- Inicio
- RESULTADOS DE INVESTIGACIÓN
- Artículos Científicos WOS y SCOPUS
- Listar Artículos Científicos WOS y SCOPUS por autor
Listar Artículos Científicos WOS y SCOPUS por autor "Martínez Herraiz, José-Javier"
Mostrando ítems 1-4 de 4
-
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Martínez Herraiz, José-Javier; Sicilia, Juan Antonio (Computers & Security, 2022)Context: There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of attack ... -
MMALE a methodology for malware analysis in linux environments
de Vicente Mohino, José Javier ; Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio ; Sánchez Rubio, Manuel ; Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ... -
Prevention and fighting against web attacks through anomaly detection technology. A systematic review
Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Martínez Herraiz, José-Javier; Sicilia, Juan Antonio (Sustainability (Switzerland), 01/06/2020)Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ... -
Systematic Approach for Web Protection Runtime Tools’ Effectiveness Analysis
Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón; Bermejo-Higuera, Javier; Sicilia, Juan Antonio; Martínez Herraiz, José-Javier (CMES - Computer Modeling in Engineering and Sciences, 2022)Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources. Thus, different approaches to protect web applications have been proposed to date. Of them, ...