Mostrando 10 resultados de: 76
Publisher
Communications in Computer and Information Science(8)
International Journal of Applied Engineering Research(8)
Advances in Intelligent Systems and Computing(5)
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(4)
ACM International Conference Proceeding Series(4)
Área temáticas
Ciencias de la computación(28)
Física aplicada(22)
Programación informática, programas, datos, seguridad(20)
Métodos informáticos especiales(16)
Funcionamiento de bibliotecas y archivos(10)
Área de conocimiento
Ciencias de la computación(36)
Red informática(9)
Software(8)
Aprendizaje automático(7)
Inteligencia artificial(7)
ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005
Conference ObjectAbstract: Public entities around the world are adapting and adopting international standards to improve theirPalabras claves:information security, ISO/IEC 27001, Risk management, technology risk managementAutores:Edgar Fernando Solis, Rubén Arroyo, Sang Guun Yoo, Susana PatiñoFuentes:scopusEmotion Recognition Related to Stock Trading Using Machine Learning Algorithms with Feature Selection
ArticleAbstract: This article proposes an emotion elicitation method to develop our Stock-Emotion dataset: A collectiPalabras claves:Bci, Dasm, De, deep learning, EEG, Emotion elicitation, Emotion recognition, random forest, Rasm, Stock market tradingAutores:Edgar Alejandro Torres, Edgar P. Torres, Myriam Hernández-Alvarez, Sang Guun YooFuentes:scopusEnhanced BSN-Care: Cryptanalysis of BSN-Care and proposal of improved authentication system
Conference ObjectAbstract: Recently, loT based healthcare systems have evolved as a tool to enhance the quality of life of peopPalabras claves:BAN logic, Healthcare service, internet of things, security, Sensor network, user authenticationAutores:Fidel Gastro de la Gruz, Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusEnhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
Conference ObjectAbstract: Indoor location-based application and services based on Wi-Fi have serious problems in terms of privPalabras claves:Anonymous de-authentication, indoor positioning system, Ips, privacy, WlanAutores:Barriga J.J.A., Juan Carlos Polo, Sang Guun YooFuentes:googlescopusGaze Tracking: A Survey of Devices, Libraries and Applications
Conference ObjectAbstract: Gaze tracking is a technological discipline that offers an alternative interaction between human andPalabras claves:Eye tacking, Gaze tracking, IOTAutores:Edwin Cocha Toabanda, María Cristina Erazo, Sang Guun YooFuentes:scopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusBrain Computer Interface Application for People with Movement Disabilities
Conference ObjectAbstract: The intention of this work is to propose and develop a Brain-Computer Interface solution for peoplePalabras claves:Bci, Brain computer interface, Device control, EEG, electroencephalography, Movement disabilitiesAutores:Alejandro Ulloa, José Luis León Bayas, Juan Sulca, Murillo López J.L., Sang Guun Yoo, Sebastián Poveda ZavalaFuentes:scopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus