desplegado varias tecnolog\u00edas com\u00fanmente utilizadas en este contexto y se ha monitorizado el tr\u00e1fico asociado a los dispositivos y servidores SmartHome. A partir del an\u00e1lisis realizado se ha constatado la existencia de ataques, patrones de comunicaci\u00f3n an\u00f3malos entre dispositivos y con servidores externos, as\u00ed como vulnerabilidades asociadas a debilidades en las configuraciones de los dispositivos y los protocolos desplegados, algunos de ellos propietarios. Adicionalmente, para algunos dispositivos se ha constatado una gran dependencia de la nube, lo que facilita la indisponibilidad de  algunos servicios en caso de fallos en la conexi\u00f3n con nube. El resultado evidencia un pobre tratamiento de la ciberseguridad por la mayor\u00eda de los operadores del sector y un riesgo en este tipo de instalaciones que puede pasar inadvertido al usuario.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('476','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_476\" style=\"display:none;\"><div class=\"tp_abstract_entry\">En este trabajo realizamos una evaluaci\u00f3n preliminar de los riesgos de ciberseguridad en un escenario de aplicaci\u00f3n t\u00edpico de SmartHome: una vivienda unifamiliar. Para ello se han desplegado varias tecnolog\u00edas com\u00fanmente utilizadas en este contexto y se ha monitorizado el tr\u00e1fico asociado a los dispositivos y servidores SmartHome. A partir del an\u00e1lisis realizado se ha constatado la existencia de ataques, patrones de comunicaci\u00f3n an\u00f3malos entre dispositivos y con servidores externos, as\u00ed como vulnerabilidades asociadas a debilidades en las configuraciones de los dispositivos y los protocolos desplegados, algunos de ellos propietarios. Adicionalmente, para algunos dispositivos se ha constatado una gran dependencia de la nube, lo que facilita la indisponibilidad de  algunos servicios en caso de fallos en la conexi\u00f3n con nube. El resultado evidencia un pobre tratamiento de la ciberseguridad por la mayor\u00eda de los operadores del sector y un riesgo en este tipo de instalaciones que puede pasar inadvertido al usuario.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('476','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Lara, Agust\u00edn W.;  Ternero, J. A.;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  Ruiz-Robles, Fernando;  D\u00edaz-Verdejo, Jes\u00fas E.<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('478','tp_links')\" style=\"cursor:pointer;\">HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)\r\n, <\/span><span class=\"tp_pub_additional_pages\">pp. 6, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_478\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('478','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_478\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('478','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_478\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('478','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_478\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{eicc2-firmas,<br \/>\r\ntitle = {HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments},<br \/>\r\nauthor = {Agust\u00edn W. Lara and J.A. Ternero and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Fernando Ruiz-Robles and Jes\u00fas E. D\u00edaz-Verdejo<br \/>\r\n},<br \/>\r\ndoi = {10.1145\/3590777.3590788},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-14},<br \/>\r\nurldate = {2023-06-14},<br \/>\r\nbooktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)<br \/>\r\n},<br \/>\r\npages = {6},<br \/>\r\nabstract = { IoT deployments often include a web-interface server for managerial purposes. Signature-based Intrusion Detection Systems are commonly used to detect HTTP attacks on these web servers. The standard signature repositories used by these defensive systems can be enhanced with new signatures generated automatically from attacks detected with anomaly detection techniques. <br \/>\r\n  This work presents a scheme for generating such anomaly-based signatures from HTTP attacks in a way that avoids excessive false positives. The signatures generated are distributed to peer sites in a multi-site environment. We also present a case study based on an IoT real-life dataset collected at four different SmartLight deployments from the same organization. Our results show a notable performance improvement (from $24.1%$ to $66.7%$) when anomaly-based signatures are added to the standard default Snort ruleset and distributed to the other three sites.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('478','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_478\" style=\"display:none;\"><div class=\"tp_abstract_entry\"> IoT deployments often include a web-interface server for managerial purposes. Signature-based Intrusion Detection Systems are commonly used to detect HTTP attacks on these web servers. The standard signature repositories used by these defensive systems can be enhanced with new signatures generated automatically from attacks detected with anomaly detection techniques. <br \/>\r\n  This work presents a scheme for generating such anomaly-based signatures from HTTP attacks in a way that avoids excessive false positives. The signatures generated are distributed to peer sites in a multi-site environment. We also present a case study based on an IoT real-life dataset collected at four different SmartLight deployments from the same organization. Our results show a notable performance improvement (from $24.1%$ to $66.7%$) when anomaly-based signatures are added to the standard default Snort ruleset and distributed to the other three sites.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('478','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_478\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3590777.3590788\" title=\"DOI de seguimiento:10.1145\/3590777.3590788\" target=\"_blank\">doi:10.1145\/3590777.3590788<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('478','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Fern\u00e1ndez, Elvira Castillo;  D\u00edaz-Verdejo, Jes\u00fas E.;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  Mu\u00f1oz-Calle, Javier;  Madinabeitia, Germ\u00e1n<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('477','tp_links')\" style=\"cursor:pointer;\">Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023), <\/span><span class=\"tp_pub_additional_pages\">pp. 6, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_477\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('477','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_477\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('477','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_477\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('477','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_477\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{eicc23-attacks,<br \/>\r\ntitle = {Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation},<br \/>\r\nauthor = {Elvira {Castillo Fern\u00e1ndez} and Jes\u00fas E. {D\u00edaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Javier {Mu\u00f1oz-Calle} and Germ\u00e1n Madinabeitia},<br \/>\r\ndoi = {10.1145\/3590777.3590778},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-14},<br \/>\r\nurldate = {2023-06-14},<br \/>\r\nbooktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)},<br \/>\r\npages = {6},<br \/>\r\nabstract = {Current network monitoring systems tend to generate several alerts per attack, especially in multistep attacks. However, Cybersecurity Officers (CSO) would rather receive a single alert summarizing the entire incident. Triggering a single alert per attack is a challenge that requires developing and evaluating advanced event correlation techniques and models to determine the relationships between the different observed events\/alerts.<br \/>\r\n<br \/>\r\nIn this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach. <br \/>\r\nIn our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models. <br \/>\r\nOur architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('477','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_477\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Current network monitoring systems tend to generate several alerts per attack, especially in multistep attacks. However, Cybersecurity Officers (CSO) would rather receive a single alert summarizing the entire incident. Triggering a single alert per attack is a challenge that requires developing and evaluating advanced event correlation techniques and models to determine the relationships between the different observed events\/alerts.<br \/>\r\n<br \/>\r\nIn this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach. <br \/>\r\nIn our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models. <br \/>\r\nOur architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('477','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_477\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3590777.3590778\" title=\"DOI de seguimiento:10.1145\/3590777.3590778\" target=\"_blank\">doi:10.1145\/3590777.3590778<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('477','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, Jes\u00fas E.;  Estepa Alonso, Rafael;  Estepa Alonso, Antonio;  Madinabeitia, German<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('264','tp_links')\" style=\"cursor:pointer;\">A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges<\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">Computers and Security, <\/span><span class=\"tp_pub_additional_volume\">vol. 124, <\/span><span class=\"tp_pub_additional_pages\">pp. 102997, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 01674048<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_264\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('264','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_264\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('264','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_264\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('264','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_264\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{Diaz-Verdejo2023,<br \/>\r\ntitle = {A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges},<br \/>\r\nauthor = {Jes\u00fas E. D\u00edaz-Verdejo and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and German Madinabeitia},<br \/>\r\ndoi = {10.1016\/j.cose.2022.102997},<br \/>\r\nissn = {01674048},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-01-01},<br \/>\r\nurldate = {2023-01-01},<br \/>\r\njournal = {Computers and Security},<br \/>\r\nvolume = {124},<br \/>\r\npages = {102997},<br \/>\r\nabstract = {Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a crucial layer of defense that allows organizations to detect cyberattacks on their web servers. Academic research overwhelmingly suggests using anomaly detection techniques to improve the performance of these defensive systems. However, analyzing and comparing the wide range of solutions in the scientific literature is challenging since they are typically presented as isolated (unrelated) contributions, and their results cannot be generalized. We believe that this impairs the industry&#039;s adoption of academic results and the advancement of research in this field. This paper aims to shed light on the literature on anomaly-based detection of attacks that use HTTP request messages. We define a novel framework for anomaly detection based on six data processing steps grouped into two sequential phases: preprocessing and classification. Based on this framework, we provide a taxonomy and critical review of the techniques surveyed, emphasizing their limitations and applicability. Future approaches should take advantage of the syntax and semantics of the Uniform Resource Locator (URL), be scalable, and address their obsolescence. These aspects are frequently overlooked in the literature and pose a significant challenge in the current era of web services. For better comparability, authors should use adequate public datasets, follow a thorough methodology, and use appropriate metrics that fully show the pros and cons of the approach.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('264','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_264\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a crucial layer of defense that allows organizations to detect cyberattacks on their web servers. Academic research overwhelmingly suggests using anomaly detection techniques to improve the performance of these defensive systems. However, analyzing and comparing the wide range of solutions in the scientific literature is challenging since they are typically presented as isolated (unrelated) contributions, and their results cannot be generalized. We believe that this impairs the industry&#039;s adoption of academic results and the advancement of research in this field. This paper aims to shed light on the literature on anomaly-based detection of attacks that use HTTP request messages. We define a novel framework for anomaly detection based on six data processing steps grouped into two sequential phases: preprocessing and classification. Based on this framework, we provide a taxonomy and critical review of the techniques surveyed, emphasizing their limitations and applicability. Future approaches should take advantage of the syntax and semantics of the Uniform Resource Locator (URL), be scalable, and address their obsolescence. These aspects are frequently overlooked in the literature and pose a significant challenge in the current era of web services. For better comparability, authors should use adequate public datasets, follow a thorough methodology, and use appropriate metrics that fully show the pros and cons of the approach.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('264','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_264\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2022.102997\" title=\"DOI de seguimiento:10.1016\/j.cose.2022.102997\" target=\"_blank\">doi:10.1016\/j.cose.2022.102997<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('264','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Mu\u00f1oz-calle, Javier;  Fructuoso, Javier;  Estepa, Rafael;  Estepa, Antonio<\/p><p class=\"tp_pub_title\">Evaluaci\u00f3n experimental de las capacidades de detecci\u00f3n de ciberataques basados en t\u00e9cnicas del modelo ATT &amp; CK mediante Snort <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las XVI Jornadas de Ingenier\u00eda Telem\u00e1tica &#8211; JITEL 2023, <\/span><span class=\"tp_pub_additional_pages\">pp. 5\u20138, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_487\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('487','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_487\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('487','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_487\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Munoz-calle2023,<br \/>\r\ntitle = {Evaluaci\u00f3n experimental de las capacidades de detecci\u00f3n de ciberataques basados en t\u00e9cnicas del modelo ATT & CK mediante Snort},<br \/>\r\nauthor = {Javier Mu\u00f1oz-calle and Javier Fructuoso and Rafael Estepa and Antonio Estepa},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-01-01},<br \/>\r\nurldate = {2023-01-01},<br \/>\r\nbooktitle = {Actas de las XVI Jornadas de Ingenier\u00eda Telem\u00e1tica - JITEL 2023},<br \/>\r\npages = {5\u20138},<br \/>\r\nabstract = {ATT&CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, as\u00b4\u0131 como las t\u00b4ecnicas que suelen ser usadas en cada paso del ataque. Ser\u00b4\u0131a interesante incorporar este modelo en el proceso de detecci\u00b4on de los ciberataques ya que facilitar\u00b4\u0131a la correlaci\u00b4on de las numerosas alertas generadas por los sistemas de monitorizaci\u00b4on de red. Sin embargo, la aplicaci\u00b4on del modelo en los procesos de correlaci\u00b4on de eventos no es inmediata, ya que no est\u00b4a formulado en t\u00b4erminos de eventos observables y\/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&CK en el procesamiento de la informaci\u00b4on generada por los sistemas de monitorizaci\u00b4on de la seguridad en la red.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('487','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_487\" style=\"display:none;\"><div class=\"tp_abstract_entry\">ATT&amp;CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, as\u00b4\u0131 como las t\u00b4ecnicas que suelen ser usadas en cada paso del ataque. Ser\u00b4\u0131a interesante incorporar este modelo en el proceso de detecci\u00b4on de los ciberataques ya que facilitar\u00b4\u0131a la correlaci\u00b4on de las numerosas alertas generadas por los sistemas de monitorizaci\u00b4on de red. Sin embargo, la aplicaci\u00b4on del modelo en los procesos de correlaci\u00b4on de eventos no es inmediata, ya que no est\u00b4a formulado en t\u00b4erminos de eventos observables y\/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&amp;CK en el procesamiento de la informaci\u00b4on generada por los sistemas de monitorizaci\u00b4on de la seguridad en la red.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('487','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Castillo-Fern\u00e1ndez, Elvira;  D\u00edaz-Verdejo, Jes\u00fas Esteban;  Alonso, Rafael Mar\u00eda Estepa;  Alonso, Antonio Estepa;  Mu\u00f1oz-Calle, Fco Javier<\/p><p class=\"tp_pub_title\">Uso practico del modelo ATT&amp;CK para la detecci\u00f3n de ciberataques <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las XVI Jornadas de Ingenier\u00eda Telem\u00e1tica &#8211; JITEL 2023, <\/span><span class=\"tp_pub_additional_pages\">pp. 1\u20134, <\/span><span class=\"tp_pub_additional_year\">2023<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 9783131450715<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_484\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('484','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_484\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('484','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_484\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Castillo-Fernandez2023,<br \/>\r\ntitle = {Uso practico del modelo ATT&CK para la detecci\u00f3n de ciberataques},<br \/>\r\nauthor = {Elvira Castillo-Fern\u00e1ndez and Jes\u00fas Esteban D\u00edaz-Verdejo and Rafael Mar\u00eda Estepa Alonso and Antonio Estepa Alonso and Fco Javier Mu\u00f1oz-Calle},<br \/>\r\nisbn = {9783131450715},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-01-01},<br \/>\r\nurldate = {2023-01-01},<br \/>\r\nbooktitle = {Actas de las XVI Jornadas de Ingenier\u00eda Telem\u00e1tica - JITEL 2023},<br \/>\r\npages = {1\u20134},<br \/>\r\nabstract = {ATT&CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, as\u00ed como las t\u00e9cnicas que suelen ser usadas en cada paso del ataque. Ser\u00eda interesante incorporar este modelo en el proceso de detecci\u00f3n de los ciberataques ya que facilitar\u00eda la correlaci\u00f3n de las numerosas alertas generadas por los sistemas de monitorizaci\u00f3n de red. Sin embargo, la aplicaci\u00f3n del modelo en los procesos de correlaci\u00f3n de eventos no es inmediata, ya que no est\u00e1 formulado en t\u00e9rminos de eventos observables y\/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&CK en el procesamiento de la informaci\u00f3n generada por los sistemas de monitorizaci\u00f3n de la seguridad en la red.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('484','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_484\" style=\"display:none;\"><div class=\"tp_abstract_entry\">ATT&amp;CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, as\u00ed como las t\u00e9cnicas que suelen ser usadas en cada paso del ataque. Ser\u00eda interesante incorporar este modelo en el proceso de detecci\u00f3n de los ciberataques ya que facilitar\u00eda la correlaci\u00f3n de las numerosas alertas generadas por los sistemas de monitorizaci\u00f3n de red. Sin embargo, la aplicaci\u00f3n del modelo en los procesos de correlaci\u00f3n de eventos no es inmediata, ya que no est\u00e1 formulado en t\u00e9rminos de eventos observables y\/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&amp;CK en el procesamiento de la informaci\u00f3n generada por los sistemas de monitorizaci\u00f3n de la seguridad en la red.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('484','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2022\">2022<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Alonso, Antonio Estepa;  Alonso, Rafael Estepa;  Wideberg, Johan;  D\u00edaz-Verdejo, Jes\u00fas;  Marquez, Adolfo Crespo<\/p><p class=\"tp_pub_title\">Smart Detection of Cyberattacks in IoT servers: Application to smart lighting and other smart city applications <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span> Leva, Maria Chiara;  Petelli, Edoardo;  Podofillini, Luca;  Wilson, Simon (Ed.): <span class=\"tp_pub_additional_booktitle\">European Conference on Safety and Reliability (ESREL 2022), <\/span><span class=\"tp_pub_additional_pages\">pp. 3-4, <\/span><span class=\"tp_pub_additional_year\">2022<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_481\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('481','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_481\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{esrel22,<br \/>\r\ntitle = {Smart Detection of Cyberattacks in IoT servers: Application to smart lighting and other smart city applications},<br \/>\r\nauthor = {Antonio {Estepa Alonso} and Rafael {Estepa Alonso} and Johan Wideberg and Jes\u00fas {D\u00edaz-Verdejo} and Adolfo {Crespo Marquez}},<br \/>\r\neditor = {Maria {Chiara Leva} and Edoardo Petelli and Luca Podofillini and Simon Wilson},<br \/>\r\nyear  = {2022},<br \/>\r\ndate = {2022-08-31},<br \/>\r\nurldate = {2022-08-31},<br \/>\r\nbooktitle = {European Conference on Safety and Reliability (ESREL 2022)},<br \/>\r\njournal = {European Conference on Safety and Reliability (ESREL 2022)},<br \/>\r\npages = {3-4},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('481','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Mu\u00f1oz, Javier;  Bueno, Felipe;  Estepa, Rafael;  Estepa, Antonio;  D\u00edaz-Verdejo, Jes\u00fas E.<\/p><p class=\"tp_pub_title\">Ataques a servidores web: estudio experimental de la capacidad de detecci\u00f3n de algunos SIDS gratuitos <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_booktitle\">Actas de las VII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC&#039;22), <\/span><span class=\"tp_pub_additional_pages\">pp. 22\u201325, <\/span><span class=\"tp_pub_additional_year\">2022<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 9878488734136<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_266\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('266','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_266\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('266','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_266\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Munoz-jnic22,<br \/>\r\ntitle = {Ataques a servidores web: estudio experimental de la capacidad de detecci\u00f3n de algunos SIDS gratuitos},<br \/>\r\nauthor = {Javier Mu\u00f1oz and Felipe Bueno and Rafael Estepa and Antonio Estepa and Jes\u00fas E. D\u00edaz-Verdejo},<br \/>\r\nisbn = {9878488734136},<br \/>\r\nyear  = {2022},<br \/>\r\ndate = {2022-01-01},<br \/>\r\nurldate = {2022-01-01},<br \/>\r\nbooktitle = {Actas de las VII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC&#039;22)},<br \/>\r\npages = {22--25},<br \/>\r\nabstract = {Este trabajo cuantifica de forma experimental la capacidad de detecci\u00f3n de ataques a servidores web ofrecida por algunos de los detectores de intrusiones basados en firmas (SIDS) disponibles de forma gratuita. Para ello, se ha realizado una b\u00fasqueda y selecci\u00f3n de 28 herramientas actuales para la generaci\u00f3n de ataques y an\u00e1lisis de seguridad del servicio web. Con ellas, se han realizado casi 150 ataques a dos escenarios de uso de un servidor web (una web est\u00e1tica y una din\u00e1mica). Las peticiones HTTP registradas durante los ataques han sido utilizadas para crear un dataset de ataques que ser\u00e1 utilizado como entrada a tres SIDS gratuitos seleccionados por su amplio uso, de forma que se podr\u00e1 determinar la capacidad de detecci\u00f3n de los mismos frente a los ataques generados. Este trabajo se encuentra a\u00fan en desarrollo, por lo que en esta contribuci\u00f3n se muestran los primeros resultados relativos a la recolecci\u00f3n y selecci\u00f3n de herramientas para la generaci\u00f3n de los ataques, la generaci\u00f3n del dataset de ataques de forma que sea representativo de los ataques actuales y la evaluaci\u00f3n preliminar de las capacidades de detecci\u00f3n.