Mostrando 3 resultados de: 3
An Analysis of Cyber Espionage Process
Conference ObjectAbstract: The recent increasing cases released worldwide on espionage require a knowledge systematization studPalabras claves:Computer security, Cyber espionage, MalwareAutores:Barriga J.J.A., Fernando Becerra, Jhonattan J. Barriga A., Leandro Pazmiño, Richard RiveraFuentes:googlescopusMalware Detection and Evasion with Machine Learning Techniques: A Survey
OtherAbstract:Palabras claves:Autores:Jhonattan J. Barriga A.Fuentes:googleSecurity Risk Analysis in IoT Systems through Factor Identification over IoT Devices
ArticleAbstract: IoT systems contribute to digital transformation through the development of smart concepts. However,Palabras claves:Attack graphs, IoT security, Risk analysis, Security modelingAutores:Barriga J.J.A., Iván Ortiz-Garcés, Jhonattan J. Barriga A., Roberto Omar Andrade, Sang Guun YooFuentes:googlescopus