Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
Communications in Computer and Information Science(1)
ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems(1)
IEEE Access(1)
Smart Innovation, Systems and Technologies(1)
A structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopusMetrics and Indicators of Information Security Incident Management: A Systematic Mapping Study
Conference ObjectAbstract: The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, orPalabras claves:empirical study, Indicators, Key performance indicators, METRICS, Security incident management, Security incidentsAutores:Alyssa Cadena, Franklin Gualoto, Jenny Torres, Luis Tello-Oquendo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusXSS2DENT, Detecting Cross-Site Scripting Attacks (XSS) Vulnerabilities: A Case Study
Conference ObjectAbstract: Based on the OWASP Top 10 Security Risk, Cross-Site Scripting (XSS) attacks rank seventh, accordingPalabras claves:Clickjacking, XSS, ZombieAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny TorresFuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus