Match!
Guiomar Corral
La Salle University
Machine learningData miningNetwork securityComputer scienceCluster analysis
9Publications
5H-index
68Citations
What is this?
Publications 9
Newest
#1Víctor Caballero (La Salle University)H-Index: 3
#2David Vernet (La Salle University)H-Index: 5
Last. Guiomar CorralH-Index: 6
view all 4 authors...
Sensor networks and the Internet of Things have driven the evolution of traditional electric power distribution networks towards a new paradigm referred to as Smart Grid. However, the different elements that compose the Information and Communication Technologies (ICTs) layer of a Smart Grid are usually conceived as isolated systems that typically result in rigid hardware architectures which are hard to interoperate, manage, and to adapt to new situations. If the Smart Grid paradigm has to be pre...
9 CitationsSource
#1Víctor Caballero (La Salle University)H-Index: 3
#2David Vernet (La Salle University)H-Index: 5
Last. Guiomar Corral (La Salle University)H-Index: 5
view all 4 authors...
Parte de esta investigacion ha estado financiada por la SUR de la DEC de la Generalitat de Cataluna y por Fondos Sociales Europeos 2017 FI_B 00583.
Source
#1A. Garcia-Piquer (La Salle University)H-Index: 11
#2Albert Fornells (La Salle University)H-Index: 9
Last. Elisabet Golobardes (La Salle University)H-Index: 6
view all 5 authors...
Real-world problems usually present a huge volume of imprecise data. These types of problems may challenge case-based reasoning systems because the knowledge extracted from data is used to identify analogies and solve new problems. Many authors have focused on organizing case memory in patterns to minimize the computational burden and deal with uncertainty. The organization is usually determined by a single criterion, but in some problems, a single criterion can be insufficient to find accurate ...
12 CitationsSource
#1Guiomar Corral (La Salle University)H-Index: 5
#2A. Garcia-Piquer (La Salle University)H-Index: 11
Last. Elisabet Golobardes (La Salle University)H-Index: 6
view all 5 authors...
Abstract: Information system security must battle regularly with new threats that jeopardize the protection of those systems. Security tests have to be run periodically not only to identify vulnerabilities but also to control information systems, network devices, services and communications. Vulnerability assessments gather large amounts of data to be further analyzed by security experts, who recently have started using data analysis techniques to extract useful knowledge from these data. With t...
10 CitationsSource
May 9, 2010 in ICT (International Conference on Telecommunications)
#1Guiomar Corral (La Salle University)H-Index: 5
#2J.M. Selga (La Salle University)H-Index: 8
Last. Berthold HaberlerH-Index: 1
view all 6 authors...
Power Line Communication (PLC) is a broadband telecommunication technology that enables the use of the existing electricity networks for high speed data transmission purposes. European project OPERA (Open PLC European Research Alliance) is a project whose strategic objective is to push PLC technology in all the different and relevant aspects. Within this framework, security is an important aspect that should be taken into account and integrated into the specifications from the very beginning. Th...
2 CitationsSource
#1Guiomar Corral (La Salle University)H-Index: 5
#2Eva Armengol (CSIC: Spanish National Research Council)H-Index: 13
Last. Elisabet Golobardes (La Salle University)H-Index: 6
view all 4 authors...
Network security tests should be periodically conducted to detect vulnerabilities before they are exploited. However, analysis of testing results is resource intensive with many data and requires expertise because it is an unsupervised domain. This paper presents how to automate and improve this analysis through the identification and explanation of device groups with similar vulnerabilities. Clustering is used for discovering hidden patterns and abnormal behaviors. Self-organizing maps are pref...
16 CitationsSource
Jun 22, 2009 in HAIS (Hybrid Artificial Intelligence Systems)
#1Guiomar Corral (La Salle University)H-Index: 5
#2A. Garcia-Piquer (La Salle University)H-Index: 11
Last. Elisabet Golobardes (La Salle University)H-Index: 6
view all 5 authors...
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts analyze these data and extract several conclusions. This paper presents a contribution to mine data in this security domain. We have implemented an evolutionary multiobjective approach to cluster data of security assessments. Clusters hold groups of tested devices with similar vulnerabilities to detect hidden patterns. T...
7 CitationsSource
#1J.M. Selga (La Salle University)H-Index: 8
#2Agustín Zaballos (La Salle University)H-Index: 9
Last. Guiomar Corral (La Salle University)H-Index: 5
view all 4 authors...
The present paper presents a Markov chain model of polling in noisy multi-hop systems typical of power line communications (PLC) as well as of other systems. The model includes the transmission of a backwards error indication packet (BEIP) to the master when the transmission is blocked in one of the downstream hops as well as the possibility to reduce the global time-out value below that strictly necessary to avoid having two simultaneous polls within the system. Two case studies are presented; ...
5 CitationsSource
#1Guiomar Corral (La Salle University)H-Index: 5
#2Elisabet Golobardes (La Salle University)H-Index: 6
Last. Àngel Martínez (La Salle University)H-Index: 1
view all 6 authors...
Security has become a main concern in corporate networks. In order to keep a network protected it is necessary to periodically perform security tests to control devices and services, and also identify possible vulnerabilities. Never two networks behave the same way; thus, results obtained from security tests may substantially differ from one to another. In this case, trying to manually find a behavior pattern for all networks becomes a difficult task. Unsupervised techniques can help security an...
5 Citations
1