{"id":735,"date":"2022-03-06T09:54:10","date_gmt":"2022-03-06T08:54:10","guid":{"rendered":"http:\/\/localhost\/neus-cslab\/?page_id=735"},"modified":"2025-07-28T12:55:40","modified_gmt":"2025-07-28T10:55:40","slug":"proyectos-idi","status":"publish","type":"page","link":"https:\/\/dtstc.ugr.es\/neus-cslab\/proyectos-idi\/","title":{"rendered":"Proyectos I+D+i"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"735\" class=\"elementor elementor-735\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-df9e975 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"df9e975\" data-element_type=\"section\" data-e-type=\"section\" id=\"inicio\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-40b3f02\" data-id=\"40b3f02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-38b7fba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38b7fba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e80e547\" data-id=\"e80e547\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f864e23 big-title elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f864e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">PROYECTOS<br>INVEST.<br>destacados<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b48646e big-margin\" data-id=\"b48646e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dba8917 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dba8917\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3080bbd\" data-id=\"3080bbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e3b7e0 elementor-widget elementor-widget-image\" data-id=\"8e3b7e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/neus-cslab\/coincyde\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/coincyde-ge-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1647\" alt=\"\" srcset=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/coincyde-ge-150x150.png 150w, https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/coincyde-ge-600x600.png 600w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">COINCYCDE - Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a3124fc\" data-id=\"a3124fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-596188f elementor-widget elementor-widget-image\" data-id=\"596188f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/neus-cslab\/madinci\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/madinci-ja-1-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1645\" alt=\"\" srcset=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/madinci-ja-1-150x150.png 150w, https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/madinci-ja-1-600x600.png 600w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">MADINCI - Modelado de ataques y detecci\u00f3n de incidentes de ciberseguridad<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-29881fa\" data-id=\"29881fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e29ed5 elementor-widget elementor-widget-image\" data-id=\"9e29ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/neus-cslab\/cei-2\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/cei2-ja-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1654\" alt=\"\" srcset=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/cei2-ja-150x150.png 150w, https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2023\/04\/cei2-ja-600x600.png 600w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Sistema para la Detecci\u00f3n Temprana de Ciberataques en Industria Conectada e IoT mediante Detecci\u00f3n de Anomal\u00edas Multiplanta<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-759720a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"759720a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b30cc57\" data-id=\"b30cc57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ee627c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ee627c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1fc1a8f\" data-id=\"1fc1a8f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b1f3e5 big-title elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8b1f3e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">PROYECTOS<br>TRANSFER.<br>destacados<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8ef78c8 big-margin\" data-id=\"8ef78c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-279dd2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"279dd2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-89e4793\" data-id=\"89e4793\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0e3148 elementor-widget elementor-widget-image\" data-id=\"e0e3148\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/neus-cslab\/renshield\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2022\/03\/Protecting-smart-grids-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-image-497\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">RENSHIELD - Detecci\u00f3n de ciberamenazas en los sistemas de monitorizaci\u00f3n y control de instalaciones de Generaci\u00f3n Renovables <\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0102662\" data-id=\"0102662\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dde6728 elementor-widget elementor-widget-image\" data-id=\"dde6728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2022\/03\/les-smart-gridss-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-image-498\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Red el\u00e9ctrica cibersegura<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4a4ed65\" data-id=\"4a4ed65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a339c64 elementor-widget elementor-widget-image\" data-id=\"a339c64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-content\/uploads\/2022\/03\/hero-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-image-848\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">SIVA - Sistema integral para vigilancia y auditor\u00eda de ciberseguridad corporativa<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09842ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09842ca\" data-element_type=\"section\" data-e-type=\"section\" id=\"proyectosi\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-f8e5e30\" data-id=\"f8e5e30\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c734d29 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"c734d29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">INICIO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-475902f\" data-id=\"475902f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5cab9b elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"c5cab9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">INVESTIGACI\u00d3N<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-9be17f3\" data-id=\"9be17f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4ae309 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"d4ae309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectost\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-down\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">TRANSFERENCIA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5c94963\" data-id=\"5c94963\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb645e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb645e0\" data-element_type=\"section\" data-e-type=\"section\" id=\"investigacion\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25e8de2\" data-id=\"25e8de2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2863c77 elementor-widget elementor-widget-heading\" data-id=\"2863c77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proyectos de investigaci\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516df41 elementor-widget elementor-widget-text-editor\" data-id=\"516df41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_publication_list\"><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2437\/22\/2023<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('497','tp_links')\" style=\"cursor:pointer;\">OREOS (&quot;Soluci\u00f3n integral de Gesti\u00f3n de Identidades de Nueva Generaci\u00f3n&quot;)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>WHITEBEARSOLUTIONS S.L<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA &#8211; Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>02\/06\/2023 a 29\/11\/2025<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_497\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('497','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_497\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{oreos,<br \/>\r\ntitle = {OREOS (\"Soluci\u00f3n integral de Gesti\u00f3n de Identidades de Nueva Generaci\u00f3n\")},<br \/>\r\nurl = {\/neus-cslab\/oreos},<br \/>\r\nyear  = {2023},<br \/>\r\ndate = {2023-06-02},<br \/>\r\nurldate = {2023-06-02},<br \/>\r\nnumber = {PI-2437\/22\/2023},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {AICIA - Universidad de Sevilla},<br \/>\r\norganization = {WHITEBEARSOLUTIONS S.L},<br \/>\r\nseries = {02\/06\/2023 a 29\/11\/2025},<br \/>\r\nnote = {100000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('497','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_497\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/oreos\" title=\"\/neus-cslab\/oreos\" target=\"_blank\">\/neus-cslab\/oreos<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('497','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2132\/22\/2021<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('420','tp_links')\" style=\"cursor:pointer;\">Detecci\u00f3n de ciberamenazas en los sistemas de monitorizaci\u00f3n y control de instalaciones de Generaci\u00f3n Renovables (RENSHIELD)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/06\/2021 a 31\/12\/2023<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_420\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('420','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_420\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{renshield,<br \/>\r\ntitle = {Detecci\u00f3n de ciberamenazas en los sistemas de monitorizaci\u00f3n y control de instalaciones de Generaci\u00f3n Renovables (RENSHIELD)},<br \/>\r\nurl = {\/neus-cslab\/renshield\/},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-01-01},<br \/>\r\nurldate = {2021-01-01},<br \/>\r\nnumber = {PI-2132\/22\/2021},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda},<br \/>\r\nseries = {01\/06\/2021 a 31\/12\/2023},<br \/>\r\nnote = {59994,45 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('420','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_420\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/renshield\/\" title=\"\/neus-cslab\/renshield\/\" target=\"_blank\">\/neus-cslab\/renshield\/<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('420','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-2040\/22\/2020<\/b> <\/span> &#8211; Dise\u00f1o de un Sistema de Bastionado H\u00edbrido en Aplicaciones Web frente a las Amenazas OWASP<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/10\/2020 a 15\/07\/2021<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_421\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{owasp,<br \/>\r\ntitle = {Dise\u00f1o de un Sistema de Bastionado H\u00edbrido en Aplicaciones Web frente a las Amenazas OWASP},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nnumber = {PI-2040\/22\/2020},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Universidad de Sevilla},<br \/>\r\norganization = {Universidad de Sevilla},<br \/>\r\nseries = {15\/10\/2020 a 15\/07\/2021},<br \/>\r\nnote = {18150 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('421','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1921\/22\/2019<\/b> <\/span> &#8211; Protecci\u00f3n de Servidores de Investigaci\u00f3n Mediante Detecci\u00f3n de Estad\u00edos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/06\/2019 a 15\/06\/2020<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_422\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ioc,<br \/>\r\ntitle = {Protecci\u00f3n de Servidores de Investigaci\u00f3n Mediante Detecci\u00f3n de Estad\u00edos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)},<br \/>\r\nyear  = {2019},<br \/>\r\ndate = {2019-01-01},<br \/>\r\nurldate = {2019-01-01},<br \/>\r\nnumber = {PI-1921\/22\/2019},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {15\/06\/2019 a 15\/06\/2020},<br \/>\r\nnote = {17908 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('422','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1872\/22\/2018<\/b> <\/span> &#8211; An\u00e1lisis de Seguridad mediante Monitorizaci\u00f3n de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/12\/2018 a 01\/12\/2019<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_423\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{biblio,<br \/>\r\ntitle = {An\u00e1lisis de Seguridad mediante Monitorizaci\u00f3n de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1872\/22\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/12\/2018 a 01\/12\/2019},<br \/>\r\nnote = {14800 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('423','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1814\/26\/2018<\/b> <\/span> &#8211; Red El\u00e9ctrica cibersegura 1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda (Programa CIEN)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2018 a 31\/12\/2021<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_424\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{rec,<br \/>\r\ntitle = {Red El\u00e9ctrica cibersegura 1},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1814\/26\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Isotrol \/ Ministerio Ciencia y Tecnolog\u00eda (Programa CIEN)},<br \/>\r\nseries = {01\/01\/2018 a 31\/12\/2021},<br \/>\r\nnote = {57340 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('424','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1786\/22\/2018<\/b> <\/span> &#8211; Sistema de ciberportecci\u00f3n para servidores web de