<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-23T00:40:01Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/7243" metadataPrefix="didl">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/7243</identifier><datestamp>2023-02-01T13:30:06Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><d:DIDL xmlns:d="urn:mpeg:mpeg21:2002:02-DIDL-NS" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:mpeg:mpeg21:2002:02-DIDL-NS http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-21_schema_files/did/didl.xsd">
<d:DIDLInfo>
<dcterms:created xmlns:dcterms="http://purl.org/dc/terms/" xsi:schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/dcterms.xsd">2023-01-13T13:51:06Z</dcterms:created>
</d:DIDLInfo>
<d:Item id="hdl_10259_7243">
<d:Descriptor>
<d:Statement mimeType="application/xml; charset=utf-8">
<dii:Identifier xmlns:dii="urn:mpeg:mpeg21:2002:01-DII-NS" xsi:schemaLocation="urn:mpeg:mpeg21:2002:01-DII-NS http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-21_schema_files/dii/dii.xsd">urn:hdl:10259/7243</dii:Identifier>
</d:Statement>
</d:Descriptor>
<d:Descriptor>
<d:Statement mimeType="application/xml; charset=utf-8">
<oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
<dc:title>Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids</dc:title>
<dc:creator>Vega Vega, Rafael Alejandro</dc:creator>
<dc:creator>Chamoso, Pablo</dc:creator>
<dc:creator>González Briones, Alfonso</dc:creator>
<dc:creator>Casteleiro-Roca, José-Luis</dc:creator>
<dc:creator>Jove, Esteban</dc:creator>
<dc:creator>Meizoso-López, María del Carmen</dc:creator>
<dc:creator>Rodríguez-Gómez, Benigno Antonio</dc:creator>
<dc:creator>Quintián, Héctor</dc:creator>
<dc:creator>Herrero Cosío, Álvaro</dc:creator>
<dc:creator>Matsui, Kenji</dc:creator>
<dc:creator>Corchado, Emilio</dc:creator>
<dc:creator>Calvo-Rolle, José Luis</dc:creator>
<dc:subject>Smart grid</dc:subject>
<dc:subject>Computational intelligence</dc:subject>
<dc:subject>Automatic response</dc:subject>
<dc:subject>Exploratory projection pursuit</dc:subject>
<dc:subject>Neural network</dc:subject>
<dc:description>The present research work focuses on overcoming cybersecurity problems in the Smart Grid.&#xd;
Smart Grids must have feasible data capture and communications infrastructure to be able to manage&#xd;
the huge amounts of data coming from sensors. To ensure the proper operation of next-generation&#xd;
electricity grids, the captured data must be reliable and protected against vulnerabilities and&#xd;
possible attacks. The contribution of this paper to the state of the art lies in the identification of&#xd;
cyberattacks that produce anomalous behaviour in network management protocols. A novel neural&#xd;
projectionist technique (Beta Hebbian Learning, BHL) has been employed to get a general visual&#xd;
representation of the traffic of a network, making it possible to identify any abnormal behaviours and&#xd;
patterns, indicative of a cyberattack. This novel approach has been validated on 3 different datasets,&#xd;
demonstrating the ability of BHL to detect different types of attacks, more effectively than other&#xd;
state-of-the-art methods.</dc:description>
<dc:date>2023-01-13T13:51:06Z</dc:date>
<dc:date>2023-01-13T13:51:06Z</dc:date>
<dc:date>2020-03</dc:date>
<dc:type>info:eu-repo/semantics/article</dc:type>
<dc:identifier>http://hdl.handle.net/10259/7243</dc:identifier>
<dc:identifier>10.3390/app10072276</dc:identifier>
<dc:identifier>2076-3417</dc:identifier>
<dc:language>eng</dc:language>
<dc:relation>Applied sciences. 2020, V. 10, n. 7, e2276</dc:relation>
<dc:relation>https://doi.org/10.3390/app10072276</dc:relation>
<dc:rights>http://creativecommons.org/licenses/by/4.0/</dc:rights>
<dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
<dc:rights>Atribución 4.0 Internacional</dc:rights>
<dc:publisher>MDPI</dc:publisher>
</oai_dc:dc>
</d:Statement>
</d:Descriptor>
<d:Component id="10259_7243_1">
<d:Resource ref="https://riubu.ubu.es/bitstream/10259/7243/1/Herrero-as_2020.pdf" mimeType="application/pdf"/>
</d:Component>
</d:Item>
</d:DIDL></metadata></record></GetRecord></OAI-PMH>