<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Datos de investigación GICAP</title>
<link href="https://hdl.handle.net/10259/8557" rel="alternate"/>
<subtitle/>
<id>https://hdl.handle.net/10259/8557</id>
<updated>2026-04-18T22:29:20Z</updated>
<dc:date>2026-04-18T22:29:20Z</dc:date>
<entry>
<title>Labeled IoT Window-Based Random Network Pattern Dataset for Reinforcement Learning</title>
<link href="https://hdl.handle.net/10259/11497" rel="alternate"/>
<author>
<name>Rodríguez Villagrá, César</name>
</author>
<author>
<name>Martin Reizabal, Sergio</name>
</author>
<author>
<name>Ruiz González, Rubén</name>
</author>
<author>
<name>Basurto Hornillos, Nuño</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11497</id>
<updated>2026-04-08T11:34:34Z</updated>
<published>2026-04-12T00:00:00Z</published>
<summary type="text">Labeled IoT Window-Based Random Network Pattern Dataset for Reinforcement Learning
Rodríguez Villagrá, César; Martin Reizabal, Sergio; Ruiz González, Rubén; Basurto Hornillos, Nuño; Herrero Cosío, Álvaro
This dataset is designed to support the training and evaluation of&#13;
reinforcement learning models in the context of network traffic&#13;
analysis. It is derived from an existing IoT network traffic dataset,&#13;
from which packet capture (pcap) files were selected and processed&#13;
following a custom methodology explained in [Methodological&#13;
Information](methodological-information). The resulting data&#13;
representation is based on a windowing approach, where network traffic&#13;
is segmented into fixed-size temporal windows.&#13;
&#13;
Each window aggregates traffic instances and is labeled according to its&#13;
composition as benign, attack, or mixed (containing both benign and&#13;
malicious activity). The final datasets are generated through random&#13;
combinations of these windows, enabling the creation of diverse traffic&#13;
patterns that better reflect dynamic and random network conditions.&#13;
&#13;
This structure facilitates the use of the dataset in reinforcement&#13;
learning scenarios, where agents must learn to identify, classify, or&#13;
respond to varying traffic behaviors over time. Additionally, the&#13;
evaluation datasets are generated following the same methodology as the&#13;
training datasets, but are kept separate and are not used during the&#13;
training process, allowing for an independent evaluation of model&#13;
performance.
</summary>
<dc:date>2026-04-12T00:00:00Z</dc:date>
</entry>
<entry>
<title>CyberFlowIoT-GICAP: Labelled Flow-Based Network Traffic Dataset for Cyberattack Detection [Dataset]</title>
<link href="https://hdl.handle.net/10259/11273" rel="alternate"/>
<author>
<name>Martínez González, Branly Alberto</name>
</author>
<author>
<name>Cambra Baseca, Carlos</name>
</author>
<author>
<name>Urda Muñoz, Daniel</name>
</author>
<author>
<name>Rincón Arango, Jaime Andrés</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11273</id>
<updated>2026-03-16T09:20:25Z</updated>
<published>2026-01-23T00:00:00Z</published>
<summary type="text">CyberFlowIoT-GICAP: Labelled Flow-Based Network Traffic Dataset for Cyberattack Detection [Dataset]
Martínez González, Branly Alberto; Cambra Baseca, Carlos; Urda Muñoz, Daniel; Rincón Arango, Jaime Andrés; Herrero Cosío, Álvaro
This study presents a labelled flow-based network traffic dataset collected from a controlled Internet of Things (IoT) laboratory environment. The dataset captures network communication generated by hardware-based IoT devices during normal operation, including MQTT messaging, database synchronization, and web-based monitoring, as well as during the execution of predefined cyber-attack scenarios within an isolated experimental network.&#13;
&#13;
Network traffic was recorded at the packet level using passive network monitoring and stored in PCAP format. The packet captures were subsequently processed into bidirectional network flows using a flow-based traffic extraction pipeline, producing flow records with statistical and temporal attributes derived from the observed packet exchanges.&#13;
&#13;
Cyberattack-related flows were identified based on predefined attack execution time intervals obtained from experimental metadata. Network flows observed outside these intervals were labelled as benign and correspond to regular device communication.&#13;
&#13;
The dataset is distributed through a structured repository that includes raw packet captures, processed flow-level datasets in tabular format, and metadata files describing the experimental setup, attack scenarios, and labelling criteria. The data support flow-based analysis of IoT network traffic and the evaluation of cyberattack detection methods.
</summary>
<dc:date>2026-01-23T00:00:00Z</dc:date>
</entry>
<entry>
<title>Stochastic Simulation Dataset of IoT Malware Spread Using Individual-Based SIR Models and Topological Overlap Measures</title>
<link href="https://hdl.handle.net/10259/11078" rel="alternate"/>
<author>
<name>Rodríguez García, Rafael</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/11078</id>
<updated>2025-11-20T09:08:16Z</updated>
<published>2025-11-01T00:00:00Z</published>
<summary type="text">Stochastic Simulation Dataset of IoT Malware Spread Using Individual-Based SIR Models and Topological Overlap Measures
Rodríguez García, Rafael; Herrero Cosío, Álvaro
This dataset contains simulation data generated from two individual-based stochastic models for malware propagation in an Internet-of-Things (IoT) network: a continuous-time Gillespie SIR model and a discrete-time Monte Carlo SIR model.&#13;
For each modeling framework, two variants are included: the standard version (Gil / LMC) and the version incorporating the Topological Overlap Measure (TOM) (GilT / LMCTOM).&#13;
All simulations are executed on a 128-node IoT communication network generated as a power-law cluster graph.&#13;
Each simulation is stored as an independent CSV file in pivoted format, where rows represent network nodes and columns represent temporal steps produced by the algorithm (event steps in the Gillespie method and iteration steps in the Monte Carlo method).&#13;
The dataset is suitable for research on malware propagation, stochastic processes on networks, graph-based machine learning models, and cybersecurity analytics.
</summary>
<dc:date>2025-11-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Red-Edge (725nm) Monochrome Imaging of Vine Leaves Treated with Antifungal Products</title>
<link href="https://hdl.handle.net/10259/10909" rel="alternate"/>
<author>
<name>Cambra Baseca, Carlos</name>
</author>
<author>
<name>Nascimento, Antonia Maiara Marques do</name>
</author>
<author>
<name>Rad Moradillo, Juan Carlos</name>
</author>
<author>
<name>Ruiz González, Rubén</name>
</author>
<author>
<name>Barros García, Rocío</name>
</author>
<author>
<name>Herrero Cosío, Álvaro</name>
</author>
<id>https://hdl.handle.net/10259/10909</id>
<updated>2025-10-01T07:45:28Z</updated>
<published>2025-09-27T00:00:00Z</published>
<summary type="text">Red-Edge (725nm) Monochrome Imaging of Vine Leaves Treated with Antifungal Products
Cambra Baseca, Carlos; Nascimento, Antonia Maiara Marques do; Rad Moradillo, Juan Carlos; Ruiz González, Rubén; Barros García, Rocío; Herrero Cosío, Álvaro
The dataset contains all raw data of the work "Red-Edge (725nm) Monochrome Imaging of Vine Leaves Treated with Antifungal Products"
</summary>
<dc:date>2025-09-27T00:00:00Z</dc:date>
</entry>
</feed>
