Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(1)
Advances in Intelligent Systems and Computing(1)
Annales des Telecommunications/Annals of Telecommunications(1)
Journal of Information Security and Applications(1)
Área temáticas
Ciencias de la computación(2)
Dirección general(2)
Programación informática, programas, datos, seguridad(2)
Criminología(1)
Escuelas y sus actividades; educación especial(1)
La realidad alimentaria en los estudiantes del ciclo básico de dos colegios diurnos de la parroquia Pomasqui de la ciudad de Quito y su influencia en el rendimiento escolar, durante el año lectivo 1994 - 1995
Bachelor ThesisAbstract:Palabras claves:Educación secundaria-- -(Quito, Ecuador), Estudiantes-- -Alimentación, Licenciado en Ciencias de la Educación - Tesis y disertaciones académicasAutores:Jenny Torres, María Luzmila Llamuca GuamánFuentes:rraaeHow Does Grooming Fit into Social Engineering?
Conference ObjectAbstract: In this research, we propose to formally include the technique of grooming within the processes ofPalabras claves:Autores:Jenny Torres, Pamela Flores, Patricio ZambranoFuentes:googlescopusOn the modeling of cyber-attacks associated with social engineering: A parental control prototype
ArticleAbstract: Nowadays, the psychological techniques used to harass, intimidate, threaten, steal information are mPalabras claves:APT, bullying, Cyber-attack, Grooming, pattern behavior, social engineering, topic modelAutores:Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Zambrano, Velásquez L.Fuentes:scopusManagement of information security indicators under a cognitive security model
Conference ObjectAbstract: Organizations face daily different computer security threats, which makes necessary to have a DecisiPalabras claves:Autores:Jenny Torres, Pamela Flores, Roberto Omar AndradeFuentes:googlescopusUnderstanding cyberbullying as an information security attack—life cycle modeling
ArticleAbstract: Nowadays, cyberbullying cases are more common due to free access to technological resources. StudiesPalabras claves:APT, CYBERBULLYING, pattern behavior, social engineeringAutores:Alexandra Macas, Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio ZambranoFuentes:scopus