6 research outputs found

    Potential Fields as an External Force and Algorithmic Improvements in Deformable Models

    Get PDF
    Deformable Models are extensively used as a Pattern Recognition technique. They are curves defined within an image domain that can be moved under the influence of internal and external forces. Some trade-offs of standard deformable models algorithms are the selection of image energy function (external force), the location of initial snake and the attraction of contour points to local energy minima when the snake is being deformed. This paper proposes a new procedure using potential fields as external forces. In addition, standard Deformable Models algorithm has been enhanced with both this new external force and algorithmic improvements. The performance of the presented approach has been successfully proved to extract muscles from Magnetic Resonance Imaging (MRI) sequences of Iberian ham at different maturation stages in order to calculate their volume change. The main conclusions of this paper are the practical viability of potential fields used as external forces, as well as the validation of the algorithmic improvements developed. The feasibility of applying Computer Vision techniques, in conjunction with MRI, for determining automatically the optimal ripening time of the Iberian ham is a practical conclusion reached with the proposed approach

    Guidelines towards secure SSL pinning in mobile applicationsand

    Get PDF
    Security is a major concern in web applications for so long, but it is only recently that the use of mobile applications has reached the level of web services. This way, we are taking OWASP Top 10 Mobile as our starting point to secure mobile applications. Insecure communication is one of the most important topics to be considered. In fact, many mobile applications do not even implement SSL/TLS validations or may have SSL/TLS vulnerabilities. This paper explains how an application can be fortified using secure SSL pinning, and offers a three-step process as an improvement of OWASP Mobile recommendations to avoid SSL pinning bypassing. Therefore, following the process described in this paper, mobile application developers may establish a secure SSL/TLS communication.Ministry of Science and Technology of Spain ECLIPSE RTI2018-094283-B-C33Junta de Andalucía the PIRAMIDE and METAMORFOSIS projectsEuropean Regional Development Fund (ERDF/FEDER)Universidad de Sevilla Cátedra de Telefónica “Inteligencia en la red

    Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres, España

    No full text
    Las V Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) se celebran en Cáceres, del 5 al 7 de junio de 2019, organizadas por la Universidad de Extremadura (UEx), la Universidad Complutense de Madrid (UCM) y la fundación COMPUTAEX. Por primera vez estas jornadas están organizadas por más de una institución. Un buen espejo donde comprobar que la simbiosis entre grupos de diferentes universidades converge en puntos en común, aspecto fundamental en la filosofía de las propias JNIC desde su primera edición. La colaboración del Instituto Nacional de Ciberseguridad (INCIBE) en la realización de estas Jornadas se presenta también como fundamental para garantizar su éxito. El programa incluye trabajos de investigación en ciberseguridad relacionados con la detección de intrusiones, la monitorización de eventos de seguridad, la prevención, las políticas de seguridad, ataques, vulnerabilidades, análisis forense, cifrado. También se presentan trabajos de formación e innovación educativa. Y, como en años anteriores, se continúa con la línea de transferencia tecnológica, donde empresas e instituciones presentan retos científicos a los diferentes grupos de investigación. En esta edición de las JNIC, se han recibido 83 trabajos, de los cuales finalmente se han admitido 62 para su presentación en las jornadas (33 en formato de comunicación oral y 29 en formato de póster), además de dos trabajos de estudiantes, premiados como mejor Tesis y Trabajo Fin de Máster relacionados con la ciberseguridad.The V National Cybersecurity Research Conference (JNIC) are held in Cáceres, from June 5 to 7, 2019, organized by the University of Extremadura (UEx), the Complutense University of Madrid (UCM) and the COMPUTAEX foundation. For the first time it is organized by more than one institution. A good mirror to check that the symbiosis between groups of different universities converge in common points, fundamental aspect in the philosophy of the JNIC themselves since its first edition. The collaboration of the National Institute of Cybersecurity (INCIBE) in the realization of this Conference is also presented as fundamental to guarantee its success. The program includes research work in cybersecurity related to intrusion detection, security event monitoring, prevention, security policies, attacks, vulnerabilities, forensic analysis, encryption. Educational training and innovation projects are also presented. And, as in previous years, the technology transfer line continues, where companies and institutions present scientific challenges to the different research groups. In this edition of the JNIC, 83 works have been received, of which 62 have finally been accepted for presentation at the conference (33 in oral communication format and 29 in poster format), as well as two works by award-winning students as the best Thesis and Master's Thesis related to cybersecurity

