Antonio Montes

ORCID: 0000-0002-0435-4987
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Business Process Modeling and Analysis
  • Big Data and Business Intelligence
  • Speech and Audio Processing
  • Healthcare Systems and Public Health
  • Video Surveillance and Tracking Methods
  • IoT-based Smart Home Systems
  • Neural Networks and Applications
  • Software System Performance and Reliability
  • Smart Grid Security and Resilience
  • Speech Recognition and Synthesis
  • Scientific Research and Technology
  • Music and Audio Processing
  • Advanced Neural Network Applications
  • Human Pose and Action Recognition
  • Spam and Phishing Detection
  • Emotion and Mood Recognition

Hospital Clínico San Carlos
2022

Universidad Politécnica de Madrid
2020

Centro de Tecnologia da Informação Renato Archer
2006-2008

Universidade Federal do Paraná
2007-2008

Cisco Systems (United States)
2005-2007

National Institute for Space Research
2005

This work presents a network intrusion detection method, created to identify and classify illegitimate information in TCP/IP packet payload based on the Snort signature set that represents possible attacks network. For this development, type of neural named Hamming net was used. The choice is interest investigate its adequacy events real-time, due capability learn faster than other models, such as, multilayer perceptrons with backpropagation Kohonen maps. A does not require exhaustive...

10.1109/ijcnn.2004.1380190 article EN 2005-04-05

Speech Emotion Recognition (SER) plays an important role in human-computer interface and assistant technologies. In this paper, a new method is proposed using distributed Convolution Neural Networks (CNN) to automatically learn affect-salient features from raw spectral information, then applying Bidirectional Recurrent Network (BRNN) obtain the temporal information output of CNN. end, Attention Mechanism implemented on sequence BRNN focus target emotion-pertinent parts utterance. This...

10.12783/dtcse/cii2017/17273 article EN DEStech Transactions on Computer Science and Engineering 2017-12-21

As the amount and types of remote network services increase, analysis their logs has become a very difficult time consuming task. There are several ways to filter relevant information provide reduced log set for analysis, such as whitelisting intrusion detection tools, but all them require too much fine- tuning work human expertise. Nowadays, researchers evaluating data mining approaches in logs, using techniques genetic algorithms, neural networks, clustering etc. Some those yield good...

10.1117/12.719023 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2007-04-09

This paper presents a comparative analysis of results obtained when applying Hamming Net and LVQ (Learning Vector Quantization) classifiers neural networks to recognize attack signatures in datasets. Strings similar those located on payload field computer packets are inserted these for pattern classification. Since 2004, it was presented the first time, ANNIDA system (Artificial Neural Network Intrusion Detection Application) has been improved. Although very sufficient by application network...

10.1109/sbrn.2006.21 article EN 2006-10-01

In this work we discuss some new techniques used by intruders to control a group of compromised machines (botnets).It is also shown how honeynets can be identify, monitor and understand current botnets behavior.We outline real case compromise, detailing analysis specially developed for study, including the tools, topology strategies adopted, as well results obtained in use identify botnets.

10.5769/c2007003 article EN 2007-09-01

In this work we discuss some new techniques used by intruders to control a group of compromised machines (botnets).It is also shown how honeynets can be identify, monitor and understand current botnets behavior.We outline real case compromise, detailing analysis specially developed for study, including the tools, topology strategies adopted, as well results obtained in use identify botnets.

10.5769/j200801003 article EN The International Journal of Forensic Computer Science 2008-01-01

Abstract Introduction and purpose Atrial fibrillation (AF) is the most common arrhythmia worldwide, with a considerable prevalence, high morbidity, mortality, finantial cost in Europe. To optimise quality of medical care received patients AF, we need to know investigate their accurate demographic clinical typology actual patient journey, which involves many data review number included. The CHA2DS2Vasc score classifies risk stroke atrial fibrillation, one critical complications this...

10.1093/ehjdh/ztac076.2792 article EN cc-by-nc European Heart Journal - Digital Health 2022-12-22

As part of an effort to improve honeynet's maintenance process, several procedures and tools automating high-interaction honeypot management tasks have been developed. Among the advantages adoption use these are documentation procedures, standardization collected data structure, elimination errors during honeypots, automatization that executed reduction time between deactivation activation a compromised honeypot.

10.1109/iaw.2005.1495960 article EN 2005-08-16

Abstract Introduction and purpose Atrial fibrillation (AF) is the most common arrhythmia worldwide, with a considerable prevalence, high morbidity, mortality, finantial cost in Europe. To optimise quality of medical care received patients AF, we need to know investigate their accurate demographic clinical typology actual patient journey, which involves many data review number included. The CHA2DS2Vasc score classifies risk stroke atrial fibrillation, one critical complications this...

10.1093/eurheartj/ehac544.2792 article EN European Heart Journal 2022-10-01
Coming Soon ...