Mostrando 7 resultados de: 7
Filtros aplicados
Subtipo de publicación
Conference Object(7)
Publisher
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(2)
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018(2)
2018 IEEE Colombian Conference on Communications and Computing, COLCOM 2018 - Proceedings(1)
Advances in Intelligent Systems and Computing(1)
JIISIC 2018 - Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del Conocimiento(1)
Área temáticas
Ciencias de la computación(4)
Programación informática, programas, datos, seguridad(3)
Dirección general(2)
Criminología(1)
Economía financiera(1)
Cognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusA proposal for an improved distributed architecture for open pgp's web of trust
Conference ObjectAbstract: Security and authenticity issues were never considered when e-mail was originally designed and implePalabras claves:Cyber Security, Distributed arquitecture, Electronic mail, Openpgp, Pgp, QR codes, self-generated certificates, Web of trustAutores:Daniel Maldonado-Ruiz, Edison Loza-Aguirre, Jenny TorresFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusFraudFind: Financial fraud detection by analyzing human behavior
Conference ObjectAbstract: Financial fraud is commonly represented by the use of illegal practices where they can intervene froPalabras claves:bank fraud, HUMAN BEHAVIOR, Human factor, triangle of fraudAutores:Jenny Torres, Marco Sánchez, Pamela Flores, Patricio ZambranoFuentes:googlescopusManagement of information security indicators under a cognitive security model
Conference ObjectAbstract: Organizations face daily different computer security threats, which makes necessary to have a DecisiPalabras claves:Autores:Jenny Torres, Pamela Flores, Roberto Omar AndradeFuentes:googlescopusTowards a real-time air pollution monitoring systems implemented using wireless sensor networks: Preliminary results
Conference ObjectAbstract: This paper describes the preliminary results ob-tained towards the development of a Wireless sensorPalabras claves:air pollution, Co, CO 2, dust particles, H S 2, Methane, Monitoring, NO 2, Ozone, SO 2, WSN, Xbee, ZIGBEEAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusSMMicro: A methodological proposal for migrating from monolithic architecture to microservices
Conference ObjectAbstract: Microservices architecture is an approach based on the construction of systems as independent suitesPalabras claves:Microservices, MIGRATION, Monolithic Architecture, Software EngineeringAutores:Carlos Arboleda, Jenny Torres, Pamela FloresFuentes:scopus