    62 Guía de resolución de pruebas CTF para adquirir habilidades de seguridad informática y análisis forense

    No full text
    La falta de perfiles especializados y de necesidad formativa en el ámbito de la ciberseguridad, ha hecho que las competiciones del tipo Capture the Flag (CTF) se hayan incrementado en los últimos años. La finalidad de estas pruebas es identificar talento que incorporar a empresas del sector tecnológico de manera rápida. Debido a la importancia formativa dada a este tipo de pruebas cuyo enfoque es el Aprendizaje Basado en Retos, esta contribución analiza un total de 125 retos de CTF englobados en las disciplinas de esteganografía, análisis forense y hacking web. El objetivo es conocer si existen coincidencias o correlaciones en el proceso de resolución de los retos. Como resultado de dicho análisis profundo, se presenta una guía de resolución de pruebas CTF que, a modo de esquemas, sirva de apoyo a los usuarios o equipos para adquirir habilidades en seguridad informática y análisis forense

    Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres, España

    No full text
    Las V Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) se celebran en Cáceres, del 5 al 7 de junio de 2019, organizadas por la Universidad de Extremadura (UEx), la Universidad Complutense de Madrid (UCM) y la fundación COMPUTAEX. Por primera vez estas jornadas están organizadas por más de una institución. Un buen espejo donde comprobar que la simbiosis entre grupos de diferentes universidades converge en puntos en común, aspecto fundamental en la filosofía de las propias JNIC desde su primera edición. La colaboración del Instituto Nacional de Ciberseguridad (INCIBE) en la realización de estas Jornadas se presenta también como fundamental para garantizar su éxito. El programa incluye trabajos de investigación en ciberseguridad relacionados con la detección de intrusiones, la monitorización de eventos de seguridad, la prevención, las políticas de seguridad, ataques, vulnerabilidades, análisis forense, cifrado. También se presentan trabajos de formación e innovación educativa. Y, como en años anteriores, se continúa con la línea de transferencia tecnológica, donde empresas e instituciones presentan retos científicos a los diferentes grupos de investigación. En esta edición de las JNIC, se han recibido 83 trabajos, de los cuales finalmente se han admitido 62 para su presentación en las jornadas (33 en formato de comunicación oral y 29 en formato de póster), además de dos trabajos de estudiantes, premiados como mejor Tesis y Trabajo Fin de Máster relacionados con la ciberseguridad.The V National Cybersecurity Research Conference (JNIC) are held in Cáceres, from June 5 to 7, 2019, organized by the University of Extremadura (UEx), the Complutense University of Madrid (UCM) and the COMPUTAEX foundation. For the first time it is organized by more than one institution. A good mirror to check that the symbiosis between groups of different universities converge in common points, fundamental aspect in the philosophy of the JNIC themselves since its first edition. The collaboration of the National Institute of Cybersecurity (INCIBE) in the realization of this Conference is also presented as fundamental to guarantee its success. The program includes research work in cybersecurity related to intrusion detection, security event monitoring, prevention, security policies, attacks, vulnerabilities, forensic analysis, encryption. Educational training and innovation projects are also presented. And, as in previous years, the technology transfer line continues, where companies and institutions present scientific challenges to the different research groups. In this edition of the JNIC, 83 works have been received, of which 62 have finally been accepted for presentation at the conference (33 in oral communication format and 29 in poster format), as well as two works by award-winning students as the best Thesis and Master's Thesis related to cybersecurity

    Potential Fields as an External Force and Algorithmic Improvements in Deformable Models

    No full text
    Deformable Models are extensively used as a Pattern Recognition technique. They are curves defined within an image domain that can be moved under the influence of internal and external forces. Some trade-offs of standard deformable models algorithms are the selection of image energy function (external force), the location of initial snake and the attraction of contour points to local energy minima when the snake is being deformed. This paper proposes a new procedure using potential fields as external forces. In addition, standard Deformable Models algorithm has been enhanced with both this new external force and algorithmic improvements. The performance of the presented approach has been successfully proved to extract muscles from Magnetic Resonance Imaging (MRI) sequences of Iberian ham at different maturation stages in order to calculate their volume change. The main conclusions of this paper are the practical viability of potential fields used as external forces, as well as the validation of the algorithmic improvements developed. The feasibility of applying Computer Vision techniques, in conjunction with MRI, for determining automatically the optimal ripening time of the Iberian ham is a practical conclusion reached with the proposed approach
    corecore