la Universidad de Sevilla (CiberwebUS)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/03\/2018 a 31\/08\/2018<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_425\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ciberwebus,<br \/>\r\ntitle = {Sistema de ciberportecci\u00f3n para servidores web de la Universidad de Sevilla (CiberwebUS)},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nnumber = {PI-1786\/22\/2018},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/03\/2018 a 31\/08\/2018},<br \/>\r\nnote = {10413 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('425','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PI-1736\/22\/2017<\/b> <\/span> &#8211; Detecci\u00f3n temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Univ. de Sevilla<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/10\/2017 a 30\/09\/2018<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_426\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{temprana,<br \/>\r\ntitle = {Detecci\u00f3n temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nnumber = {PI-1736\/22\/2017},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {Univ. de Sevilla},<br \/>\r\nseries = {01\/10\/2017 a 30\/09\/2018},<br \/>\r\nnote = {12800 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('426','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>CTA 16\/909<\/b> <\/span> &#8211; Sistema integral para vigilancia y auditor\u00eda de ciberseguridad corporativa<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>WELLNESS TELECOM, S.L. \/ Junta de Andaluc\u00eda (Corporaci\u00f3n Tecnol\u00f3gica de Andaluc\u00eda)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>AICIA<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/02\/2017 a 15\/01\/2019<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_427\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{siva,<br \/>\r\ntitle = {Sistema integral para vigilancia y auditor\u00eda de ciberseguridad corporativa},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nnumber = {CTA 16\/909},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {AICIA},<br \/>\r\norganization = {WELLNESS TELECOM, S.L. \/ Junta de Andaluc\u00eda (Corporaci\u00f3n Tecnol\u00f3gica de Andaluc\u00eda)},<br \/>\r\nseries = {01\/02\/2017 a 15\/01\/2019},<br \/>\r\nnote = {79200 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('427','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Data exploration on a network security data<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Protectwise Inc.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/08\/2014 a 31\/10\/2014<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_428\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{protectwise,<br \/>\r\ntitle = {Data exploration on a network security data},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nurldate = {2014-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Protectwise Inc.},<br \/>\r\nseries = {01\/08\/2014 a 31\/10\/2014},<br \/>\r\nnote = {11000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('428','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Investigaci\u00f3n sobre fraude en telecomunicaciones. El fraude en roaming<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>KPN Mobile International Network Spain S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>7<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>15\/04\/2013 a 15\/04\/2014<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_429\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{kpn,<br \/>\r\ntitle = {Investigaci\u00f3n sobre fraude en telecomunicaciones. El fraude en roaming},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-01-01},<br \/>\r\nurldate = {2013-01-01},<br \/>\r\npages = {7},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {KPN Mobile International Network Spain S.L.},<br \/>\r\nseries = {15\/04\/2013 a 15\/04\/2014},<br \/>\r\nnote = {12223,9\t\u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('429','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Mejora de la gesti\u00f3n de red mediante an\u00e1lisis y caracterizaci\u00f3n del tr\u00e1fico en redes corporativas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>SADESI (Junta de Andaluc\u00eda)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/07\/2010 a 30\/06\/2011<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_430\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{sadesi,<br \/>\r\ntitle = {Mejora de la gesti\u00f3n de red mediante an\u00e1lisis y caracterizaci\u00f3n del tr\u00e1fico en redes corporativas},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\nurldate = {2010-01-01},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {SADESI (Junta de Andaluc\u00eda)},<br \/>\r\nseries = {01\/07\/2010 a 30\/06\/2011},<br \/>\r\nnote = {25056 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('430','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Asesoramiento, an\u00e1lisis y desarrollo en redes, seguridad y comunicaciones<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universitat Polit\u00e9cnica de Catalunya<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/02\/2009 a 31\/10\/2009<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_432\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{upc,<br \/>\r\ntitle = {Asesoramiento, an\u00e1lisis y desarrollo en redes, seguridad y comunicaciones},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Universitat Polit\u00e9cnica de Catalunya},<br \/>\r\nseries = {01\/02\/2009 a 31\/10\/2009},<br \/>\r\nnote = {9000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('432','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Tele-rehabilitaci\u00f3n efectiva en el hogar: investigaci\u00f3n y desarrollo de sistemas, t\u00e9cnicas, m\u00e9todos y mecanismos (TeleREHAB)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Fundaci\u00f3n Robotiker<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada, Robotiker<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>4<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>2009 a 2011<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_431\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{telerehab,<br \/>\r\ntitle = {Tele-rehabilitaci\u00f3n efectiva en el hogar: investigaci\u00f3n y desarrollo de sistemas, t\u00e9cnicas, m\u00e9todos y mecanismos (TeleREHAB)},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\npages = {4},<br \/>\r\ninstitution = {Univ. Granada, Robotiker},<br \/>\r\norganization = {Fundaci\u00f3n Robotiker},<br \/>\r\nseries = {2009 a 2011},<br \/>\r\nnote = {69600 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('431','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; An\u00e1lisis de viabilidad y soluciones para un sistema de vide\u00f3fono para cajeros autom\u00e1ticos<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Patrimonial Andaluza, S.A.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/11\/2001 a 31\/12\/2001<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_433\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{patrimonial,<br \/>\r\ntitle = {An\u00e1lisis de viabilidad y soluciones para un sistema de vide\u00f3fono para cajeros autom\u00e1ticos},<br \/>\r\nyear  = {2001},<br \/>\r\ndate = {2001-01-01},<br \/>\r\nurldate = {2001-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Patrimonial Andaluza, S.A.},<br \/>\r\nseries = {01\/11\/2001 a 31\/12\/2001},<br \/>\r\nnote = {8.540,38 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('433','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Sistema automatizado de gesti\u00f3n y realizaci\u00f3n de llamadas con reconocimiento de voz (Fase A)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Pl\u00e1sticos Genil, S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/06\/2001 a 30\/09\/2001<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_434\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{genil,<br \/>\r\ntitle = {Sistema automatizado de gesti\u00f3n y realizaci\u00f3n de llamadas con reconocimiento de voz (Fase A)},<br \/>\r\nyear  = {2001},<br \/>\r\ndate = {2001-01-01},<br \/>\r\nurldate = {2001-01-01},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {Pl\u00e1sticos Genil, S.L.},<br \/>\r\nseries = {01\/06\/2001 a 30\/09\/2001},<br \/>\r\nnote = {2.333,86 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('434','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Asesor\u00eda y consultor\u00eda t\u00e9cnica en instalaciones y aplicaciones telem\u00e1ticas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>INDICO, Telem\u00e1tica y Telecomunicaciones, S.L.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/05\/2000 a 30\/11\/2000<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_435\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{indico,<br \/>\r\ntitle = {Asesor\u00eda y consultor\u00eda t\u00e9cnica en instalaciones y aplicaciones telem\u00e1ticas},<br \/>\r\nyear  = {2000},<br \/>\r\ndate = {2000-01-01},<br \/>\r\nurldate = {2000-01-01},<br \/>\r\npages = {1},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {INDICO, Telem\u00e1tica y Telecomunicaciones, S.L.},<br \/>\r\nseries = {01\/05\/2000 a 30\/11\/2000},<br \/>\r\nnote = {2.928,13 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('435','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; M\u00e1ster en redes y comunicaciones<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>INTAS<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>1<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>13\/05\/1994 a 25\/08\/1994<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_437\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{intas,<br \/>\r\ntitle = {M\u00e1ster en redes y comunicaciones},<br \/>\r\nyear  = {1994},<br \/>\r\ndate = {1994-01-01},<br \/>\r\nurldate = {1994-01-01},<br \/>\r\npages = {1},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {INTAS},<br \/>\r\nseries = {13\/05\/1994 a 25\/08\/1994},<br \/>\r\nnote = {2.704,55 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('437','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b><\/b> <\/span> &#8211; Desarrollo de un conversor texto-a-voz en castellano<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>ENA Telecomunicaciones, S.A.<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/1992 a 31\/12\/1993<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_436\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{ena,<br \/>\r\ntitle = {Desarrollo de un conversor texto-a-voz en castellano},<br \/>\r\nyear  = {1992},<br \/>\r\ndate = {1992-01-01},<br \/>\r\nurldate = {1992-01-01},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {ENA Telecomunicaciones, S.A.},<br \/>\r\nseries = {01\/01\/1992 a 31\/12\/1993},<br \/>\r\nnote = {40.388,01 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('436','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ea3243 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ea3243\" data-element_type=\"section\" data-e-type=\"section\" id=\"proyectost\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-46d524a\" data-id=\"46d524a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdce1fe elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"cdce1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#inicio\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">INICIO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-6d92033\" data-id=\"6d92033\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a930c9d elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"a930c9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectosi\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-up\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">INVESTIGACI\u00d3N<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5468740\" data-id=\"5468740\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1d5944 elementor-align-center full-btn elementor-widget elementor-widget-button\" data-id=\"a1d5944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#proyectost\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">TRANSFERENCIA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-524532e\" data-id=\"524532e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ea54e26 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea54e26\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7286b0b\" data-id=\"7286b0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d8efc97 elementor-widget elementor-widget-heading\" data-id=\"d8efc97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proyectos de transferencia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f95212a elementor-widget elementor-widget-text-editor\" data-id=\"f95212a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_publication_list\"><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PID2024-155581OB-C21<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('503','tp_links')\" style=\"cursor:pointer;\">Forensic UEBA: Detecci\u00f3n temprana de ciberataques con custodia forense de evidencias digitales en entornos corporativos (FUEBA+)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Ministerio de Ciencia e Innovaci\u00f3n<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Sevilla  \/ Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/09\/2025 a 31\/08\/2028<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_503\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('503','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_503\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{fueba,<br \/>\r\ntitle = {Forensic UEBA: Detecci\u00f3n temprana de ciberataques con custodia forense de evidencias digitales en entornos corporativos (FUEBA+)},<br \/>\r\nurl = {\/neus-cslab\/ifueba},<br \/>\r\nyear  = {2026},<br \/>\r\ndate = {2026-02-10},<br \/>\r\nnumber = {PID2024-155581OB-C21},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Sevilla  \/ Univ. Granada},<br \/>\r\norganization = {Ministerio de Ciencia e Innovaci\u00f3n},<br \/>\r\nseries = {01\/09\/2025 a 31\/08\/2028},<br \/>\r\nnote = {124250 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('503','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_503\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/ifueba\" title=\"\/neus-cslab\/ifueba\" target=\"_blank\">\/neus-cslab\/ifueba<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('503','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>A-TIC-224-UGR20<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('406','tp_links')\" style=\"cursor:pointer;\">Modelado de Ataques y Detecci\u00f3n de Incidentes de Ciberseguridad (MADINCI)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Granada &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos I+D+i del Programa Operativo FEDER 2020<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada y Univ. Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2022 a 30\/06\/2023<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_406\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('406','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_406\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{madinci,<br \/>\r\ntitle = {Modelado de Ataques y Detecci\u00f3n de Incidentes de Ciberseguridad (MADINCI)},<br \/>\r\nurl = {\/neus-cslab\/madinci},<br \/>\r\nyear  = {2022},<br \/>\r\ndate = {2022-01-01},<br \/>\r\nurldate = {2022-01-01},<br \/>\r\nissuetitle = {Proyectos I+D+i del Programa Operativo FEDER 2020},<br \/>\r\nnumber = {A-TIC-224-UGR20},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {Univ. Granada y Univ. Sevilla},<br \/>\r\norganization = {Universidad de Granada - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/01\/2022 a 30\/06\/2023},<br \/>\r\nnote = {20000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('406','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_406\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/madinci\" title=\"\/neus-cslab\/madinci\" target=\"_blank\">\/neus-cslab\/madinci<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('406','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PID2020-115199RB-I00 <\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('3','tp_links')\" style=\"cursor:pointer;\">Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Ministerio de Ciencia e Innovaci\u00f3n <\/i> &#8211; MICIN\/AEI\/10.13039\/50110 0 011033<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada \/ Universidad de Sevilla<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>8<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/09\/2021 a 31\/08\/2024<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_abstract')\" title=\"Mostrar resumen\" style=\"cursor:pointer;\">Resumen<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_3\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{coincyde,<br \/>\r\ntitle = {Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)},<br \/>\r\nauthor = {<br \/>\r\n<br \/>\r\n},<br \/>\r\nurl = {\/neus-cslab\/proyectos-idi\/coincyde},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-09-01},<br \/>\r\nurldate = {2021-09-01},<br \/>\r\nbooktitle = {Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente (COINCYDE)},<br \/>\r\nissuetitle = {MICIN\/AEI\/10.13039\/50110 0 011033},<br \/>\r\nnumber = {PID2020-115199RB-I00 },<br \/>\r\npages = {8},<br \/>\r\ninstitution = {Universidad de Granada \/ Universidad de Sevilla},<br \/>\r\norganization = {Ministerio de Ciencia e Innovaci\u00f3n },<br \/>\r\nseries = {01\/09\/2021 a 31\/08\/2024},<br \/>\r\nabstract = {Los sistemas de monitorizaci\u00f3n de la seguridad en red (NSM) se encuentran hoy en d\u00eda entre los componentes m\u00e1s relevantes para la detecci\u00f3n y respuesta a los ciberataques. Sin embargo, sus capacidades de detecci\u00f3n se limitan en su mayor\u00eda a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. As\u00ed, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas t\u00e9cnicas para mejorar las capacidades de detecci\u00f3n mediante la adici\u00f3n de nuevos m\u00e9todos basados en anomal\u00edas combinados con la correlaci\u00f3n y priorizaci\u00f3n de alertas incorporando informaci\u00f3n contextual de la red. Esto mejorar\u00e1 la calidad de las alertas y reducir\u00e1 la tasa de falsos positivos.<br \/>\r\n<br \/>\r\nEn esta propuesta se plantea el desarrollo de un NSM espec\u00edfico para plantas industriales con elementos del Internet of Things (IoT) y, m\u00e1s concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la soluci\u00f3n objeto de este proyecto son aquellas que permiten el control y monitorizaci\u00f3n de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicaci\u00f3n o servicio web que se utiliza como interfaz de usuario para la gesti\u00f3n de servicios inteligentes. La elecci\u00f3n del escenario tiene<br \/>\r\nuna triple motivaci\u00f3n. Primero, por la gran relevancia y expansi\u00f3n de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos espec\u00edficos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selecci\u00f3n del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporaci\u00f3n de informaci\u00f3n contextual.<br \/>\r\n<br \/>\r\nEl sistema a desarrollar incorporar\u00e1 m\u00faltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores espec\u00edficos para el escenario que est\u00e1n orientados a las diversas amenazas existentes. As\u00ed, se desarrollar\u00e1n detectores basados en anomal\u00edas a nivel del tr\u00e1fico observado (flujos), a nivel de aplicaci\u00f3n (sensorizaci\u00f3n) y a nivel de los servicios web usados para la operaci\u00f3n remota. Adicionalmente, se har\u00e1 uso de t\u00e9cnicas de inteligencia artificial para la correlaci\u00f3n y priorizaci\u00f3n de las alertas incorporando informaci\u00f3n relativa al estado e historia previa de la red. Esto permitir\u00e1 identificar falsos positivos, reducir el n\u00famero de alertas finalmente enviadas al CSO y mejorar la informaci\u00f3n en las mismas.<br \/>\r\n<br \/>\r\nUn elemento relevante y novedoso es el uso de una matriz de tr\u00e1fico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene informaci\u00f3n sobre las conexiones de red que pueden explotarse para m\u00faltiples usos. As\u00ed, se pueden establecer algunos indicadores de compromiso para identificar ataques. Tambi\u00e9n se puede utilizar para aplicar varios tipos de an\u00e1lisis de miner\u00eda de datos, como la b\u00fasqueda de patrones comunes entre flujos, realizar perfiles de tr\u00e1fico de servicios, evaluar la importancia y encontrar relaciones entre activos. La informaci\u00f3n extra\u00edda de esta matriz se utilizar\u00e1 como informaci\u00f3n contextual en la correlaci\u00f3n y priorizaci\u00f3n de alertas.