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('266','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_266\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Este trabajo cuantifica de forma experimental la capacidad de detecci\u00f3n de ataques a servidores web ofrecida por algunos de los detectores de intrusiones basados en firmas (SIDS) disponibles de forma gratuita. Para ello, se ha realizado una b\u00fasqueda y selecci\u00f3n de 28 herramientas actuales para la generaci\u00f3n de ataques y an\u00e1lisis de seguridad del servicio web. Con ellas, se han realizado casi 150 ataques a dos escenarios de uso de un servidor web (una web est\u00e1tica y una din\u00e1mica). Las peticiones HTTP registradas durante los ataques han sido utilizadas para crear un dataset de ataques que ser\u00e1 utilizado como entrada a tres SIDS gratuitos seleccionados por su amplio uso, de forma que se podr\u00e1 determinar la capacidad de detecci\u00f3n de los mismos frente a los ataques generados. Este trabajo se encuentra a\u00fan en desarrollo, por lo que en esta contribuci\u00f3n se muestran los primeros resultados relativos a la recolecci\u00f3n y selecci\u00f3n de herramientas para la generaci\u00f3n de los ataques, la generaci\u00f3n del dataset de ataques de forma que sea representativo de los ataques actuales y la evaluaci\u00f3n preliminar de las capacidades de detecci\u00f3n.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('266','tp_abstract')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00edaz-Verdejo, J. E.;  Mu\u00f1oz-Calle, F. J.;  Estepa Alonso, A.;  Estepa Alonso, R.;  Madinabeitia, G.<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('263','tp_links')\" style=\"cursor:pointer;\">On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks<\/a> <span class=\"tp_pub_type tp_  article\">Art\u00edculo de revista<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">En: <\/span><span class=\"tp_pub_additional_journal\">Applied Sciences, <\/span><span class=\"tp_pub_additional_volume\">vol. 12, <\/span><span class=\"tp_pub_additional_number\">no 2, <\/span><span class=\"tp_pub_additional_pages\">pp. 852, <\/span><span class=\"tp_pub_additional_year\">2022<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 20763417<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_263\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('263','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_263\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('263','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_263\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('263','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_263\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{Diaz-Verdejo2022,<br \/>\r\ntitle = {On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks},<br \/>\r\nauthor = {J. E. D\u00edaz-Verdejo and F. J. Mu\u00f1oz-Calle and {Estepa Alonso}, A. and {Estepa Alonso}, R. and G. Madinabeitia},<br \/>\r\nurl = {https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852\/htm https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852},<br \/>\r\ndoi = {10.3390\/app12020852},<br \/>\r\nissn = {20763417},<br \/>\r\nyear  = {2022},<br \/>\r\ndate = {2022-01-01},<br \/>\r\nurldate = {2022-01-01},<br \/>\r\njournal = {Applied Sciences},<br \/>\r\nvolume = {12},<br \/>\r\nnumber = {2},<br \/>\r\npages = {852},<br \/>\r\npublisher = {Multidisciplinary Digital Publishing Institute},<br \/>\r\nabstract = {Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort&rsquo;s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('263','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_263\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort&amp;rsquo;s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('263','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_263\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852\/htm https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852\" title=\"https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852\/htm https:\/\/www.mdpi.com\/2076-3417\/12\/2\/[...]\" target=\"_blank\">https:\/\/www.mdpi.com\/2076-3417\/12\/2\/852\/htm https:\/\/www.mdpi.com\/2076-3417\/12\/2\/[&#8230;]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.3390\/app12020852\" title=\"DOI de seguimiento:10.3390\/app12020852\" target=\"_blank\">doi:10.3390\/app12020852<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('263','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><\/div><div class=\"tablenav\"><div class=\"tablenav-pages\"><span class=\"displaying-num\">156 registros<\/span> <a class=\"page-numbers button disabled\">&laquo;<\/a> <a class=\"page-numbers button disabled\">&lsaquo;<\/a> 1 de 8 <a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/personal\/jedv\/?limit=2&amp;tgid=&amp;yr=&amp;type=&amp;usr=&amp;auth=&amp;tsr=#tppubs\" title=\"p\u00e1gina siguiente\" class=\"page-numbers button\">&rsaquo;<\/a> <a href=\"https:\/\/dtstc.ugr.es\/neus-cslab\/personal\/jedv\/?limit=8&amp;tgid=&amp;yr=&amp;type=&amp;usr=&amp;auth=&amp;tsr=#tppubs\" title=\"\u00faltima p\u00e1gina\" class=\"page-numbers button\">&raquo;<\/a> <\/div><\/div><\/div><\/p><p style=\"margin-left: 15px;\">NOTA: La paginaci\u00f3n afecta a todos los apartados. Vuelva a la p\u00e1gina 1 para ver los elementos de otras categor\u00edas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd3be76 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd3be76\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb879b7\" data-id=\"cb879b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdd8fcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdd8fcd\" data-element_type=\"section\" data-e-type=\"section\" id=\"proyectosi\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-bea039d\" data-id=\"bea039d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a38a8f elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"1a38a8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-2a87f08\" data-id=\"2a87f08\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-894f61a elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"894f61a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-229d82e\" data-id=\"229d82e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbf2c2d elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"cbf2c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-3bd4d8c\" data-id=\"3bd4d8c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c933f5 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"1c933f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-47e598b\" data-id=\"47e598b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff71ad5 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"ff71ad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-5dad37b\" data-id=\"5dad37b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d18639 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"2d18639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d583fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d583fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27af471\" data-id=\"27af471\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc44203 elementor-widget elementor-widget-heading\" data-id=\"cc44203\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proyectos de investigaci\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f880c0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0f880c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_publication_list\"><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PID2024-155581OB-C21<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('503','tp_links')\" style=\"cursor:pointer;\">Forensic UEBA: Detecci\u00f3n temprana de ciberataques con custodia forense de evidencias digitales en entornos corporativos (FUEBA+)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Ministerio de Ciencia e Innovaci\u00f3n<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Sevilla  \/ Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/09\/2025 a 31\/08\/2028<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_503\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('503','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_503\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('503','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_503\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{fueba,<br \/>\r\ntitle = {Forensic UEBA: Detecci\u00f3n temprana de ciberataques con custodia forense de evidencias digitales en entornos corporativos (FUEBA+)},<br \/>\r\nurl = {\/neus-cslab\/ifueba},<br \/>\r\nyear  = {2026},<br \/>\r\ndate = {2026-02-10},<br \/>\r\nnumber = {PID2024-155581OB-C21},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Sevilla  \/ Univ. Granada},<br \/>\r\norganization = {Ministerio de Ciencia e Innovaci\u00f3n},<br \/>\r\nseries = {01\/09\/2025 a 31\/08\/2028},<br \/>\r\nnote = {124250 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('503','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_503\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/ifueba\" title=\"\/neus-cslab\/ifueba\" target=\"_blank\">\/neus-cslab\/ifueba<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('503','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>A-TIC-224-UGR20<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('406','tp_links')\" style=\"cursor:pointer;\">Modelado de Ataques y Detecci\u00f3n de Incidentes de Ciberseguridad (MADINCI)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Granada &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos I+D+i del Programa Operativo FEDER 2020<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada y Univ. Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2022 a 30\/06\/2023<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_406\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('406','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_406\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('406','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_406\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{madinci,<br \/>\r\ntitle = {Modelado de Ataques y Detecci\u00f3n de Incidentes de Ciberseguridad (MADINCI)},<br \/>\r\nurl = {\/neus-cslab\/madinci},<br \/>\r\nyear  = {2022},<br \/>\r\ndate = {2022-01-01},<br \/>\r\nurldate = {2022-01-01},<br \/>\r\nissuetitle = {Proyectos I+D+i del Programa Operativo FEDER 2020},<br \/>\r\nnumber = {A-TIC-224-UGR20},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {Univ. Granada y Univ. Sevilla},<br \/>\r\norganization = {Universidad de Granada - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/01\/2022 a 30\/06\/2023},<br \/>\r\nnote = {20000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('406','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_406\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/madinci\" title=\"\/neus-cslab\/madinci\" target=\"_blank\">\/neus-cslab\/madinci<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('406','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PID2020-115199RB-I00 <\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('3','tp_links')\" style=\"cursor:pointer;\">Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Ministerio de Ciencia e Innovaci\u00f3n <\/i> &#8211; MICIN\/AEI\/10.13039\/50110 0 011033<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada \/ Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>8<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/09\/2021 a 31\/08\/2024<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_3\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{coincyde,<br \/>\r\ntitle = {Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)},<br \/>\r\nauthor = {<br \/>\r\n<br \/>\r\n},<br \/>\r\nurl = {\/neus-cslab\/proyectos-idi\/coincyde},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-09-01},<br \/>\r\nurldate = {2021-09-01},<br \/>\r\nbooktitle = {Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)},<br \/>\r\nissuetitle = {MICIN\/AEI\/10.13039\/50110 0 011033},<br \/>\r\nnumber = {PID2020-115199RB-I00 },<br \/>\r\npages = {8},<br \/>\r\ninstitution = {Universidad de Granada \/ Universidad de Sevilla},<br \/>\r\norganization = {Ministerio de Ciencia e Innovaci\u00f3n },<br \/>\r\nseries = {01\/09\/2021 a 31\/08\/2024},<br \/>\r\nabstract = {Los sistemas de monitorizaci\u00f3n de la seguridad en red (NSM) se encuentran hoy en d\u00eda entre los componentes m\u00e1s relevantes para la detecci\u00f3n y respuesta a los ciberataques. Sin embargo, sus capacidades de detecci\u00f3n se limitan en su mayor\u00eda a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. As\u00ed, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas t\u00e9cnicas para mejorar las capacidades de detecci\u00f3n mediante la adici\u00f3n de nuevos m\u00e9todos basados en anomal\u00edas combinados con la correlaci\u00f3n y priorizaci\u00f3n de alertas incorporando informaci\u00f3n contextual de la red. Esto mejorar\u00e1 la calidad de las alertas y reducir\u00e1 la tasa de falsos positivos.<br \/>\r\n<br \/>\r\nEn esta propuesta se plantea el desarrollo de un NSM espec\u00edfico para plantas industriales con elementos del Internet of Things (IoT) y, m\u00e1s concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la soluci\u00f3n objeto de este proyecto son aquellas que permiten el control y monitorizaci\u00f3n de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicaci\u00f3n o servicio web que se utiliza como interfaz de usuario para la gesti\u00f3n de servicios inteligentes. La elecci\u00f3n del escenario tiene<br \/>\r\nuna triple motivaci\u00f3n. Primero, por la gran relevancia y expansi\u00f3n de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos espec\u00edficos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selecci\u00f3n del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporaci\u00f3n de informaci\u00f3n contextual.<br \/>\r\n<br \/>\r\nEl sistema a desarrollar incorporar\u00e1 m\u00faltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores espec\u00edficos para el escenario que est\u00e1n orientados a las diversas amenazas existentes. As\u00ed, se desarrollar\u00e1n detectores basados en anomal\u00edas a nivel del tr\u00e1fico observado (flujos), a nivel de aplicaci\u00f3n (sensorizaci\u00f3n) y a nivel de los servicios web usados para la operaci\u00f3n remota. Adicionalmente, se har\u00e1 uso de t\u00e9cnicas de inteligencia artificial para la correlaci\u00f3n y priorizaci\u00f3n de las alertas incorporando informaci\u00f3n relativa al estado e historia previa de la red. Esto permitir\u00e1 identificar falsos positivos, reducir el n\u00famero de alertas finalmente enviadas al CSO y mejorar la informaci\u00f3n en las mismas.<br \/>\r\n<br \/>\r\nUn elemento relevante y novedoso es el uso de una matriz de tr\u00e1fico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene informaci\u00f3n sobre las conexiones de red que pueden explotarse para m\u00faltiples usos. As\u00ed, se pueden establecer algunos indicadores de compromiso para identificar ataques. Tambi\u00e9n se puede utilizar para aplicar varios tipos de an\u00e1lisis de miner\u00eda de datos, como la b\u00fasqueda de patrones comunes entre flujos, realizar perfiles de tr\u00e1fico de servicios, evaluar la importancia y encontrar relaciones entre activos. La informaci\u00f3n extra\u00edda de esta matriz se utilizar\u00e1 como informaci\u00f3n contextual en la correlaci\u00f3n y priorizaci\u00f3n de alertas.<br \/>\r\n<br \/>\r\nFinalmente, la arquitectura propuesta incluye realimentaci\u00f3n a partir de las acciones del CSO, lo que permite evaluar la calidad de detecci\u00f3n y priorizaci\u00f3n y ajustar el rendimiento del sistema.},<br \/>\r\nnote = {47795 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_3\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Los sistemas de monitorizaci\u00f3n de la seguridad en red (NSM) se encuentran hoy en d\u00eda entre los componentes m\u00e1s relevantes para la detecci\u00f3n y respuesta a los ciberataques. Sin embargo, sus capacidades de detecci\u00f3n se limitan en su mayor\u00eda a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. As\u00ed, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas t\u00e9cnicas para mejorar las capacidades de detecci\u00f3n mediante la adici\u00f3n de nuevos m\u00e9todos basados en anomal\u00edas combinados con la correlaci\u00f3n y priorizaci\u00f3n de alertas incorporando informaci\u00f3n contextual de la red. Esto mejorar\u00e1 la calidad de las alertas y reducir\u00e1 la tasa de falsos positivos.<br \/>\r\n<br \/>\r\nEn esta propuesta se plantea el desarrollo de un NSM espec\u00edfico para plantas industriales con elementos del Internet of Things (IoT) y, m\u00e1s concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la soluci\u00f3n objeto de este proyecto son aquellas que permiten el control y monitorizaci\u00f3n de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicaci\u00f3n o servicio web que se utiliza como interfaz de usuario para la gesti\u00f3n de servicios inteligentes. La elecci\u00f3n del escenario tiene<br \/>\r\nuna triple motivaci\u00f3n. Primero, por la gran relevancia y expansi\u00f3n de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos espec\u00edficos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selecci\u00f3n del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporaci\u00f3n de informaci\u00f3n contextual.<br \/>\r\n<br \/>\r\nEl sistema a desarrollar incorporar\u00e1 m\u00faltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores espec\u00edficos para el escenario que est\u00e1n orientados a las diversas amenazas existentes. As\u00ed, se desarrollar\u00e1n detectores basados en anomal\u00edas a nivel del tr\u00e1fico observado (flujos), a nivel de aplicaci\u00f3n (sensorizaci\u00f3n) y a nivel de los servicios web usados para la operaci\u00f3n remota. Adicionalmente, se har\u00e1 uso de t\u00e9cnicas de inteligencia artificial para la correlaci\u00f3n y priorizaci\u00f3n de las alertas incorporando informaci\u00f3n relativa al estado e historia previa de la red. Esto permitir\u00e1 identificar falsos positivos, reducir el n\u00famero de alertas finalmente enviadas al CSO y mejorar la informaci\u00f3n en las mismas.<br \/>\r\n<br \/>\r\nUn elemento relevante y novedoso es el uso de una matriz de tr\u00e1fico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene informaci\u00f3n sobre las conexiones de red que pueden explotarse para m\u00faltiples usos. As\u00ed, se pueden establecer algunos indicadores de compromiso para identificar ataques. Tambi\u00e9n se puede utilizar para aplicar varios tipos de an\u00e1lisis de miner\u00eda de datos, como la b\u00fasqueda de patrones comunes entre flujos, realizar perfiles de tr\u00e1fico de servicios, evaluar la importancia y encontrar relaciones entre activos. La informaci\u00f3n extra\u00edda de esta matriz se utilizar\u00e1 como informaci\u00f3n contextual en la correlaci\u00f3n y priorizaci\u00f3n de alertas.<br \/>\r\n<br \/>\r\nFinalmente, la arquitectura propuesta incluye realimentaci\u00f3n a partir de las acciones del CSO, lo que permite evaluar la calidad de detecci\u00f3n y priorizaci\u00f3n y ajustar el rendimiento del sistema.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_3\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/proyectos-idi\/coincyde\" title=\"\/neus-cslab\/proyectos-idi\/coincyde\" target=\"_blank\">\/neus-cslab\/proyectos-idi\/coincyde<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PYC20-RE-087-USE<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('405','tp_links')\" style=\"cursor:pointer;\">Sistema para la detecci\u00f3n temprana de ciberataques en industria conectada e IoT mediante detecci\u00f3n de anomal\u00edas multiplanta<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Sevilla &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3 (CEI20)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla, Wellness TechGroup como agente agregado<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2021 a 31\/12\/2022<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_405\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('405','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_405\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('405','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_405\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{cei2,<br \/>\r\ntitle = {Sistema para la detecci\u00f3n temprana de ciberataques en industria conectada e IoT mediante detecci\u00f3n de anomal\u00edas multiplanta},<br \/>\r\nurl = {\/neus-cslab\/proyectosidi\/cei2},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-01-01},<br \/>\r\nurldate = {2021-01-01},<br \/>\r\nissuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3 (CEI20)},<br \/>\r\nnumber = {PYC20-RE-087-USE},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},<br \/>\r\norganization = {Universidad de Sevilla - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/01\/2021 a 31\/12\/2022},<br \/>\r\nnote = {68550 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('405','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_405\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/proyectosidi\/cei2\" title=\"\/neus-cslab\/proyectosidi\/cei2\" target=\"_blank\">\/neus-cslab\/proyectosidi\/cei2<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('405','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>2020\/00000172<\/b> <\/span> &#8211; Detecci\u00f3n Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gram\u00e1ticas adaptativas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>US &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla, Wellness TechGroup como agente agregado<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/03\/2020\ta 30\/09\/2021<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_407\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('407','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_407\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{cei1,<br \/>\r\ntitle = {Detecci\u00f3n Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gram\u00e1ticas adaptativas},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nissuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3},<br \/>\r\nnumber = {2020\/00000172},<br \/>\r\ninstitution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},<br \/>\r\norganization = {US - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/03\/2020\ta 30\/09\/2021},<br \/>\r\nnote = {33000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('407','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEC2011-22579<\/b> <\/span> &#8211; SuMA: Supervivencia de Redes MANET ante Incidentes de Seguridad<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MICINN<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>7<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2012 a 31\/12\/2014<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_408\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('408','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_408\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{suma,<br \/>\r\ntitle = {SuMA: Supervivencia de Redes MANET ante Incidentes de Seguridad},<br \/>\r\nyear  = {2012},<br \/>\r\ndate = {2012-01-01},<br \/>\r\nurldate = {2012-01-01},<br \/>\r\nnumber = {TEC2011-22579},<br \/>\r\npages = {7},<br \/>\r\ninstitution = {Universidad de Granada},<br \/>\r\norganization = {MICINN},<br \/>\r\nseries = {01\/01\/2012 a 31\/12\/2014},<br \/>\r\nnote = {56.265,00 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('408','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEC2008-06663-C03-02<\/b> <\/span> &#8211; Seguridad del entorno en redes Peer-to-Peer<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCI<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y Universidad Polit\u00e9cnica de Catalu\u00f1a<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2009 a 31\/12\/2011<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_409\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('409','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_409\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{p2p,<br \/>\r\ntitle = {Seguridad del entorno en redes Peer-to-Peer},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\nnumber = {TEC2008-06663-C03-02},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Granada y Universidad Polit\u00e9cnica de Catalu\u00f1a},<br \/>\r\norganization = {MCI},<br \/>\r\nseries = {01\/01\/2009 a 31\/12\/2011},<br \/>\r\nnote = {56386 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('409','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>EUREKA-CELTIC (CP3-011)<\/b> <\/span> &#8211; RED (\u201cReaction Acter Detection\u201d (colaboraci\u00f3n\/subcontrataci\u00f3n UPM )<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>EUREKA-CELTIC (CP3-011)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>EADS, Thales, Alcatel-Lucent, France Telecom, Exaproyect, GET\/ENST, TelIndus, GMV-SGI, UPM, UPV, Innovae, Telef\u00f3nica I+D, Centre de Reserche Public Henri Tudor<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2007 a 31\/12\/2007<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_410\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('410','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_410\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{red,<br \/>\r\ntitle = {RED (\u201cReaction Acter Detection\u201d (colaboraci\u00f3n\/subcontrataci\u00f3n UPM )},<br \/>\r\nyear  = {2007},<br \/>\r\ndate = {2007-01-01},<br \/>\r\nnumber = {EUREKA-CELTIC (CP3-011)},<br \/>\r\ninstitution = {EADS, Thales, Alcatel-Lucent, France Telecom, Exaproyect, GET\/ENST, TelIndus, GMV-SGI, UPM, UPV, Innovae, Telef\u00f3nica I+D, Centre de Reserche Public Henri Tudor},<br \/>\r\norganization = {EUREKA-CELTIC (CP3-011)},<br \/>\r\nseries = {01\/01\/2007 a 31\/12\/2007},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('410','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TSI2005-08145-C02-02<\/b> <\/span> &#8211; Modelo de Arquitectura por Capas para la Detecci\u00f3n Ubicua de Ataques y Respuesta<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y esCERT (UPC)<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>31\/12\/2005 a 31\/12\/2008<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_411\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('411','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_411\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{gidre,<br \/>\r\ntitle = {Modelo de Arquitectura por Capas para la Detecci\u00f3n Ubicua de Ataques y Respuesta},<br \/>\r\nyear  = {2005},<br \/>\r\ndate = {2005-12-31},<br \/>\r\nurldate = {2005-12-31},<br \/>\r\nnumber = {TSI2005-08145-C02-02},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Granada y esCERT (UPC)},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {31\/12\/2005 a 31\/12\/2008},<br \/>\r\nnote = {60000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('411','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC2002-11450-E<\/b> <\/span> &#8211; Ayuda del VI Programa Marco: MAVERICK: Multicast-voice over IP Secure Services in Active Networks<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>12\/09\/2003 a 11\/09\/2004<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_412\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('412','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_412\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{maverick,<br \/>\r\ntitle = {Ayuda del VI Programa Marco: MAVERICK: Multicast-voice over IP Secure Services in Active Networks},<br \/>\r\nyear  = {2003},<br \/>\r\ndate = {2003-09-12},<br \/>\r\nnumber = {TIC2002-11450-E},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {12\/09\/2003 a 11\/09\/2004},<br \/>\r\nnote = {2000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('412','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC2002-02798<\/b> <\/span> &#8211; Servicios Seguros de Multidifusi\u00f3n de Voz sobre IP en Redes Activas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/12\/2002 a 30\/12\/2005<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_413\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('413','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_413\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{redesactivas,<br \/>\r\ntitle = {Servicios Seguros de Multidifusi\u00f3n de Voz sobre IP en Redes Activas},<br \/>\r\nyear  = {2002},<br \/>\r\ndate = {2002-12-01},<br \/>\r\nnumber = {TIC2002-02798},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {01\/12\/2002 a 30\/12\/2005},<br \/>\r\nnote = {32000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('413','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>AYA2002-0802<\/b> <\/span> &#8211; BOOTES-IT: El Descubrimiento y Estudio de los Objetos m\u00e1s Lejanos del Universo con Instrumentaci\u00f3n Rob\u00f3tica en el IR Cercano<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Instituto de Astrof\u00edsica de Andaluc\u00eda (IAA), Univ. de Granada, Obs. Astron\u00f3mico de Brera (Italia), Obs. Astron\u00f3mico de Ond\u0159ejov (R.Checa), Inst. de Astrof\u00edsica de Canarias, Univ. de Valencia, INTA-LAEFF, Univ. de Alicante, Hubble Space Telescope Science Institute (Baltimore, EEUU), Univ. T\u00e9cnica Checa, Institute of Geophysics &amp; Planetary Physics, Univ. California (Los \u00c1ngeles, EEUU), Obs. Astron\u00f3mico de Roma (Italia), Obs. Astron\u00f3mico de la Univ. Estatal de Nikolaev (Ucrania)<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>24<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/10\/2002 s 30\/09\/2004<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_419\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('419','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_419\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{bootes,<br \/>\r\ntitle = {BOOTES-IT: El Descubrimiento y Estudio de los Objetos m\u00e1s Lejanos del Universo con Instrumentaci\u00f3n Rob\u00f3tica en el IR Cercano},<br \/>\r\nyear  = {2002},<br \/>\r\ndate = {2002-10-01},<br \/>\r\nnumber = {AYA2002-0802},<br \/>\r\npages = {24},<br \/>\r\ninstitution = {Instituto de Astrof\u00edsica de Andaluc\u00eda (IAA), Univ. de Granada, Obs. Astron\u00f3mico de Brera (Italia), Obs. Astron\u00f3mico de Ond\u0159ejov (R.Checa), Inst. de Astrof\u00edsica de Canarias, Univ. de Valencia, INTA-LAEFF, Univ. de Alicante, Hubble Space Telescope Science Institute (Baltimore, EEUU), Univ. T\u00e9cnica Checa, Institute of Geophysics & Planetary Physics, Univ. California (Los \u00c1ngeles, EEUU), Obs. Astron\u00f3mico de Roma (Italia), Obs. Astron\u00f3mico de la Univ. Estatal de Nikolaev (Ucrania)},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {01\/10\/2002 s 30\/09\/2004},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('419','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEL1999-0619<\/b> <\/span> &#8211; NoVo: Sistema Autom\u00e1tico Basado en Reconocimiento de Voz para el Acceso Remoto a Noticias<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2000 a 31\/12\/2001<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_414\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('414','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_414\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{novo,<br \/>\r\ntitle = {NoVo: Sistema Autom\u00e1tico Basado en Reconocimiento de Voz para el Acceso Remoto a Noticias},<br \/>\r\nyear  = {2000},<br \/>\r\ndate = {2000-01-01},<br \/>\r\nurldate = {0200-01-01},<br \/>\r\nnumber = {TEL1999-0619},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/01\/2000 a 31\/12\/2001},<br \/>\r\nnote = {6.200.000 ptas (37262,75 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('414','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 96-0956-C04-04<\/b> <\/span> &#8211; Interfaces Multimodales en Comunicaciones Hombre-M\u00e1quina<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y Univ. de Vigo<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>11<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/08\/1996 a 31\/07\/1999<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_415\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('415','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_415\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{multimodales,<br \/>\r\ntitle = {Interfaces Multimodales en Comunicaciones Hombre-M\u00e1quina},<br \/>\r\nyear  = {1996},<br \/>\r\ndate = {1996-08-01},<br \/>\r\nnumber = {TIC 96-0956-C04-04},<br \/>\r\npages = {11},<br \/>\r\ninstitution = {Universidad de Granada y Univ. de Vigo},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/08\/1996 a 31\/07\/1999},<br \/>\r\nnote = {14.500.000 ptas. (87146,76 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('415','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 92-0662<\/b> <\/span> &#8211; Reconocimiento de Voz Continua Mediante T\u00e9cnicas MVQHMM y RNN<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>05\/06\/1992 a 05\/06\/1995<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_416\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('416','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_416\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{csr,<br \/>\r\ntitle = {Reconocimiento de Voz Continua Mediante T\u00e9cnicas MVQHMM y RNN},<br \/>\r\nyear  = {1992},<br \/>\r\ndate = {1992-06-05},<br \/>\r\nnumber = {TIC 92-0662},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {05\/06\/1992 a 05\/06\/1995},<br \/>\r\nnote = {7.601.000 ptas. (45682,93 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('416','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 91-1488-C06-05<\/b> <\/span> &#8211; ALBAYZIN<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada, Univ. Polit\u00e9cnica de Valencia, Univ. Polit\u00e9cnica de Madrid, Univ. Aut\u00f3noma de Barcelona y Univ. Polit\u00e9cnica de Catalu\u00f1a<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>06\/08\/1991 a 06\/08\/1993<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_417\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('417','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_417\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{albayzin,<br \/>\r\ntitle = {ALBAYZIN},<br \/>\r\nyear  = {1991},<br \/>\r\ndate = {1991-08-06},<br \/>\r\nnumber = {TIC 91-1488-C06-05},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Universidad de Granada, Univ. Polit\u00e9cnica de Valencia, Univ. Polit\u00e9cnica de Madrid, Univ. Aut\u00f3noma de Barcelona y Univ. Polit\u00e9cnica de Catalu\u00f1a},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {06\/08\/1991 a 06\/08\/1993},<br \/>\r\nnote = {2600000 ptas, (15626,31 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('417','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 88-0774<\/b> <\/span> &#8211; Desarrollo de sistemas para codificaci\u00f3n y reconocimiento de la voz<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/1989 a 31\/12\/1991<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_418\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('418','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_418\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{voz,<br \/>\r\ntitle = {Desarrollo de sistemas para codificaci\u00f3n y reconocimiento de la voz},<br \/>\r\nyear  = {1989},<br \/>\r\ndate = {1989-01-01},<br \/>\r\nnumber = {TIC 88-0774},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/01\/1989 a 31\/12\/1991},<br \/>\r\nnote = {20760000 ptas, (137247,12 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('418','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/p><p style=\"margin-left: 15px;\">NOTA: La paginaci\u00f3n afecta a todos los apartados. Vuelva a la p\u00e1gina 1 para ver los elementos de otras categor\u00edas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f2e31b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f2e31b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c10a308\" data-id=\"c10a308\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-29033ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29033ad\" data-element_type=\"section\" data-e-type=\"section\" id=\"transf\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-d6c931a\" data-id=\"d6c931a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25d6c1b elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"25d6c1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-425f984\" data-id=\"425f984\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4241522 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"4241522\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-5a14f54\" data-id=\"5a14f54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f803f7 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"2f803f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-8fd925e\" data-id=\"8fd925e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26edcdd elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"26edcdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-63eb6d3\" data-id=\"63eb6d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-266ffeb elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"266ffeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-773b368\" data-id=\"773b368\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af615ae elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"af615ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-706c761 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"706c761\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae75c56\" data-id=\"ae75c56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92ae1c3 elementor-widget elementor-widget-heading\" data-id=\"92ae1c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acciones de transferencia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1718be6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1718be6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #038daa;\">Proyectos transf.<\/span><\/h3><p><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_publication_list\"><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2437\/22\/2023<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('497','tp_links')\" style=\"cursor:pointer;\">OREOS (&quot;Soluci\u00f3n integral de Gesti\u00f3n de Identidades de Nueva Generaci\u00f3n&quot;)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>WHITEBEARSOLUTIONS S.L<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA &#8211; Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>02\/06\/2023 a 29\/11\/2025<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_497\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('497','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_497\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('497','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_497\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{oreos,<br \/>\r\ntitle = {OREOS (\"Soluci\u00f3n integral de Gesti\u00f3n de Identidades de Nueva Generaci\u00f3n\")},<br \/>\r\nurl = {\/neus-cslab\/oreos},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-02},<br \/>\r\nurldate = {2023-06-02},<br \/>\r\nnumber = {PI-2437\/22\/2023},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {AICIA - Universidad de Sevilla},<br \/>\r\norganization = {WHITEBEARSOLUTIONS S.L},<br \/>\r\nseries = {02\/06\/2023 a 29\/11\/2025},<br \/>\r\nnote = {100000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('497','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_497\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/oreos\" title=\"\/neus-cslab\/oreos\" target=\"_blank\">\/neus-cslab\/oreos<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('497','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2132\/22\/2021<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('420','tp_links')\" style=\"cursor:pointer;\">Detecci\u00f3n de ciberamenazas en los sistemas de monitorizaci\u00f3n y control de instalaciones de Generaci\u00f3n Renovables (RENSHIELD)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/06\/2021 a 31\/12\/2023<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_420\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('420','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_420\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('420','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_420\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{renshield,<br \/>\r\ntitle = {Detecci\u00f3n de ciberamenazas en los sistemas de monitorizaci\u00f3n y control de instalaciones de Generaci\u00f3n Renovables (RENSHIELD)},<br \/>\r\nurl = {\/neus-cslab\/renshield\/},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-01-01},<br \/>\r\nurldate = {2021-01-01},<br \/>\r\nnumber = {PI-2132\/22\/2021},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda},<br \/>\r\nseries = {01\/06\/2021 a 31\/12\/2023},<br \/>\r\nnote = {59994,45 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('420','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_420\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/renshield\/\" title=\"\/neus-cslab\/renshield\/\" target=\"_blank\">\/neus-cslab\/renshield\/<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('420','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2040\/22\/2020<\/b> <\/span> &#8211; Dise\u00f1o de un Sistema de Bastionado H\u00edbrido en Aplicaciones Web frente a las Amenazas OWASP<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/10\/2020 a 15\/07\/2021<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_421\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('421','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_421\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{owasp,<br \/>\r\ntitle = {Dise\u00f1o de un Sistema de Bastionado H\u00edbrido en Aplicaciones Web frente a las Amenazas OWASP},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nnumber = {PI-2040\/22\/2020},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Universidad de Sevilla},<br \/>\r\norganization = {Universidad de Sevilla},<br \/>\r\nseries = {15\/10\/2020 a 15\/07\/2021},<br \/>\r\nnote = {18150 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('421','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1921\/22\/2019<\/b> <\/span> &#8211; Protecci\u00f3n de Servidores de Investigaci\u00f3n Mediante Detecci\u00f3n de Estad\u00edos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/06\/2019 a 15\/06\/2020<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_422\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('422','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_422\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ioc,<br \/>\r\ntitle = {Protecci\u00f3n de Servidores de Investigaci\u00f3n Mediante Detecci\u00f3n de Estad\u00edos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)},<br \/>\r\nyear  = {2019},<br \/>\r\ndate = {2019-01-01},<br \/>\r\nurldate = {2019-01-01},<br \/>\r\nnumber = {PI-1921\/22\/2019},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {15\/06\/2019 a 15\/06\/2020},<br \/>\r\nnote = {17908 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('422','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1872\/22\/2018<\/b> <\/span> &#8211; An\u00e1lisis de Seguridad mediante Monitorizaci\u00f3n de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/12\/2018 a 01\/12\/2019<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_423\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('423','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_423\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{biblio,<br \/>\r\ntitle = {An\u00e1lisis de Seguridad mediante Monitorizaci\u00f3n de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1872\/22\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/12\/2018 a 01\/12\/2019},<br \/>\r\nnote = {14800 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('423','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1814\/26\/2018<\/b> <\/span> &#8211; Red El\u00e9ctrica cibersegura 1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda (Programa CIEN)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2018 a 31\/12\/2021<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_424\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('424','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_424\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{rec,<br \/>\r\ntitle = {Red El\u00e9ctrica cibersegura 1},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1814\/26\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda (Programa CIEN)},<br \/>\r\nseries = {01\/01\/2018 a 31\/12\/2021},<br \/>\r\nnote = {57340 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('424','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1786\/22\/2018<\/b> <\/span> &#8211; Sistema de ciberportecci\u00f3n para servidores web de la Universidad de Sevilla (CiberwebUS)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/03\/2018 a 31\/08\/2018<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_425\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('425','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_425\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ciberwebus,<br \/>\r\ntitle = {Sistema de ciberportecci\u00f3n para servidores web de la Universidad de Sevilla (CiberwebUS)},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1786\/22\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/03\/2018 a 31\/08\/2018},<br \/>\r\nnote = {10413 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('425','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1736\/22\/2017<\/b> <\/span> &#8211; Detecci\u00f3n temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/10\/2017 a 30\/09\/2018<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_426\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('426','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_426\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{temprana,<br \/>\r\ntitle = {Detecci\u00f3n temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nnumber = {PI-1736\/22\/2017},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/10\/2017 a 30\/09\/2018},<br \/>\r\nnote = {12800 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('426','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>CTA 16\/909<\/b> <\/span> &#8211; Sistema integral para vigilancia y auditor\u00eda de ciberseguridad corporativa<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>WELLNESS TELECOM, S.L. \/ Junta de Andaluc\u00eda (Corporaci\u00f3n Tecnol\u00f3gica de Andaluc\u00eda)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/02\/2017 a 15\/01\/2019<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_427\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('427','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_427\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{siva,<br \/>\r\ntitle = {Sistema integral para vigilancia y auditor\u00eda de ciberseguridad corporativa},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nnumber = {CTA 16\/909},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {WELLNESS TELECOM, S.L. \/ Junta de Andaluc\u00eda (Corporaci\u00f3n Tecnol\u00f3gica de Andaluc\u00eda)},<br \/>\r\nseries = {01\/02\/2017 a 15\/01\/2019},<br \/>\r\nnote = {79200 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('427','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Data exploration on a network security data<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Protectwise Inc.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/08\/2014 a 31\/10\/2014<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_428\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('428','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_428\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{protectwise,<br \/>\r\ntitle = {Data exploration on a network security data},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nurldate = {2014-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Protectwise Inc.},<br \/>\r\nseries = {01\/08\/2014 a 31\/10\/2014},<br \/>\r\nnote = {11000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('428','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Investigaci\u00f3n sobre fraude en telecomunicaciones. El fraude en roaming<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>KPN Mobile International Network Spain S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>7<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/04\/2013 a 15\/04\/2014<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_429\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('429','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_429\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{kpn,<br \/>\r\ntitle = {Investigaci\u00f3n sobre fraude en telecomunicaciones. El fraude en roaming},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-01-01},<br \/>\r\nurldate = {2013-01-01},<br \/>\r\npages = {7},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {KPN Mobile International Network Spain S.L.},<br \/>\r\nseries = {15\/04\/2013 a 15\/04\/2014},<br \/>\r\nnote = {12223,9\t\u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('429','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Mejora de la gesti\u00f3n de red mediante an\u00e1lisis y caracterizaci\u00f3n del tr\u00e1fico en redes corporativas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>SADESI (Junta de Andaluc\u00eda)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/07\/2010 a 30\/06\/2011<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_430\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('430','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_430\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{sadesi,<br \/>\r\ntitle = {Mejora de la gesti\u00f3n de red mediante an\u00e1lisis y caracterizaci\u00f3n del tr\u00e1fico en redes corporativas},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\nurldate = {2010-01-01},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {SADESI (Junta de Andaluc\u00eda)},<br \/>\r\nseries = {01\/07\/2010 a 30\/06\/2011},<br \/>\r\nnote = {25056 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('430','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Asesoramiento, an\u00e1lisis y desarrollo en redes, seguridad y comunicaciones<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universitat Polit\u00e9cnica de Catalunya<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/02\/2009 a 31\/10\/2009<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_432\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('432','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_432\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{upc,<br \/>\r\ntitle = {Asesoramiento, an\u00e1lisis y desarrollo en redes, seguridad y comunicaciones},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Universitat Polit\u00e9cnica de Catalunya},<br \/>\r\nseries = {01\/02\/2009 a 31\/10\/2009},<br \/>\r\nnote = {9000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('432','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Tele-rehabilitaci\u00f3n efectiva en el hogar: investigaci\u00f3n y desarrollo de sistemas, t\u00e9cnicas, m\u00e9todos y mecanismos (TeleREHAB)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Fundaci\u00f3n Robotiker<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada, Robotiker<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>2009 a 2011<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_431\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('431','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_431\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{telerehab,<br \/>\r\ntitle = {Tele-rehabilitaci\u00f3n efectiva en el hogar: investigaci\u00f3n y desarrollo de sistemas, t\u00e9cnicas, m\u00e9todos y mecanismos (TeleREHAB)},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Univ. Granada, Robotiker},<br \/>\r\norganization = {Fundaci\u00f3n Robotiker},<br \/>\r\nseries = {2009 a 2011},<br \/>\r\nnote = {69600 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('431','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; An\u00e1lisis de viabilidad y soluciones para un sistema de vide\u00f3fono para cajeros autom\u00e1ticos<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Patrimonial Andaluza, S.A.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/11\/2001 a 31\/12\/2001<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_433\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('433','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_433\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{patrimonial,<br \/>\r\ntitle = {An\u00e1lisis de viabilidad y soluciones para un sistema de vide\u00f3fono para cajeros autom\u00e1ticos},<br \/>\r\nyear  = {2001},<br \/>\r\ndate = {2001-01-01},<br \/>\r\nurldate = {2001-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Patrimonial Andaluza, S.A.},<br \/>\r\nseries = {01\/11\/2001 a 31\/12\/2001},<br \/>\r\nnote = {8.540,38 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('433','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Sistema automatizado de gesti\u00f3n y realizaci\u00f3n de llamadas con reconocimiento de voz (Fase A)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Pl\u00e1sticos Genil, S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/06\/2001 a 30\/09\/2001<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_434\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('434','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_434\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{genil,<br \/>\r\ntitle = {Sistema automatizado de gesti\u00f3n y realizaci\u00f3n de llamadas con reconocimiento de voz (Fase A)},<br \/>\r\nyear  = {2001},<br \/>\r\ndate = {2001-01-01},<br \/>\r\nurldate = {2001-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Pl\u00e1sticos Genil, S.L.},<br \/>\r\nseries = {01\/06\/2001 a 30\/09\/2001},<br \/>\r\nnote = {2.333,86 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('434','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Asesor\u00eda y consultor\u00eda t\u00e9cnica en instalaciones y aplicaciones telem\u00e1ticas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>INDICO, Telem\u00e1tica y Telecomunicaciones, S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/05\/2000 a 30\/11\/2000<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_435\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('435','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_435\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{indico,<br \/>\r\ntitle = {Asesor\u00eda y consultor\u00eda t\u00e9cnica en instalaciones y aplicaciones telem\u00e1ticas},<br \/>\r\nyear  = {2000},<br \/>\r\ndate = {2000-01-01},<br \/>\r\nurldate = {2000-01-01},<br \/>\r\npages = {1},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {INDICO, Telem\u00e1tica y Telecomunicaciones, S.L.},<br \/>\r\nseries = {01\/05\/2000 a 30\/11\/2000},<br \/>\r\nnote = {2.928,13 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('435','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; M\u00e1ster en redes y comunicaciones<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>INTAS<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>13\/05\/1994 a 25\/08\/1994<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_437\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('437','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_437\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{intas,<br \/>\r\ntitle = {M\u00e1ster en redes y comunicaciones},<br \/>\r\nyear  = {1994},<br \/>\r\ndate = {1994-01-01},<br \/>\r\nurldate = {1994-01-01},<br \/>\r\npages = {1},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {INTAS},<br \/>\r\nseries = {13\/05\/1994 a 25\/08\/1994},<br \/>\r\nnote = {2.704,55 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('437','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Desarrollo de un conversor texto-a-voz en castellano<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>ENA Telecomunicaciones, S.A.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/1992 a 31\/12\/1993<\/p><p class=\"tp_pub_menu\"><span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_436\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('436','tp_bibtex')\" title=\"Mostrar entrada BibTeX \" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_436\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ena,<br \/>\r\ntitle = {Desarrollo de un conversor texto-a-voz en castellano},<br \/>\r\nyear  = {1992},<br \/>\r\ndate = {1992-01-01},<br \/>\r\nurldate = {1992-01-01},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {ENA Telecomunicaciones, S.A.},<br \/>\r\nseries = {01\/01\/1992 a 31\/12\/1993},<br \/>\r\nnote = {40.388,01 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('436','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/p><p style=\"margin-left: 15px;\">NOTA: La paginaci\u00f3n afecta a todos los apartados. Vuelva a la p\u00e1gina 1 para ver los elementos de otras categor\u00edas.<\/p><h3>\u00a0<\/h3><h3><span style=\"color: #038daa;\">Patentes y propiedad intelectual<\/span><\/h3><ul style=\"padding-inline-start: 25px;\"><li>Inventores (p.o. de firma): <em>Rafael Estepa Alonso, Antonio Estepa Alonso, Jes\u00fas D\u00edaz Verdejo, Germ\u00e1n Madinabeitia Luque, Agust\u00edn Lara Romero<\/em><br \/>T\u00edtulo: <strong>Demostrador de anomal\u00edas en aplicaciones de iluminaci\u00f3n inteligente<\/strong><br \/>N. de solicitud: SE-59-23<br \/>Fecha de prioridad: 2023<br \/>Entidad titular: Universidad de Sevilla \u2013 Universidad de Granada<\/li><li>Inventores (p.o. de firma): <em>D\u00edaz Verdejo, Jes\u00fas Esteban; S\u00e1nchez Garc\u00eda, Ignacio; Garc\u00eda Garc\u00eda, Jorge; Garc\u00eda Garc\u00eda, Antonio Jes\u00fas<\/em><br \/>T\u00edtulo:\u00a0<strong>Laboratorio virtual para asignaturas t\u00e9cnicas experimentales<\/strong><br \/>N. de solicitud: GR 90\/02 asiento 04\/2002\/759<br \/>Fecha de prioridad: 2003<br \/>Entidad titular: Universidad de Granada<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f01d165 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f01d165\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8770e57\" data-id=\"8770e57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6af5740 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6af5740\" data-element_type=\"section\" data-e-type=\"section\" id=\"otros\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-bab102d\" data-id=\"bab102d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f5205f elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"4f5205f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inicio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-48d4a5d\" data-id=\"48d4a5d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-faba64b elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"faba64b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#resumen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Resumen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-b90b7f1\" data-id=\"b90b7f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57c99b0 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"57c99b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#publicaciones\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">publicaciones<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-05073b7\" data-id=\"05073b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-315183b elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"315183b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">proyectos inv.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-d3feaf1\" data-id=\"d3feaf1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebb9afe elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"ebb9afe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#transf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">acciones transf.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-a427d61\" data-id=\"a427d61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89e353c elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"89e353c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#otros\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">otros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6753b21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6753b21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ecc14d3\" data-id=\"ecc14d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81a0da9 elementor-widget elementor-widget-heading\" data-id=\"81a0da9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Otros<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f977e8d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f977e8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&nbsp;<\/p>\n<h3><span style=\"color: #038daa;\">Tesis doctorales dirigidas&nbsp;<\/span><\/h3>\n<ul style=\"padding-inline-start: 25px;\">\n<li>Juan Manuel Est\u00e9vez Tapiador, <strong>Detecci\u00f3n de intrusiones en redes basada en anomal\u00edas mediante t\u00e9cnicas de modelado de protocolos,<\/strong> 2004.<\/li>\n<li>Francisco J. Salcedo Campos, <strong>Aplicaci\u00f3n de los HMM al reconocimiento de las caracter\u00edsticas fundamentales de la m\u00fasica<\/strong>, 2006.<\/li>\n<li>Gabriel Maci\u00e1 Fern\u00e1ndez, <strong>Ataques de denegaci\u00f3n de servicio a baja tasa contra servidores<\/strong>, 2007.<\/li>\n<li>Saeed A. M. Salah, <strong>Business Driven Alerts Correlation in Network Management Environments<\/strong>, 2015.<\/li>\n<li>Rolando Salazar Hern\u00e1ndez, <strong>Sistema de detecci\u00f3n de intrusos mediante modelado de URI<\/strong>, 2016.<\/li>\n<li>Jawad Khalife, <strong>Novel Approaches and Improvements in Traffic Classification<\/strong>, 2016.<\/li>\n<\/ul>\n<h3><span style=\"color: #038daa;\">Innovaci\u00f3n docente<\/span><\/h3>\n<div>\n<p style=\"margin-left: 25px;\">Ha participado en numerosas acciones de innovaci\u00f3n docente, incluyendo&nbsp;formaci\u00f3n para la docencia,&nbsp;proyectos de innovaci\u00f3n docente y acciones de mentorizaci\u00f3n. Entre estas actividades destaca la participaci\u00f3n como responsable dentro del programa de <strong>MEJORA DE LA CALIDAD DOCENTE MEDIANTE LA FORMACI\u00d3N DEL PROFESORADO NOVEL<\/strong> (2009) del Vicerrectorado para la Garant\u00eda de la Calidad de la Universidad de Granada, y los proyectos de innovaci\u00f3n docente <strong>Laboratorio virtual para asignaturas t\u00e9cnicas experimentales<\/strong> (2001), y <strong>Sistema de V\u00eddeo-Tutor\u00edas para Comunicaci\u00f3n Interactiva Alumno-Profesor Remota a trav\u00e9s de Internet<\/strong> (2003), que obtuvieron premios a los mejores proyectos de innovaci\u00f3n docente.<\/p>\n<p style=\"margin-left: 25px;\">Tambi\u00e9n ha realizado publicaciones relacionadas con la innovaci\u00f3n docente en foros nacionales e internacionales.<\/p>\n<h3><span style=\"color: #038daa;\">Docencia previa<\/span><\/h3>\n<p style=\"margin-left: 25px;\">Ha impartido docencia en los diferentes t\u00edtulos relacionados con <strong>Ing. Inform\u00e1tica<\/strong>,&nbsp; <strong>Ing. Electr\u00f3nica<\/strong>&nbsp; e <strong>Ing. de Telecomunicaci\u00f3n<\/strong> desde el a\u00f1o 1990. Inicialmente, esta docencia estaba relacionada con el \u00e1mbito de la electr\u00f3nica para pasar posteriormente al \u00e1mbito de la Telem\u00e1tica. Las asignaturas impartidas son:<\/p>\n<ul style=\"padding-inline-start: 25px;\">\n<li>\n<h4><span style=\"color: #038daa;\">Grados: Titulaciones extintas<\/span><\/h4>\n<ul style=\"padding-inline-start: 25px;\">\n<li>Electr\u00f3nica general &#8211; Lic. Inform\u00e1tica<\/li>\n<li>Transmisi\u00f3n de datos y redes de computadoras &#8211; Lic. Inform\u00e1tica<\/li>\n<li>Elementos de entrada y salida y perif\u00e9ricos &#8211; Lic. Inform\u00e1tica<\/li>\n<li>Electr\u00f3nica de Comunicaciones &#8211; Ing. Electr\u00f3nica<\/li>\n<li>Transmisi\u00f3n de datos y redes de computadoras I &#8211; Ing. Inform\u00e1tica<\/li>\n<li>Sistemas telem\u00e1ticos &#8211; Ing. Electr\u00f3nica<\/li>\n<li>Transmisi\u00f3n de datos y redes de computadoras II &#8211; Ing. Inform\u00e1tica<\/li>\n<li>Redes de computadores I &#8211; Ing. T\u00e9cnica Inform\u00e1tica Sistemas<\/li>\n<li>Redes de computadores &#8211; Ing. T\u00e9cnica Inform\u00e1tica Gesti\u00f3n<\/li>\n<li>Redes &#8211; Ing. T\u00e9cnica Inform\u00e1tica Sistemas<\/li>\n<li>Sistemas y servicios telem\u00e1ticos &#8211; Ing. Telecomunicaci\u00f3n<\/li>\n<li>Transmisi\u00f3n de datos &#8211; Ing. Telecomunicaci\u00f3n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"padding-inline-start: 25px;\">\n<li>\n<h4><span style=\"color: #038daa;\">Posgrados: Titulaciones extintas<\/span><\/h4>\n<ul style=\"padding-inline-start: 25px;\">\n<li>Dise\u00f1o de sistemas de reconocimiento autom\u00e1tico del habla &#8211; Programa de doctorado Nuevas perspectivas en microelectr\u00f3nica y tecnolog\u00eda de computadores<\/li>\n<li>Seguridad en redes de ordenadores &#8211; Programa de doctorado Nuevas perspectivas en microelectr\u00f3nica y tecnolog\u00eda de computadores<\/li>\n<li>Aplicaciones activadas por voz &#8211; Programa de doctorado en Procesamiento digital de im\u00e1genes y voz<\/li>\n<li>T\u00e9cnicas de reconocimiento robusto de voz &#8211; Programa de doctorado en Procesamiento digital de im\u00e1genes y voz<\/li>\n<li>Procesamiento de audio en ruido &#8211; Programa de doctorado en Procesamiento digital de im\u00e1genes y voz<\/li>\n<li>Reconocimiento autom\u00e1tico del habla &#8211; Programa de doctorado en Procesamiento digital de im\u00e1genes y voz<\/li>\n<li>Arquitecturas y servicios avanzados de red &#8211; M\u00e1ster Univ. Tecnolog\u00edas Multimedia<\/li>\n<li>Tecnolog\u00edas para la Seguridad en Entornos multimedia &#8211; M\u00e1ster Univ. Tecnolog\u00edas Multimedia<\/li>\n<li>Transmisi\u00f3n de se\u00f1ales multimedia &#8211; M\u00e1ster Univ. Tecnolog\u00edas Multimedia<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"padding-inline-start: 25px;\">\n<li>\n<h4><span style=\"color: #038daa;\">Posgrados: Titulaciones en vigor<\/span><\/h4>\n<ul style=\"padding-inline-start: 25px;\">\n<li>Planificaci\u00f3n y explotaci\u00f3n de redes y servicios &#8211; M\u00e1ster en Ing. Telecomunicaci\u00f3n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span style=\"color: #038daa;\">Gesti\u00f3n universitaria<\/span><\/h3>\n<ul style=\"padding-inline-start: 25px;\">\n<li>Ha sido <strong>coordinaci\u00f3n <\/strong>del M\u00e1ster Universitario en Tecnolog\u00eda Multimedia (actualmente extinto).<\/li>\n<li>Ha participado activamente en las comisiones encargadas de la elaboraci\u00f3n de los <strong>planes de estudio<\/strong> de Ing. de Telecomunicaci\u00f3n (planes de 2003 y 2009), as\u00ed como en las comisiones encargadas de la confecci\u00f3n del grado y m\u00e1ster en Ing. Inform\u00e1tica de acuerdo al Plan Bolonia.<\/li>\n<li>Ha sido (y actualmente lo es) <strong>coordinador <\/strong>acad\u00e9mico del \u00c1rea de Ingenier\u00eda Telem\u00e1tica de la Universidad de Granada.<\/li>\n<li>Ha sido miembro de varias <strong>comisiones y consejos de titulaci\u00f3n<\/strong> relacionados con los t\u00edtulos de Ing. Inform\u00e1tica, Telecomunicaciones y Electr\u00f3nica: Comisi\u00f3n convalidaciones Ing. Telecomunicaci\u00f3n, Consejo titulaci\u00f3n Ing. Telecomunicaci\u00f3n, Consejo titulaci\u00f3n Ing. Inform\u00e1tica, Consejo titulaci\u00f3n Ing. Electr\u00f3nica, Comisi\u00f3n acad\u00e9mica del M\u00e1ster Tecnolog\u00edas multimedia,<br>Equipo docente Ing. Telecomunicaci\u00f3n,<br>Equipo docente Ing. Inform\u00e1tica,<br>Comisi\u00f3n garant\u00eda calidad Inform\u00e1tica.<\/li>\n<li><strong>Coordinaci\u00f3n <\/strong>de 15 cursos del Centro de Formaci\u00f3n Continua de la UGR.<\/li>\n<\/ul>\n<h3><span style=\"color: #038daa;\">Premios<\/span><\/h3>\n<ul style=\"padding-inline-start: 25px;\">\n<li><strong>Premio a la Excelencia Docente 2009<\/strong>, Universidad de Granada.<\/li>\n<li><strong>Menci\u00f3n honor\u00edfica a la Innovaci\u00f3n Docente 2003<\/strong>, Universidad de Granada.<\/li>\n<li><strong>Premio a la Innovaci\u00f3n docente 2002<\/strong>, Universidad de Granada.<\/li>\n<li><strong>Mejor tesis en Comercio Electr\u00f3nico 2008<\/strong>, <em>Ataques de Denegaci\u00f3n de Servicio a Baja Tasa contra Servidores<\/em>, (Codirector), Colegio Oficial de Ingenieros de Telecomunicaci\u00f3n.<\/li>\n<li><strong>Best paper<\/strong>: <em>Performance of openDPI to identify truncated network traffic<\/em> International Conf. on Data Communication Networking 2011.<\/li>\n<li><strong>Best paper:<\/strong> <em>STACC: an automatic service for information access using Continuous Speech Recognition through telephone line<\/em>, EUROSPEECH-97.<\/li>\n<li><strong>Best paper<\/strong>: <em>Dise\u00f1o y despliegue de un laboratorio para formaci\u00f3n e investigaci\u00f3n en ciberseguridad\t<\/em>, VIII Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad, 2023.<\/li>\n<li><strong>Best paper:<\/strong> <em>Aplicacion de control de acceso y t\u00e9cnicas de Blockchain para el control de datos gen\u00e9ticos<\/em>, VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad 2021.<\/li>\n<\/ul>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Inicio Resumen publicaciones proyectos inv. acciones transf. otros direcci\u00f3n Despacho 2.5Dpto. Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y ComunicacionesETS de Ingenier\u00edas Inform\u00e1tica y Telecomunicaci\u00f3nc\/ Daniel Saucedo Aranda, s\/n18071 &#8211; Granada Contacto jedv @ ugr.es JES\u00daS ESTEBAN D\u00cdAZ VERDEJO PUESTOS Catedr\u00e1tico de Ingenier\u00eda Telem\u00e1ticaDpto. Teor\u00eda de la Se\u00f1al, Telem\u00e1tica y ComunicacionesUniversidad de Granada fORMACI\u00d3N acad\u00e9mica Doctor en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":885,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"full-screen","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"on","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-274","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":150,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/274\/revisions"}],"predecessor-version":[{"id":3457,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/274\/revisions\/3457"}],"up":[{"embeddable":true,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/885"}],"wp:attachment":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/media?parent=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}