•  52
    Detecting heterogeneous risk attitudes with mixed gambles
    with Luís Santos-Pinto, Adrian Bruhin, and Thomas Åstebro
    Theory and Decision 79 (4): 573-600. 2015.
    We propose a task for eliciting attitudes toward risk that is close to real-world risky decisions which typically involve gains and losses. The task consists of accepting or rejecting gambles that provide a gain with probability p\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p$$\end{document} and a loss with probab…Read more
  •  47
    Skewness seeking: risk loving, optimism or overweighting of small probabilities?
    with Thomas Åstebro and Luís Santos-Pinto
    Theory and Decision 78 (2): 189-208. 2015.
    In a controlled laboratory experiment we use one sample of college students and one of mature executives to investigate how positive skew influences risky choices. In reduced-form regressions we find that both students and executives make riskier choices when lotteries display positive skew. We estimate decision models to explore three explanations for skew seeking choices: risk-loving, optimism and likelihood insensitivity. We find no role for love for risk as neither students nor executives ha…Read more
  •  43
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices
    with Álvaro Michelena, María Teresa García Ordás, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, and José Luis Calvo-Rolle
    Logic Journal of the IGPL 32 (2): 352-365. 2024.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all releva…Read more
  •  37
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol
    with Hector Alaiz-Moreton, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, and Carmen Benavides
    Complexity 2019 1-11. 2019.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network lev…Read more
  •  31
  •  9
    Clustering techniques performance comparison for predicting the battery state of charge: A hybrid model approach
    with María Teresa Ordás, David Yeregui Marcos del Blanco, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, José Luis Calvo-Rolle, and Héctor Alaiz-Moreton
    Logic Journal of the IGPL 32 (4): 712-728. 2024.
    Batteries are a fundamental storage component due to its various applications in mobility, renewable energies and consumer electronics among others. Regardless of the battery typology, one key variable from a user’s perspective is the remaining energy in the battery. It is usually presented as the percentage of remaining energy compared to the total energy that can be stored and is labeled State Of Charge (SOC). This work addresses the development of a hybrid model based on a Lithium Iron Phosph…Read more
  •  6
    The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a model-based intrusion detection system (IDS) for IoT environments. Specifically, the study explores the efficacy of an autoencoder’s latent space combined…Read more
  •  4
    N.A. Vasil’ev And His Imaginary Logic (review)
    Logic and Logical Philosophy 22 (1): 131-135. 2013.