<br \/>\r\n<br \/>\r\nFinalmente, la arquitectura propuesta incluye realimentaci\u00f3n a partir de las acciones del CSO, lo que permite evaluar la calidad de detecci\u00f3n y priorizaci\u00f3n y ajustar el rendimiento del sistema.},<br \/>\r\nnote = {47795 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_3\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Los sistemas de monitorizaci\u00f3n de la seguridad en red (NSM) se encuentran hoy en d\u00eda entre los componentes m\u00e1s relevantes para la detecci\u00f3n y respuesta a los ciberataques. Sin embargo, sus capacidades de detecci\u00f3n se limitan en su mayor\u00eda a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. As\u00ed, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas t\u00e9cnicas para mejorar las capacidades de detecci\u00f3n mediante la adici\u00f3n de nuevos m\u00e9todos basados en anomal\u00edas combinados con la correlaci\u00f3n y priorizaci\u00f3n de alertas incorporando informaci\u00f3n contextual de la red. Esto mejorar\u00e1 la calidad de las alertas y reducir\u00e1 la tasa de falsos positivos.<br \/>\r\n<br \/>\r\nEn esta propuesta se plantea el desarrollo de un NSM espec\u00edfico para plantas industriales con elementos del Internet of Things (IoT) y, m\u00e1s concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la soluci\u00f3n objeto de este proyecto son aquellas que permiten el control y monitorizaci\u00f3n de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicaci\u00f3n o servicio web que se utiliza como interfaz de usuario para la gesti\u00f3n de servicios inteligentes. La elecci\u00f3n del escenario tiene<br \/>\r\nuna triple motivaci\u00f3n. Primero, por la gran relevancia y expansi\u00f3n de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos espec\u00edficos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selecci\u00f3n del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporaci\u00f3n de informaci\u00f3n contextual.<br \/>\r\n<br \/>\r\nEl sistema a desarrollar incorporar\u00e1 m\u00faltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores espec\u00edficos para el escenario que est\u00e1n orientados a las diversas amenazas existentes. As\u00ed, se desarrollar\u00e1n detectores basados en anomal\u00edas a nivel del tr\u00e1fico observado (flujos), a nivel de aplicaci\u00f3n (sensorizaci\u00f3n) y a nivel de los servicios web usados para la operaci\u00f3n remota. Adicionalmente, se har\u00e1 uso de t\u00e9cnicas de inteligencia artificial para la correlaci\u00f3n y priorizaci\u00f3n de las alertas incorporando informaci\u00f3n relativa al estado e historia previa de la red. Esto permitir\u00e1 identificar falsos positivos, reducir el n\u00famero de alertas finalmente enviadas al CSO y mejorar la informaci\u00f3n en las mismas.<br \/>\r\n<br \/>\r\nUn elemento relevante y novedoso es el uso de una matriz de tr\u00e1fico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene informaci\u00f3n sobre las conexiones de red que pueden explotarse para m\u00faltiples usos. As\u00ed, se pueden establecer algunos indicadores de compromiso para identificar ataques. Tambi\u00e9n se puede utilizar para aplicar varios tipos de an\u00e1lisis de miner\u00eda de datos, como la b\u00fasqueda de patrones comunes entre flujos, realizar perfiles de tr\u00e1fico de servicios, evaluar la importancia y encontrar relaciones entre activos. La informaci\u00f3n extra\u00edda de esta matriz se utilizar\u00e1 como informaci\u00f3n contextual en la correlaci\u00f3n y priorizaci\u00f3n de alertas.<br \/>\r\n<br \/>\r\nFinalmente, la arquitectura propuesta incluye realimentaci\u00f3n a partir de las acciones del CSO, lo que permite evaluar la calidad de detecci\u00f3n y priorizaci\u00f3n y ajustar el rendimiento del sistema.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_abstract')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_3\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/proyectos-idi\/coincyde\" title=\"\/neus-cslab\/proyectos-idi\/coincyde\" target=\"_blank\">\/neus-cslab\/proyectos-idi\/coincyde<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>PYC20-RE-087-USE<\/b> <\/span> &#8211; <a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('405','tp_links')\" style=\"cursor:pointer;\">Sistema para la detecci\u00f3n temprana de ciberataques en industria conectada e IoT mediante detecci\u00f3n de anomal\u00edas multiplanta<\/a><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>Universidad de Sevilla &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3 (CEI20)<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla, Wellness TechGroup como agente agregado<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2021 a 31\/12\/2022<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_405\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('405','tp_links')\" title=\"Mostrar enlaces y recursos\" style=\"cursor:pointer;\">Enlaces<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_405\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{cei2,<br \/>\r\ntitle = {Sistema para la detecci\u00f3n temprana de ciberataques en industria conectada e IoT mediante detecci\u00f3n de anomal\u00edas multiplanta},<br \/>\r\nurl = {\/neus-cslab\/proyectosidi\/cei2},<br \/>\r\nyear  = {2021},<br \/>\r\ndate = {2021-01-01},<br \/>\r\nurldate = {2021-01-01},<br \/>\r\nissuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3 (CEI20)},<br \/>\r\nnumber = {PYC20-RE-087-USE},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},<br \/>\r\norganization = {Universidad de Sevilla - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/01\/2021 a 31\/12\/2022},<br \/>\r\nnote = {68550 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('405','tp_bibtex')\">Cerrar<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_405\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"\/neus-cslab\/proyectosidi\/cei2\" title=\"\/neus-cslab\/proyectosidi\/cei2\" target=\"_blank\">\/neus-cslab\/proyectosidi\/cei2<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('405','tp_links')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>2020\/00000172<\/b> <\/span> &#8211; Detecci\u00f3n Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gram\u00e1ticas adaptativas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>US &#8211; Junta de Andaluc\u00eda<\/i> &#8211; Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Sevilla, Wellness TechGroup como agente agregado<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/03\/2020\ta 30\/09\/2021<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_407\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{cei1,<br \/>\r\ntitle = {Detecci\u00f3n Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gram\u00e1ticas adaptativas},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nissuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las \u00e1reas RIS3},<br \/>\r\nnumber = {2020\/00000172},<br \/>\r\ninstitution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},<br \/>\r\norganization = {US - Junta de Andaluc\u00eda},<br \/>\r\nseries = {01\/03\/2020\ta 30\/09\/2021},<br \/>\r\nnote = {33000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('407','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEC2011-22579<\/b> <\/span> &#8211; SuMA: Supervivencia de Redes MANET ante Incidentes de Seguridad<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MICINN<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>7<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2012 a 31\/12\/2014<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_408\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{suma,<br \/>\r\ntitle = {SuMA: Supervivencia de Redes MANET ante Incidentes de Seguridad},<br \/>\r\nyear  = {2012},<br \/>\r\ndate = {2012-01-01},<br \/>\r\nurldate = {2012-01-01},<br \/>\r\nnumber = {TEC2011-22579},<br \/>\r\npages = {7},<br \/>\r\ninstitution = {Universidad de Granada},<br \/>\r\norganization = {MICINN},<br \/>\r\nseries = {01\/01\/2012 a 31\/12\/2014},<br \/>\r\nnote = {56.265,00 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('408','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEC2008-06663-C03-02<\/b> <\/span> &#8211; Seguridad del entorno en redes Peer-to-Peer<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCI<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y Universidad Polit\u00e9cnica de Catalu\u00f1a<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2009 a 31\/12\/2011<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_409\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{p2p,<br \/>\r\ntitle = {Seguridad del entorno en redes Peer-to-Peer},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nurldate = {2009-01-01},<br \/>\r\nnumber = {TEC2008-06663-C03-02},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Granada y Universidad Polit\u00e9cnica de Catalu\u00f1a},<br \/>\r\norganization = {MCI},<br \/>\r\nseries = {01\/01\/2009 a 31\/12\/2011},<br \/>\r\nnote = {56386 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('409','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>EUREKA-CELTIC (CP3-011)<\/b> <\/span> &#8211; RED (\u201cReaction Acter Detection\u201d (colaboraci\u00f3n\/subcontrataci\u00f3n UPM )<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>EUREKA-CELTIC (CP3-011)<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>EADS, Thales, Alcatel-Lucent, France Telecom, Exaproyect, GET\/ENST, TelIndus, GMV-SGI, UPM, UPV, Innovae, Telef\u00f3nica I+D, Centre de Reserche Public Henri Tudor<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2007 a 31\/12\/2007<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_410\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{red,<br \/>\r\ntitle = {RED (\u201cReaction Acter Detection\u201d (colaboraci\u00f3n\/subcontrataci\u00f3n UPM )},<br \/>\r\nyear  = {2007},<br \/>\r\ndate = {2007-01-01},<br \/>\r\nnumber = {EUREKA-CELTIC (CP3-011)},<br \/>\r\ninstitution = {EADS, Thales, Alcatel-Lucent, France Telecom, Exaproyect, GET\/ENST, TelIndus, GMV-SGI, UPM, UPV, Innovae, Telef\u00f3nica I+D, Centre de Reserche Public Henri Tudor},<br \/>\r\norganization = {EUREKA-CELTIC (CP3-011)},<br \/>\r\nseries = {01\/01\/2007 a 31\/12\/2007},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('410','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TSI2005-08145-C02-02<\/b> <\/span> &#8211; Modelo de Arquitectura por Capas para la Detecci\u00f3n Ubicua de Ataques y Respuesta<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y esCERT (UPC)<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>31\/12\/2005 a 31\/12\/2008<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_411\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{gidre,<br \/>\r\ntitle = {Modelo de Arquitectura por Capas para la Detecci\u00f3n Ubicua de Ataques y Respuesta},<br \/>\r\nyear  = {2005},<br \/>\r\ndate = {2005-12-31},<br \/>\r\nurldate = {2005-12-31},<br \/>\r\nnumber = {TSI2005-08145-C02-02},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Universidad de Granada y esCERT (UPC)},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {31\/12\/2005 a 31\/12\/2008},<br \/>\r\nnote = {60000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('411','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC2002-11450-E<\/b> <\/span> &#8211; Ayuda del VI Programa Marco: MAVERICK: Multicast-voice over IP Secure Services in Active Networks<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>12\/09\/2003 a 11\/09\/2004<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_412\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{maverick,<br \/>\r\ntitle = {Ayuda del VI Programa Marco: MAVERICK: Multicast-voice over IP Secure Services in Active Networks},<br \/>\r\nyear  = {2003},<br \/>\r\ndate = {2003-09-12},<br \/>\r\nnumber = {TIC2002-11450-E},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {12\/09\/2003 a 11\/09\/2004},<br \/>\r\nnote = {2000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('412','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC2002-02798<\/b> <\/span> &#8211; Servicios Seguros de Multidifusi\u00f3n de Voz sobre IP en Redes Activas<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>6<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/12\/2002 a 30\/12\/2005<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_413\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{redesactivas,<br \/>\r\ntitle = {Servicios Seguros de Multidifusi\u00f3n de Voz sobre IP en Redes Activas},<br \/>\r\nyear  = {2002},<br \/>\r\ndate = {2002-12-01},<br \/>\r\nnumber = {TIC2002-02798},<br \/>\r\npages = {6},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {01\/12\/2002 a 30\/12\/2005},<br \/>\r\nnote = {32000 \u20ac},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('413','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>AYA2002-0802<\/b> <\/span> &#8211; BOOTES-IT: El Descubrimiento y Estudio de los Objetos m\u00e1s Lejanos del Universo con Instrumentaci\u00f3n Rob\u00f3tica en el IR Cercano<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>MCYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Instituto de Astrof\u00edsica de Andaluc\u00eda (IAA), Univ. de Granada, Obs. Astron\u00f3mico de Brera (Italia), Obs. Astron\u00f3mico de Ond\u0159ejov (R.Checa), Inst. de Astrof\u00edsica de Canarias, Univ. de Valencia, INTA-LAEFF, Univ. de Alicante, Hubble Space Telescope Science Institute (Baltimore, EEUU), Univ. T\u00e9cnica Checa, Institute of Geophysics &amp; Planetary Physics, Univ. California (Los \u00c1ngeles, EEUU), Obs. Astron\u00f3mico de Roma (Italia), Obs. Astron\u00f3mico de la Univ. Estatal de Nikolaev (Ucrania)<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>24<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/10\/2002 s 30\/09\/2004<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_419\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{bootes,<br \/>\r\ntitle = {BOOTES-IT: El Descubrimiento