Mostrando 5 resultados de: 5
Filtros aplicados
Subtipo de publicación
Conference Object(5)
Publisher
2017 1st Cyber Security in Networking Conference, CSNet 2017(1)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020(1)
2021 11th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2021(1)
ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems(1)
BotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Zambrano, Walter FuertesFuentes:googlescopus3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusAn Innovative and Decentralized Identity Framework Based on Blockchain Technology
Conference ObjectAbstract: Network users usually need a third party validation to prove that they are who they claim to be. AutPalabras claves:BLOCKCHAIN, certificate, CYBERSECURITY, ECC, Identities, self-generated identityAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopus