<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-27T09:20:35Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/7243" metadataPrefix="etdms">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/7243</identifier><datestamp>2023-02-01T13:30:06Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><thesis xmlns="http://www.ndltd.org/standards/metadata/etdms/1.0/" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.ndltd.org/standards/metadata/etdms/1.0/ http://www.ndltd.org/standards/metadata/etdms/1.0/etdms.xsd">
<title>Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids</title>
<creator>Vega Vega, Rafael Alejandro</creator>
<creator>Chamoso, Pablo</creator>
<creator>González Briones, Alfonso</creator>
<creator>Casteleiro-Roca, José-Luis</creator>
<creator>Jove, Esteban</creator>
<creator>Meizoso-López, María del Carmen</creator>
<creator>Rodríguez-Gómez, Benigno Antonio</creator>
<creator>Quintián, Héctor</creator>
<creator>Herrero Cosío, Álvaro</creator>
<creator>Matsui, Kenji</creator>
<creator>Corchado, Emilio</creator>
<creator>Calvo-Rolle, José Luis</creator>
<subject>Smart grid</subject>
<subject>Computational intelligence</subject>
<subject>Automatic response</subject>
<subject>Exploratory projection pursuit</subject>
<subject>Neural network</subject>
<description>The present research work focuses on overcoming cybersecurity problems in the Smart Grid.&#xd;
Smart Grids must have feasible data capture and communications infrastructure to be able to manage&#xd;
the huge amounts of data coming from sensors. To ensure the proper operation of next-generation&#xd;
electricity grids, the captured data must be reliable and protected against vulnerabilities and&#xd;
possible attacks. The contribution of this paper to the state of the art lies in the identification of&#xd;
cyberattacks that produce anomalous behaviour in network management protocols. A novel neural&#xd;
projectionist technique (Beta Hebbian Learning, BHL) has been employed to get a general visual&#xd;
representation of the traffic of a network, making it possible to identify any abnormal behaviours and&#xd;
patterns, indicative of a cyberattack. This novel approach has been validated on 3 different datasets,&#xd;
demonstrating the ability of BHL to detect different types of attacks, more effectively than other&#xd;
state-of-the-art methods.</description>
<date>2023-01-13</date>
<date>2023-01-13</date>
<date>2020-03</date>
<type>info:eu-repo/semantics/article</type>
<identifier>http://hdl.handle.net/10259/7243</identifier>
<identifier>10.3390/app10072276</identifier>
<identifier>2076-3417</identifier>
<language>eng</language>
<relation>Applied sciences. 2020, V. 10, n. 7, e2276</relation>
<relation>https://doi.org/10.3390/app10072276</relation>
<rights>http://creativecommons.org/licenses/by/4.0/</rights>
<rights>info:eu-repo/semantics/openAccess</rights>
<rights>Atribución 4.0 Internacional</rights>
<publisher>MDPI</publisher>
</thesis></metadata></record></GetRecord></OAI-PMH>