Mostrando 10 resultados de: 36
Filtros aplicados
Publisher
International Journal of Applied Engineering Research(4)
Advances in Intelligent Systems and Computing(3)
Communications in Computer and Information Science(3)
Iberian Conference on Information Systems and Technologies, CISTI(3)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(3)
Área temáticas
Ciencias de la computación(16)
Física aplicada(12)
Métodos informáticos especiales(11)
Programación informática, programas, datos, seguridad(11)
Funcionamiento de bibliotecas y archivos(6)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusAnalysis of traditional web security solutions and proposal of a web attacks cognitive patterns classifier architecture
Conference ObjectAbstract: The present work proposes a security architecture for web servers called Web Attacks Cognitive PattePalabras claves:cognitive security, Cybercriminals, Machine learning, Web attacksAutores:Carlos Jose Martinez, Hugo Oswaldo Moreno, Sang Guun YooFuentes:scopusA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusDetecting and neutralizing encrypting Ransomware attacks by using machine-learning techniques: A literature review
ReviewAbstract: Almost immediatelyafter the initial design and implementation of first computers systemsaccessibletoPalabras claves:Machine learning, Malware, Malware detection algorithms, ransomwareAutores:Edgar P. Torres, Sang Guun YooFuentes:scopusDeveloping an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
Conference ObjectAbstract: This paper describes a new risk analysis methodology for libraries based on steps filtered from exisPalabras claves:information security, Information security management system, Risk management methodologyAutores:MARIA JOSE BRAVO RAMOS, Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusCryptanalysis of several authentication schemes for healthcare applications using wireless medical sensor networks
Conference ObjectAbstract: Wireless sensor networks are being applied in different fields. One of those fields is the body sensPalabras claves:Cryptanalysis, Healthcare service, Sensor network, Two factor authentication, user authentication, Wireless Body Area NetworkAutores:Sang Guun YooFuentes:googlescopus