Silvia González

ORCID: 0000-0003-2095-3338
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Stroke Rehabilitation and Recovery
  • Context-Aware Activity Recognition Systems
  • Obstructive Sleep Apnea Research
  • EEG and Brain-Computer Interfaces
  • Software Testing and Debugging Techniques
  • Non-Invasive Vital Sign Monitoring
  • Internet Traffic Analysis and Secure E-voting
  • Acute Ischemic Stroke Management
  • Time Series Analysis and Forecasting
  • Advanced Chemical Sensor Technologies
  • Spam and Phishing Detection
  • ECG Monitoring and Analysis
  • Healthcare Operations and Scheduling Optimization
  • Spectroscopy and Chemometric Analyses
  • Remote Sensing and Land Use
  • Virtual Reality Applications and Impacts
  • Sentiment Analysis and Opinion Mining
  • Hand Gesture Recognition Systems
  • Tissue Engineering and Regenerative Medicine
  • Scheduling and Timetabling Solutions
  • Surgical Simulation and Training
  • Video Analysis and Summarization
  • Genetics, Aging, and Longevity in Model Organisms

Technological Institute of Castilla y León
2011-2025

Institut Català d'Oncologia
2020

Institut d'Investigació Biomédica de Bellvitge
2020

Universidad de Oviedo
2015

Universidad Politécnica de Madrid
2013

The development of efficient stroke-detection methods is significant importance in today's society due to the effects and impact stroke on health economy worldwide. This study focuses Human Activity Recognition (HAR), which a key component developing an early stroke-diagnosis tool. An overview proposed global approach able discriminate normal resting from stroke-related paralysis detailed. main contributions include extension Genetic Fuzzy Finite State Machine (GFFSM) method new hybrid...

10.1142/s0129065714500361 article EN International Journal of Neural Systems 2014-11-11

Prompt administration of radiotherapy (RT) is one the most effective treatments against cancer. Each day, departments large hospitals must plan numerous irradiation sessions, considering availability human and material resources, such as healthcare professionals linear accelerators. With increasing number patients suffering from different types cancers, manually establishing schedules following each patient’s treatment protocols has become an extremely difficult time-consuming task. We...

10.1177/14604582251318252 article EN cc-by-nc Health Informatics Journal 2025-01-01

In recent years, mobile devices such as smartphones, tablets and wearables have become the new paradigm of user–computer interaction. The increasing use adoption is also leading to an increased number potential security risks. spread malware, particularly on popular open platforms Android, has a major concern. This paper focuses bad-intentioned Android apps by addressing problem selecting key features software that support characterization malware. accurate detection this still challenge,...

10.1093/jigpal/jzw046 article EN Logic Journal of IGPL 2016-08-05

The increasing prevalence of wearable sensors and low-cost mobile devices have prompted the development systems for automated diagnosis.Here we focus on models algorithms early detection strokes that are implanted in a device generates warning alarms automatically connects to e-health services, ensuring timely interventions at onset stroke.The proposed approach employs two monitor movement data involve main stages: Human Activity Recognition (HAR) alarm generation.Two different HAR methods...

10.3233/ica-150488 article EN other-oa Integrated Computer-Aided Engineering 2015-06-02

Hemineglect is frequent after right hemisphere stroke and prevents functional independence, but effective rehabilitation interventions are lacking. Our objective was to determine if a visual-acoustic alarm in the hemineglect arm activated by certain discrepancy movement of both hands can enhance neglect use five tasks daily living. In this pre-post intervention study 9 patients with residual were trained for 7 days bimanual living: carrying tray, button fastening, cutting food knife fork,...

10.1186/s12984-016-0191-0 article EN cc-by Journal of NeuroEngineering and Rehabilitation 2016-09-02

As it is well known, some Intrusion Detection Systems (IDSs) suffer from high rates of false positives and negatives. A mutation technique proposed in this study to test evaluate the performance a full range classifier ensembles for Network when trying recognize new attacks. The novel applies mutant operators that randomly modify features captured network packets generate situations could not otherwise be provided IDSs while learning. comprehensive comparison supervised classifiers their...

10.1093/jigpal/jzs037 article EN Logic Journal of IGPL 2012-09-03

The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As result, the SSH service has been an appealing target attackers, aiming guess root passwords performing dictionary attacks or directly exploit itself. To identify such situations, this article addresses detection of anomalous connections from intrusion perspective. main idea compare several strategies and...

10.1093/jigpal/jzv047 article EN Logic Journal of IGPL 2015-10-20

This experimental study is focused on the application of some nature inspired classifier ensembles for detection SNMP-related attacks. The reliability novel method proposed compared with other models and validated under a real interesting case study, taking into account several different anomalous situations as port scan MIB Information Transfer.

10.1109/nabic.2011.6089660 article EN 2011-10-01
Coming Soon ...