Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
ACM Transactions on Sensor Networks(1)
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012(1)
Proceedings - 3rd International Conference on Information Systems and Software Technologies, ICI2ST 2022(1)
A Usability-focused Method to Design a Cybersecurity MOOC for Children
Conference ObjectAbstract: Teaching cybersecurity to children is not a trivial task due to the complexity of explaining online-Palabras claves:3D, addie, character design, CYBERSECURITY, DPIPE, Mooc, nielsen, STORYBOARD, sus, udl, Usability, VIRTUAL LEARNINGAutores:Cannon S.L., Daliana Zambrano, Denys A. Flores, Gomez C., Julián Andrés Galindo Losada, Luis Almeida, Martinez-Garcia G., Roberto Omar Andrade, Sergio JimenezFuentes:scopusCONDOR: A hybrid IDS to offer improved intrusion detection
Conference ObjectAbstract: Intrusion Detection Systems are an accepted and very useful option to monitor, and detect maliciousPalabras claves:Anomaly, false negative, false positive, hybrid, Ids, intrusion detection, NIDS, SignatureAutores:Day D.J., Denys A. Flores, Lallie H.S.Fuentes:googlescopusThreat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
ArticleAbstract: There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrainPalabras claves:computation offloading, Edge computing, internet of things, resource constrained, threat modelling, trustAutores:Bradbury M., Burton J., Butler M., Denys A. Flores, Jhumka A., Watson T.Fuentes:googlescopus