Mostrando 10 resultados de: 24
Publisher
Communications in Computer and Information Science(6)
Universidad Técnica de Quevedo(3)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(2)
Advances in Intelligent Systems and Computing(2)
Smart Innovation, Systems and Technologies(2)
Área temáticas
Programación informática, programas, datos, seguridad(9)
Ciencias de la computación(7)
Funcionamiento de bibliotecas y archivos(6)
Criminología(4)
Escuelas y sus actividades; educación especial(4)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusCross-site scripting (XSS) attacks and mitigation: A survey
ArticleAbstract: The results of the Cisco 2018 Annual Security Report show that all analyzed web applications have atPalabras claves:Cookies, DOM-XSS, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela FloresFuentes:googlescopusDataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS)
OtherAbstract: Cross-Site Scripting (XSS) is a vulnerability in web applications; it allows the injection of scriptPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-GalánFuentes:googleCaracterización de los ataques de phishing y técnicas para mitigarlos: una revisión sistemática de la literatura
OtherAbstract:Palabras claves:Autores:Eduardo Benavides-AstudilloFuentes:googleFNCS: Propuesta de una plataforma de gestión de dispositivos de Red basados en RouterOS
OtherAbstract:Palabras claves:Autores:Eduardo Benavides-AstudilloFuentes:google