Mostrando 3 resultados de: 3
Filtros aplicados
Subtipo de publicación
Article(3)
Publisher
Annales des Telecommunications/Annals of Telecommunications(1)
IEEE Access(1)
Journal of Information Security and Applications(1)
On the modeling of cyber-attacks associated with social engineering: A parental control prototype
ArticleAbstract: Nowadays, the psychological techniques used to harass, intimidate, threaten, steal information are mPalabras claves:APT, bullying, Cyber-attack, Grooming, pattern behavior, social engineering, topic modelAutores:Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Zambrano, Velásquez L.Fuentes:scopusUnderstanding cyberbullying as an information security attack—life cycle modeling
ArticleAbstract: Nowadays, cyberbullying cases are more common due to free access to technological resources. StudiesPalabras claves:APT, CYBERBULLYING, pattern behavior, social engineeringAutores:Alexandra Macas, Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio ZambranoFuentes:scopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus