Mostrando 10 resultados de: 44
Publisher
Advances in Intelligent Systems and Computing(7)
IEEE Access(3)
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(2)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(2)
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018(2)
Área temáticas
Ciencias de la computación(21)
Programación informática, programas, datos, seguridad(19)
Métodos informáticos especiales(7)
Funcionamiento de bibliotecas y archivos(5)
Interacción social(5)
Área de conocimiento
Ciencias de la computación(20)
Software(8)
Ingeniería de software(7)
Ciencia ambiental(5)
Red informática(5)
How Does Grooming Fit into Social Engineering?
Conference ObjectAbstract: In this research, we propose to formally include the technique of grooming within the processes ofPalabras claves:Autores:Jenny Torres, Pamela Flores, Patricio ZambranoFuentes:googlescopusEmpirical study on the difficulties of software modeling through class diagrams
Conference ObjectAbstract: Software design is one of the stages of the software life cycle characterized as an activity of a crPalabras claves:Class diagram, Difficulties, empirical study, Object-oriented approach, thematic analysisAutores:Jenny Torres, Pamela Flores, Rodas C.A.Fuentes:googlescopusEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopusFraudFind: Financial fraud detection by analyzing human behavior
Conference ObjectAbstract: Financial fraud is commonly represented by the use of illegal practices where they can intervene froPalabras claves:bank fraud, HUMAN BEHAVIOR, Human factor, triangle of fraudAutores:Jenny Torres, Marco Sánchez, Pamela Flores, Patricio Xavier Zambrano Rodríguez, Patricio ZambranoFuentes:googlescopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Walter FuertesFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusCross-site scripting (XSS) attacks and mitigation: A survey
ArticleAbstract: The results of the Cisco 2018 Annual Security Report show that all analyzed web applications have atPalabras claves:Cookies, DOM-XSS, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela FloresFuentes:googlescopusCurrent Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey
ArticleAbstract: Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new IntePalabras claves:BKI, BLOCKCHAIN, Decentralised, Identity Management, PKI, Smart-contractsAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusData Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network
Conference ObjectAbstract: Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort,Palabras claves:air pollution, Business intelligence, data analytics, Data Mining, pattern recognition, wireless sensor networkAutores:Alyssa Cadena, Diego S. Benitez, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopus3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopus