Mostrando 7 resultados de: 7
Filtros aplicados
Subtipo de publicación
Conference Object(7)
Publisher
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(2)
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018(2)
2018 IEEE Colombian Conference on Communications and Computing, COLCOM 2018 - Proceedings(1)
Advances in Intelligent Systems and Computing(1)
JIISIC 2018 - Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del Conocimiento(1)
Área temáticas
Ciencias de la computación(4)
Programación informática, programas, datos, seguridad(3)
Dirección general(2)
Criminología(1)
Economía financiera(1)
Área de conocimiento
Ciencias de la computación(4)
Inteligencia artificial(2)
Análisis de datos(1)
Big data(1)
Ciencia ambiental(1)
A proposal for an improved distributed architecture for open pgp's web of trust
Conference ObjectAbstract: Security and authenticity issues were never considered when e-mail was originally designed and implePalabras claves:Cyber Security, Distributed arquitecture, Electronic mail, Openpgp, Pgp, QR codes, self-generated certificates, Web of trustAutores:Daniel Maldonado-Ruiz, Edison Loza-Aguirre, Jenny TorresFuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusFraudFind: Financial fraud detection by analyzing human behavior
Conference ObjectAbstract: Financial fraud is commonly represented by the use of illegal practices where they can intervene froPalabras claves:bank fraud, HUMAN BEHAVIOR, Human factor, triangle of fraudAutores:Jenny Torres, Marco Sánchez, Pamela Flores, Patricio Xavier Zambrano Rodríguez, Patricio ZambranoFuentes:googlescopusTowards a real-time air pollution monitoring systems implemented using wireless sensor networks: Preliminary results
Conference ObjectAbstract: This paper describes the preliminary results ob-tained towards the development of a Wireless sensorPalabras claves:air pollution, Co, CO 2, dust particles, H S 2, Methane, Monitoring, NO 2, Ozone, SO 2, WSN, Xbee, ZIGBEEAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusSMMicro: A methodological proposal for migrating from monolithic architecture to microservices
Conference ObjectAbstract: Microservices architecture is an approach based on the construction of systems as independent suitesPalabras claves:Microservices, MIGRATION, Monolithic Architecture, Software EngineeringAutores:Carlos Arboleda, Jenny Torres, Pamela FloresFuentes:scopusManagement of information security indicators under a cognitive security model
Conference ObjectAbstract: Organizations face daily different computer security threats, which makes necessary to have a DecisiPalabras claves:Autores:Jenny Torres, Pamela Flores, Roberto Omar AndradeFuentes:googlescopus