Preface
Autor:
Villazon, Boris
; Ortiz-Rodriguez, Fernando
; Tiwari, Sanju
; Sicilia Urban, Miguel Ángel
; Martin-Moncunill, David
Fecha:
2022Revista / editorial:
Communications in Computer and Information ScienceTipo de Ítem:
otherDirección web:
https://www.springer.com/series/7899Resumen:
[Summary not available]
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 19 |
| 28 |
| 61 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Guest editorial: Special issue on “current topics of knowledge graphs and semantic web”
Tiwari, Sanju; Ortiz-Rodriguez, Fernando; Villazon, Boris (International Journal of Web Information Systems, 2022)Knowledge Graphs are considered as a set of data points associated with relations to describe the domains such as an organization, business or academics. They have a potential role to bridge the semantic gap between ... -
A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector
Sánchez Rodríguez, Miguel Ángel ; Bermejo-Higuera, Javier ; Bermejo Higuera, Juan Ramón ; Sicilia, Juan Antonio ; González-Crespo, Rubén (Elsevier B.V., 2021)In a context of digitalization and technological evolution in all aspects of our lives, the electricity sector could not be left behind. This opens up a new range of possibilities until now unthinkable, which will facilitate ... -
Systematic Approach to Malware Analysis (SAMA)
Bermejo-Higuera, Javier; Abad-Aramburu, Carlos; Bermejo Higuera, Juan Ramón; Sicilia Urban, Miguel Ángel; Sicilia, Juan Antonio (Applied Sciences, 02/2020)Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find ...





