Mostrando 10 resultados de: 20
Publisher
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(3)
Advances in Intelligent Systems and Computing(3)
International Journal of Applied Engineering Research(2)
Applied Sciences (Switzerland)(1)
Cluster Computing(1)
Área temáticas
Física aplicada(6)
Dirección general(4)
Ciencias de la computación(3)
Criminología(3)
Economía financiera(3)
Cognitive security: A comprehensive study of cognitive science in cybersecurity
ArticleAbstract: Nowadays, IoT, cloud computing, mobile and social networks are generating a transformation in socialPalabras claves:Cognitive science, cognitive security, Cyber operations, situation awarenessAutores:Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusAn efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusAnalysis of COBIT 5 Process 'DSS02 - Manage Service Requests and Incidents' for the Service Desk Using Process Mining
Conference ObjectAbstract: The Incident Management in IT departments provides traceability of events that are reported, and itPalabras claves:Event Log, Incident Management, petri net model, Process mining, service deskAutores:Christian Ruiz, Iveth Tello, Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusDevelopment of a timestamping web application for the electronic factoring process in Ecuador
ArticleAbstract: This document describes the experience in developing a Timestamping application for the Electronic FPalabras claves:FACTORING, security, Timestamping, UWE, XMLAutores:Jesus Mendoza Macias, Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusArchitecture for Demand Pbkp_rediction for Production Optimization: A Case Study
Conference ObjectAbstract: A proper product demand projection is an aspect that can be decisive for the competitiveness and surPalabras claves:Advanced analytics, consumer demand, Manufacturing company, Production planningAutores:Geovanny Raura, Inabel Karina Mazón Quinde, Rubén Arroyo, Sang Guun YooFuentes:googlescopusEmotion Recognition Related to Stock Trading Using Machine Learning Algorithms with Feature Selection
ArticleAbstract: This article proposes an emotion elicitation method to develop our Stock-Emotion dataset: A collectiPalabras claves:Bci, Dasm, De, deep learning, EEG, Emotion elicitation, Emotion recognition, random forest, Rasm, Stock market tradingAutores:Edgar Alejandro Torres, Edgar P. Torres, Myriam Hernández-Alvarez, Sang Guun YooFuentes:scopus