Mostrando 6 resultados de: 6
Filtros aplicados
Subtipo de publicación
Conference Object(6)
Publisher
Communications in Computer and Information Science(2)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021(1)
Advances in Intelligent Systems and Computing(1)
Smart Innovation, Systems and Technologies(1)
Área temáticas
Ciencias de la computación(2)
Criminología(2)
Funcionamiento de bibliotecas y archivos(2)
Procesos sociales(2)
Programación informática, programas, datos, seguridad(2)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusPhishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods
Conference ObjectAbstract: The main aim of the current study has been to provide a novel tool for detecting phishing attacks anPalabras claves:feature selection, Neural networks, Phishing, security, social engineeringAutores:Diego Oña, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Lenin Zapata, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusTrusted Phishing: A Model to Teach Computer Security Through the Theft of Cookies
Conference ObjectAbstract: Social engineering is a common practice to obtain information through the manipulation of users’ truPalabras claves:Cookies, JAVASCRIPT, social engineering, Vulnerable blog, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Paola ProañoFuentes:googlescopusSocial engineering attacks: A systematic mapping study
Conference ObjectAbstract: Social engineering has become the most prominent attack since human beings are the weakest link in tPalabras claves:Cyber-attacks, security, social engineeringAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Johanna Villacís, Marco J. Pintag, Roberto Omar Andrade, Ron M., Sánchez-Rubio M., Walter FuertesFuentes:scopus