Search Results for author: Francesco Zola

Found 8 papers, 0 papers with code

Enhancing Law Enforcement Training: A Gamified Approach to Detecting Terrorism Financing

no code implementations20 Mar 2024 Francesco Zola, Lander Segurola, Erin King, Martin Mullins, Raul Orduna

Tools for fighting cyber-criminal activities using new technologies are promoted and deployed every day.

NeuralSentinel: Safeguarding Neural Network Reliability and Trustworthiness

no code implementations12 Feb 2024 Xabier Echeberria-Barrio, Mikel Gorricho, Selene Valencia, Francesco Zola

This tool was deployed and used in a Hackathon event to evaluate the reliability of a skin cancer image detector.

Conditional Generative Adversarial Network for keystroke presentation attack

no code implementations16 Dec 2022 Idoia Eizaguirre-Peral, Lander Segurola-Gil, Francesco Zola

Results indicate that the cGAN can effectively generate keystroke dynamics patterns that can be used for deceiving keystroke authentication systems.

Generative Adversarial Network

Verification system based on long-range iris and Graph Siamese Neural Networks

no code implementations28 Jul 2022 Francesco Zola, Jose Alvaro Fernandez-Carrasco, Jan Lukas Bruse, Mikel Galar, Zeno Geradts

Biometric systems represent valid solutions in tasks like user authentication and verification, since they are able to analyze physical and behavioural features with high precision.

Iris Recognition valid

NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices

no code implementations15 Sep 2021 Lander Segurola-Gil, Francesco Zola, Xabier Echeberria-Barrio, Raul Orduna-Urrutia

In the recent years, cybersecurity has gained high relevance, converting the detection of attacks or intrusions into a key task.

Temporal graph-based approach for behavioural entity classification

no code implementations11 May 2021 Francesco Zola, Lander Segurola, Jan Lukas Bruse, Mikel Galar Idoate

We extract these graph structures that can represent the evolution of both normal and attack entities and apply a temporal dissection approach in order to highlight their micro-dynamics.

Classification Clustering

Cannot find the paper you are looking for? You can Submit a new open access paper.