Mostrando 10 resultados de: 19
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(3)
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(2)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(2)
2011 7th Latin American Network Operations and Management Symposium, LANOMS 2011(1)
2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020(1)
Área temáticas
Programación informática, programas, datos, seguridad(11)
Ciencias de la computación(9)
Métodos informáticos especiales(5)
Dirección general(3)
Procesos sociales(3)
Área de conocimiento
Ciencias de la computación(9)
Ingeniería de software(6)
Software(6)
Red informática(4)
Inteligencia artificial(3)
3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusA survey on identity management for the future network
ArticleAbstract: The Internet as a platform for ubiquitous communication has quickly advanced in the last years. NewPalabras claves:Future network, Identity Management, Network InfrastructureAutores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopusCognitive Security for Incident Management Process
Conference ObjectAbstract: This work presents the literature review about the process of handling security incidents to identifPalabras claves:Big-data, cognitive security, detection, Incident responseAutores:Jenny Torres, Roberto Omar Andrade, Susana Graciela CadenaFuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusBiologically inspired architecture for security management on wireless self-organized networks
Conference ObjectAbstract: This work presents SAMNAR, a survivable architecture for wireless self-organized networks (WSONs). SPalabras claves:Autores:Jenny Torres, Nogueira M., Pujolle G., Santos A.Fuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusFraudFind: Financial fraud detection by analyzing human behavior
Conference ObjectAbstract: Financial fraud is commonly represented by the use of illegal practices where they can intervene froPalabras claves:bank fraud, HUMAN BEHAVIOR, Human factor, triangle of fraudAutores:Jenny Torres, Marco Sánchez, Pamela Flores, Patricio Xavier Zambrano Rodríguez, Patricio ZambranoFuentes:googlescopusEmpirical study on the difficulties of software modeling through class diagrams
Conference ObjectAbstract: Software design is one of the stages of the software life cycle characterized as an activity of a crPalabras claves:Class diagram, Difficulties, empirical study, Object-oriented approach, thematic analysisAutores:Jenny Torres, Pamela Flores, Rodas C.A.Fuentes:googlescopusEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopusIdentifying Difficulties of Software Modeling Through Class Diagrams: A Long-Term Comparative Analysis
ArticleAbstract: Software modeling is a creative activity in which software components and their relationships are idPalabras claves:Computer science, computer science education, Object oriented modeling, Software design, Software Engineering, systems engineering educationAutores:Jenny Torres, Mayra Alvarez, Mayra Isabel Alvarez Jiménez, Pamela FloresFuentes:googlescopus