<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Inteligencia Computacional Aplicada (GICAP)</title>
<link href="https://hdl.handle.net/10259/3847" rel="alternate"/>
<subtitle/>
<id>https://hdl.handle.net/10259/3847</id>
<updated>2026-04-18T22:29:24Z</updated>
<dc:date>2026-04-18T22:29:24Z</dc:date>
<entry>
<title>Labeled IoT Window-Based Random Network Pattern Dataset for Reinforcement Learning</title>
<link href="https://hdl.handle.net/10259/11497" rel="alternate"/>
<author>
<name>Rodríguez Villagrá, César</name>
</author>
<author>
<name>Martin Reizabal, Sergio</name>
</author>
<author>
<name>Ruiz González, Rubén</name>
</author>
<author>
<name>Basurto Hornillos, Nuño</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11497</id>
<updated>2026-04-08T11:34:34Z</updated>
<published>2026-04-12T00:00:00Z</published>
<summary type="text">Labeled IoT Window-Based Random Network Pattern Dataset for Reinforcement Learning
Rodríguez Villagrá, César; Martin Reizabal, Sergio; Ruiz González, Rubén; Basurto Hornillos, Nuño; Herrero Cosío, Álvaro
This dataset is designed to support the training and evaluation of&#13;
reinforcement learning models in the context of network traffic&#13;
analysis. It is derived from an existing IoT network traffic dataset,&#13;
from which packet capture (pcap) files were selected and processed&#13;
following a custom methodology explained in [Methodological&#13;
Information](methodological-information). The resulting data&#13;
representation is based on a windowing approach, where network traffic&#13;
is segmented into fixed-size temporal windows.&#13;
&#13;
Each window aggregates traffic instances and is labeled according to its&#13;
composition as benign, attack, or mixed (containing both benign and&#13;
malicious activity). The final datasets are generated through random&#13;
combinations of these windows, enabling the creation of diverse traffic&#13;
patterns that better reflect dynamic and random network conditions.&#13;
&#13;
This structure facilitates the use of the dataset in reinforcement&#13;
learning scenarios, where agents must learn to identify, classify, or&#13;
respond to varying traffic behaviors over time. Additionally, the&#13;
evaluation datasets are generated following the same methodology as the&#13;
training datasets, but are kept separate and are not used during the&#13;
training process, allowing for an independent evaluation of model&#13;
performance.
</summary>
<dc:date>2026-04-12T00:00:00Z</dc:date>
</entry>
<entry>
<title>Percepción de seguridad en dispositivos IoT domésticos: análisis descriptivo basado en encuesta</title>
<link href="https://hdl.handle.net/10259/11493" rel="alternate"/>
<author>
<name>Gil Arroyo, Beatriz</name>
</author>
<author>
<name>Cotillas Torres, Clara</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11493</id>
<updated>2026-04-08T07:38:00Z</updated>
<published>2026-03-24T00:00:00Z</published>
<summary type="text">Percepción de seguridad en dispositivos IoT domésticos: análisis descriptivo basado en encuesta
Gil Arroyo, Beatriz; Cotillas Torres, Clara; Herrero Cosío, Álvaro
Informe del proyecto de ciencia ciudadana en el que se recogen y analizan los datos de las encuestas de percepción sobre seguridad de dispositivos IoT domésticos.&#13;
Esta actividad se lleva a cabo en ejecución del Proyecto Estratégico "Inteligencia Artificial para la Securización de Dispositivos IoT" (C032.23), &#13;
fruto de un convenio de colaboración suscrito entre el Instituto Nacional de Ciberseguridad (INCIBE) y la Universidad de Burgos. &#13;
Esta iniciativa se realiza en el marco de los fondos del Plan de Recuperación, Transformación y Resiliencia, financiadas por la Unión Europea (Next Generation), &#13;
el proyecto del Gobierno de España que traza la hoja de ruta para la modernización de la economía española, la recuperación del crecimiento económico y la creación de empleo, &#13;
para la reconstrucción económica sólida, inclusiva y resiliente tras la crisis de la COVID19, y para responder a los retos de la próxima década.
</summary>
<dc:date>2026-03-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Soft Computing System to Perform Face Milling Operations</title>
<link href="https://hdl.handle.net/10259/11485" rel="alternate"/>
<author>
<name>Redondo Guevara, Raquel</name>
</author>
<author>
<name>Santos González, Pedro</name>
</author>
<author>
<name>Bustillo Iglesias, Andrés</name>
</author>
<author>
<name>Sedano, Javier</name>
</author>
<author>
<name>Villar, José R.</name>
</author>
<author>
<name>Correa, Maritza</name>
</author>
<author>
<name>Alique, José Ramón</name>
</author>
<author>
<name>Corchado, Emilio</name>
</author>
<id>https://hdl.handle.net/10259/11485</id>
<updated>2026-03-21T01:05:42Z</updated>
<published>2009-01-01T00:00:00Z</published>
<summary type="text">A Soft Computing System to Perform Face Milling Operations
Redondo Guevara, Raquel; Santos González, Pedro; Bustillo Iglesias, Andrés; Sedano, Javier; Villar, José R.; Correa, Maritza; Alique, José Ramón; Corchado, Emilio
In this paper we present a soft computing system developed to optimize the face milling operation under High Speed conditions in the manufacture of steel components like molds with deep cavities. This applied research presents a multidisciplinary study based on the application of neural projection models in conjunction with identification systems, in order to find the optimal operating conditions in this industrial issue. Sensors on a milling centre capture the data used in this industrial case study defined under the frame of a machine-tool that manufactures industrial tools. The presented model is based on a two-phase application. The first phase uses a neural projection model capable of determine if the data collected is informative enough. The second phase is focus on identifying a model for the face milling process based on low-order models such as Black Box ones. The whole system is capable of approximating the optimal form of the model. Finally, it is shown that the Box-Jenkins algorithm, which calculates the function of a linear system from its input and output samples, is the most appropriate model to control such industrial task for the case of steel tools.
Comunicación presentada en: 10th International Work-Conference on Artificial Neural Networks, IWANN 2009 Workshops, Salamanca, Spain, June 10-12, 2009. Proceedings, Part II
</summary>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>CyberFlowIoT-GICAP: Labelled Flow-Based Network Traffic Dataset for Cyberattack Detection [Dataset]</title>
<link href="https://hdl.handle.net/10259/11273" rel="alternate"/>
<author>
<name>Martínez González, Branly Alberto</name>
</author>
<author>
<name>Cambra Baseca, Carlos</name>
</author>
<author>
<name>Urda Muñoz, Daniel</name>
</author>
<author>
<name>Rincón Arango, Jaime Andrés</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11273</id>
<updated>2026-03-16T09:20:25Z</updated>
<published>2026-01-23T00:00:00Z</published>
<summary type="text">CyberFlowIoT-GICAP: Labelled Flow-Based Network Traffic Dataset for Cyberattack Detection [Dataset]
Martínez González, Branly Alberto; Cambra Baseca, Carlos; Urda Muñoz, Daniel; Rincón Arango, Jaime Andrés; Herrero Cosío, Álvaro
This study presents a labelled flow-based network traffic dataset collected from a controlled Internet of Things (IoT) laboratory environment. The dataset captures network communication generated by hardware-based IoT devices during normal operation, including MQTT messaging, database synchronization, and web-based monitoring, as well as during the execution of predefined cyber-attack scenarios within an isolated experimental network.&#13;
&#13;
Network traffic was recorded at the packet level using passive network monitoring and stored in PCAP format. The packet captures were subsequently processed into bidirectional network flows using a flow-based traffic extraction pipeline, producing flow records with statistical and temporal attributes derived from the observed packet exchanges.&#13;
&#13;
Cyberattack-related flows were identified based on predefined attack execution time intervals obtained from experimental metadata. Network flows observed outside these intervals were labelled as benign and correspond to regular device communication.&#13;
&#13;
The dataset is distributed through a structured repository that includes raw packet captures, processed flow-level datasets in tabular format, and metadata files describing the experimental setup, attack scenarios, and labelling criteria. The data support flow-based analysis of IoT network traffic and the evaluation of cyberattack detection methods.
</summary>
<dc:date>2026-01-23T00:00:00Z</dc:date>
</entry>
</feed>
