Mostrando 10 resultados de: 28
Filtros aplicados
Publisher
Communications in Computer and Information Science(5)
ACM International Conference Proceeding Series(2)
Applied Sciences (Switzerland)(2)
IEEE Access(2)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(2)
Área temáticas
Física aplicada(9)
Métodos informáticos especiales(4)
Programación informática, programas, datos, seguridad(3)
Instrumentos de precisión y otros dispositivos(2)
Otros problemas y servicios sociales(2)
Analysis of traditional web security solutions and proposal of a web attacks cognitive patterns classifier architecture
Conference ObjectAbstract: The present work proposes a security architecture for web servers called Web Attacks Cognitive PattePalabras claves:cognitive security, Cybercriminals, Machine learning, Web attacksAutores:Carlos Jose Martinez, Hugo Oswaldo Moreno, Sang Guun YooFuentes:scopus5G-VRSec: Secure video reporting service in 5G enabled vehicular networks
ArticleAbstract: Despite an imminent arrival of the 5G communication technology, there are only a few research worksPalabras claves:Autores:Sang Guun YooFuentes:googlescopusA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA Smart Waste Management System Based on LoRaWAN
Conference ObjectAbstract: Smart waste management is one of the most important services in smart cities. An efficient waste colPalabras claves:IOT, LoRaWan, LPWAN, Smart cities, Waste managementAutores:Edwin Flores, Edwin Geovanny Flores Castro, Sang Guun YooFuentes:googlescopusA performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusDevice control system for a smart home using voice commands: A practical case
Conference ObjectAbstract: The development of new voice-controlled home assistant devices such as Amazon Echo and Google Home hPalabras claves:Alexa, Home automation, IOT, Smart home, Voice recognitionAutores:Adrián Calvopiña, Pamela Orta, Sang Guun Yoo, Steven Guamán, Tapia FreddyFuentes:scopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusCryptanalysis of several authentication schemes for healthcare applications using wireless medical sensor networks
Conference ObjectAbstract: Wireless sensor networks are being applied in different fields. One of those fields is the body sensPalabras claves:Cryptanalysis, Healthcare service, Sensor network, Two factor authentication, user authentication, Wireless Body Area NetworkAutores:Sang Guun YooFuentes:googlescopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusAn Online BCI System Based in SSVEPs to Control IoT Devices
Conference ObjectAbstract: Internet of Things allows devices to communicate each other and with users. This way, people can conPalabras claves:Bci, Brain-Computer Interface, CCA, internet of things, IOT, MQTT, SSVEPAutores:Johanna Carolina Cerezo Ramírez, Murillo López J.L., Sang Guun YooFuentes:scopus