Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
Engineering Applications of Artificial Intelligence(2)
Applied Sciences (Switzerland)(1)
Computer Communications(1)
Computers(1)
IEEE Access(1)
Área temáticas
Programación informática, programas, datos, seguridad(3)
Biblioteconomía y Documentación informatica(2)
Ciencias de la computación(2)
Análisis numérico(1)
Comunicaciones(1)
Área de conocimiento
Minería de datos(3)
Ciencias de la computación(2)
Aprendizaje automático(1)
Optimización matemática(1)
Objetivos de Desarrollo Sostenible
ODS 16: Paz, justicia e instituciones sólidas(7)
ODS 9: Industria, innovación e infraestructura(7)
Anonymizing cybersecurity data in critical infrastructures: The CIPSec approach
Conference ObjectAbstract: Cybersecurity logs are permanently generated by network devices to describe security incidents. WithPalabras claves:CIPSEC, Critical infrastructures, data anonymization, privacy, Security logsAutores:Burgos R.T., Forné J., José Estrada-Jiménez, Rebollo-Monedero D., Rodríguez R.D., Rodríguez-Hoyos A., Romero A.Á.Fuentes:googlescopusDoes k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
ArticleAbstract: In the era of big data, the availability of massive amounts of information makes privacy protectionPalabras claves:k-anonymity, large-scale databases, Machine learning, Microaggregation, privacyAutores:Forné J., José Estrada-Jiménez, Parra-Arnau J., Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopusFraud detection using the fraud triangle theory and data mining techniques: A literature review
ReviewAbstract: Fraud entails deception in order to obtain illegal gains; thus, it is mainly evidenced within financPalabras claves:CYBERSECURITY, Fraud, HUMAN BEHAVIOR, Machine learningAutores:José Estrada-Jiménez, Luis Felipe Urquiza-Aguiar, Marco Sánchez-AguayoFuentes:scopusPredictive Fraud Analysis Applying the Fraud Triangle Theory through Data Mining Techniques
ArticleAbstract: Fraud is increasingly common, and so are the losses caused by this phenomenon. There is, thus, an esPalabras claves:Classification Methods, Data Mining, fraud triangle, HUMAN BEHAVIOR, TEXT MINING, Topic modelingAutores:José Estrada-Jiménez, Luis Felipe Urquiza-Aguiar, Marco Sánchez-AguayoFuentes:scopusPreserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis
ArticleAbstract: Today's countless benefits of exploiting data come with a hefty price in terms of privacy. k-AnonymoPalabras claves:Data privacy, Data utility, Lda, Microaggregation, Statistical disclosure controlAutores:Forné J., José Estrada-Jiménez, Luis Felipe Urquiza-Aguiar, Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopusOn the regulation of personal data distribution in online advertising platforms
ArticleAbstract: Online tracking is the key enabling technology of modern online advertising. In the recently establiPalabras claves:Information privacy, online advertising, Revenue-invitation rate trade-offAutores:Forné J., José Estrada-Jiménez, Parra-Arnau J., Rodríguez-Hoyos A.Fuentes:googlescopusOnline advertising: Analysis of privacy threats and protection approaches
ArticleAbstract: Online advertising, the pillar of the “free” content on the Web, has revolutionized the marketing buPalabras claves:online advertising, Privacy risks, User profiling, Web trackingAutores:Forné J., José Estrada-Jiménez, Parra-Arnau J., Rodríguez-Hoyos A.Fuentes:googlescopus