y Estudio de los Objetos m\u00e1s Lejanos del Universo con Instrumentaci\u00f3n Rob\u00f3tica en el IR Cercano},<br \/>\r\nyear  = {2002},<br \/>\r\ndate = {2002-10-01},<br \/>\r\nnumber = {AYA2002-0802},<br \/>\r\npages = {24},<br \/>\r\ninstitution = {Instituto de Astrof\u00edsica de Andaluc\u00eda (IAA), Univ. de Granada, Obs. Astron\u00f3mico de Brera (Italia), Obs. Astron\u00f3mico de Ond\u0159ejov (R.Checa), Inst. de Astrof\u00edsica de Canarias, Univ. de Valencia, INTA-LAEFF, Univ. de Alicante, Hubble Space Telescope Science Institute (Baltimore, EEUU), Univ. T\u00e9cnica Checa, Institute of Geophysics & Planetary Physics, Univ. California (Los \u00c1ngeles, EEUU), Obs. Astron\u00f3mico de Roma (Italia), Obs. Astron\u00f3mico de la Univ. Estatal de Nikolaev (Ucrania)},<br \/>\r\norganization = {MCYT},<br \/>\r\nseries = {01\/10\/2002 s 30\/09\/2004},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('419','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TEL1999-0619<\/b> <\/span> &#8211; NoVo: Sistema Autom\u00e1tico Basado en Reconocimiento de Voz para el Acceso Remoto a Noticias<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>5<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/2000 a 31\/12\/2001<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_414\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{novo,<br \/>\r\ntitle = {NoVo: Sistema Autom\u00e1tico Basado en Reconocimiento de Voz para el Acceso Remoto a Noticias},<br \/>\r\nyear  = {2000},<br \/>\r\ndate = {2000-01-01},<br \/>\r\nurldate = {0200-01-01},<br \/>\r\nnumber = {TEL1999-0619},<br \/>\r\npages = {5},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/01\/2000 a 31\/12\/2001},<br \/>\r\nnote = {6.200.000 ptas (37262,75 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('414','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 96-0956-C04-04<\/b> <\/span> &#8211; Interfaces Multimodales en Comunicaciones Hombre-M\u00e1quina<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada y Univ. de Vigo<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>11<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/08\/1996 a 31\/07\/1999<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_415\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{multimodales,<br \/>\r\ntitle = {Interfaces Multimodales en Comunicaciones Hombre-M\u00e1quina},<br \/>\r\nyear  = {1996},<br \/>\r\ndate = {1996-08-01},<br \/>\r\nnumber = {TIC 96-0956-C04-04},<br \/>\r\npages = {11},<br \/>\r\ninstitution = {Universidad de Granada y Univ. de Vigo},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/08\/1996 a 31\/07\/1999},<br \/>\r\nnote = {14.500.000 ptas. (87146,76 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('415','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 92-0662<\/b> <\/span> &#8211; Reconocimiento de Voz Continua Mediante T\u00e9cnicas MVQHMM y RNN<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>05\/06\/1992 a 05\/06\/1995<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_416\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{csr,<br \/>\r\ntitle = {Reconocimiento de Voz Continua Mediante T\u00e9cnicas MVQHMM y RNN},<br \/>\r\nyear  = {1992},<br \/>\r\ndate = {1992-06-05},<br \/>\r\nnumber = {TIC 92-0662},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {05\/06\/1992 a 05\/06\/1995},<br \/>\r\nnote = {7.601.000 ptas. (45682,93 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('416','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 91-1488-C06-05<\/b> <\/span> &#8211; ALBAYZIN<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Universidad de Granada, Univ. Polit\u00e9cnica de Valencia, Univ. Polit\u00e9cnica de Madrid, Univ. Aut\u00f3noma de Barcelona y Univ. Polit\u00e9cnica de Catalu\u00f1a<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>3<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>06\/08\/1991 a 06\/08\/1993<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_417\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{albayzin,<br \/>\r\ntitle = {ALBAYZIN},<br \/>\r\nyear  = {1991},<br \/>\r\ndate = {1991-08-06},<br \/>\r\nnumber = {TIC 91-1488-C06-05},<br \/>\r\npages = {3},<br \/>\r\ninstitution = {Universidad de Granada, Univ. Polit\u00e9cnica de Valencia, Univ. Polit\u00e9cnica de Madrid, Univ. Aut\u00f3noma de Barcelona y Univ. Polit\u00e9cnica de Catalu\u00f1a},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {06\/08\/1991 a 06\/08\/1993},<br \/>\r\nnote = {2600000 ptas, (15626,31 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('417','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_online\"><div class=\"tp_pub_info\"><p class=\"tp_pub_title\"> <span style=\"color: #038daa;font-size: 1,2rem;\"><b>TIC 88-0774<\/b> <\/span> &#8211; Desarrollo de sistemas para codificaci\u00f3n y reconocimiento de la voz<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad financiadora: <\/span><i>CICYT<\/i><\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Entidad\/es participantes: <\/span><i>Univ. Granada<\/i> &#8211; <span style=\"color: #888888;\">N. invest.: <\/span>9<\/p><p class=\"tp_pub_additional\"> <span style=\"color: #888888;\">Periodo: <\/span>01\/01\/1989 a 31\/12\/1991<\/p><p class=\"tp_pub_menu\"><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_418\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@online{voz,<br \/>\r\ntitle = {Desarrollo de sistemas para codificaci\u00f3n y reconocimiento de la voz},<br \/>\r\nyear  = {1989},<br \/>\r\ndate = {1989-01-01},<br \/>\r\nnumber = {TIC 88-0774},<br \/>\r\npages = {9},<br \/>\r\ninstitution = {Univ. Granada},<br \/>\r\norganization = {CICYT},<br \/>\r\nseries = {01\/01\/1989 a 31\/12\/1991},<br \/>\r\nnote = {20760000 ptas, (137247,12 \u20ac)},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {online}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('418','tp_bibtex')\">Cerrar<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PROYECTOSINVEST.destacados COINCYCDE &#8211; Detecci\u00f3n de ciberataques en \u201cindustria conectada\u201d e IoT mediante integraci\u00f3n y correlaci\u00f3n de alertas multifuente MADINCI &#8211; Modelado de ataques y detecci\u00f3n de incidentes de ciberseguridad Sistema para la Detecci\u00f3n Temprana de Ciberataques en Industria Conectada e IoT mediante Detecci\u00f3n de Anomal\u00edas Multiplanta PROYECTOSTRANSFER.destacados RENSHIELD &#8211; Detecci\u00f3n de ciberamenazas en los sistemas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-735","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/comments?post=735"}],"version-history":[{"count":10,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/735\/revisions"}],"predecessor-version":[{"id":3668,"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/pages\/735\/revisions\/3668"}],"wp:attachment":[{"href":"https:\/\/dtstc.ugr.es\/neus-cslab\/wp-json\/wp\/v2\/media?parent=735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}