Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
2017 IEEE 2nd Ecuador Technical Chapters Meeting, ETCM 2017(2)
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(1)
2020 International Symposium on Networks, Computers and Communications, ISNCC 2020(1)
Natural Language Engineering(1)
Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Criminología(2)
Otros problemas y servicios sociales(2)
Ciencias de la computación(1)
Ciencias sociales(1)
Área de conocimiento
Ciencias de la computación(4)
Análisis de redes sociales(1)
Aprendizaje automático(1)
Ciencia social(1)
Inteligencia artificial(1)
A survey on situational awareness of ransomware attacks-detection and prevention parameters
ArticleAbstract: In recent years, cybercrime activities have grown significantly, compromising device security and jePalabras claves:information security, pbkp_rediction, ransomware, Situational awarenessAutores:Ángel Leonardo Valdivieso Caraguay, Juan A.Herrera Silva, Lorena Isabel Barona López, Myriam Hernández-AlvarezFuentes:scopusGender and age classification based on human features to detect illicit activity in suspicious sites
Conference ObjectAbstract: We developed a method to recognize gender and age groups using facial features and upper body proporPalabras claves:Age group recognition, face recognition, Gender classification, human trafficking, Upper body proportions recognitionAutores:Edgar P. Torres, Myriam Hernández-Alvarez, Sergio L. GranizoFuentes:scopusIdentifying human trafficking patterns online
Conference ObjectAbstract: Human trafficking is a major concern worldwide which has evolved with the use of the Internet. IllicPalabras claves:Data Mining, human trafficking, illicit domains, information extraction, Machine learning, SOCIAL NETWORKSAutores:Danilo Burbano, Myriam Hernández-AlvarezFuentes:scopusIllicit, Hidden Advertisements on Twitter
Conference ObjectAbstract: Modern communication is ubiquitous thanks to the advances in mobile devices and the spread of socialPalabras claves:Data Mining, human trafficking, illicit services, information extraction, SOCIAL NETWORKS, TwitterAutores:Danilo Burbano, Myriam Hernández-AlvarezFuentes:scopusLarge scale ransomware detection by cognitive security
Conference ObjectAbstract: Attacks of Ransomware [14] are increasing every day. This type of threads explodes the system vulnerPalabras claves:classification, Data Mining, LOGS, Machine learning, ransomwareAutores:Juan A.Herrera Silva, Myriam Hernández-AlvarezFuentes:scopusSurvey about citation context analysis: Tasks, techniques, and resources
ArticleAbstract: Bibliometric calculations currently used to assess the quality of researchers, articles, and scientiPalabras claves:Autores:Gomez Soriano J.M., Myriam Hernández-AlvarezFuentes:googlescopusThe evolution from traditional to intelligent web security: Systematic literature review
Conference ObjectAbstract: Information security is fundamental in the area of computing science with new metrics and technologiPalabras claves:attacks, Cross-site script, Defacement, Denial of Service, vulnerabilities, Web SecurityAutores:Carlos Jose Martinez, Hugo Oswaldo Moreno, Myriam Hernández-AlvarezFuentes:scopus