Mostrando 7 resultados de: 7
Filtros aplicados
Subtipo de publicación
Conference Object(7)
Área temáticas
Ciencias de la computación(4)
Programación informática, programas, datos, seguridad(2)
Criminología(1)
Dirección general(1)
Interacción social(1)
Cognitive Security for Incident Management Process
Conference ObjectAbstract: This work presents the literature review about the process of handling security incidents to identifPalabras claves:Big-data, cognitive security, detection, Incident responseAutores:Jenny Torres, Roberto Omar Andrade, Susana Graciela CadenaFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusData Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network
Conference ObjectAbstract: Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort,Palabras claves:air pollution, Business intelligence, data analytics, Data Mining, pattern recognition, wireless sensor networkAutores:Alyssa Cadena, Diego S. Benitez, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusHow Does Grooming Fit into Social Engineering?
Conference ObjectAbstract: In this research, we propose to formally include the technique of grooming within the processes ofPalabras claves:Autores:Jenny Torres, Pamela Flores, Patricio ZambranoFuentes:googlescopusMigration of Monolithic Applications Towards Microservices Under the Vision of the Information Hiding Principle: A Systematic Mapping Study
Conference ObjectAbstract: Organizations throughout time accumulate applications, which, given their old age, are generally desPalabras claves:decomposition, microservice, Migrate, MIGRATION, modernization, MonolithicAutores:Jenny Torres, Pamela Flores, Victor VelepuchaFuentes:googlescopusTrusted Phishing: A Model to Teach Computer Security Through the Theft of Cookies
Conference ObjectAbstract: Social engineering is a common practice to obtain information through the manipulation of users’ truPalabras claves:Cookies, JAVASCRIPT, social engineering, Vulnerable blog, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Paola ProañoFuentes:googlescopusReal-time air pollution monitoring systems using wireless sensor networks connected in a cloud-computing, wrapped up web services
Conference ObjectAbstract: Air pollution continues to grow at an alarming rate, decreasing the quality of life around the worldPalabras claves:air pollution, IAAS, IOT, WEB SERVICES, WSNAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Santiago Salvador, Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus