Mostrando 10 resultados de: 13
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(3)
Associação Ibérica de Sistemas e Tecnologias de Informacao(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Proceedings - 2019 International Conference on Information Systems and Software Technologies, ICI2ST 2019(1)
Proceedings of the ACM Conference on Computer and Communications Security(1)
Área temáticas
Programación informática, programas, datos, seguridad(7)
Ciencias de la computación(6)
Métodos informáticos especiales(3)
Otros problemas y servicios sociales(2)
Criminología(1)
Certified PUP: Abuse in authenticode code signing
Conference ObjectAbstract: Code signing is a solution to verify the integrity of software and its publisher's identity, but itPalabras claves:Code Signing, Malware, PUP, Windows AuthenticodeAutores:Caballero J., Kotzias P., Matic S., Richard RiveraFuentes:googlescopusChallenges and opportunities of IoT deployment in ecuador
Conference ObjectAbstract: Day by day cities over the world become more intelligent. The Internet of Things(IoT) has had an impPalabras claves:IOT, IoT-challenges, IoT-Ecuador, IoT-opportunitiesAutores:Byron Loarte, Fanny Flores, Gabriela Katherine Cevallos, Ivonne Maldonado, Juan Zaldumbide, Leandro Pazmiño, Luis Ponce, Richard Rivera, Viviana Cristina Parraga VillamarFuentes:scopusCiberseguridad del IoT: Un Análisis en Países de la Unión Europea
OtherAbstract: Cada día el Internet de las Cosas (IoT) incrementa la cantidad de dispositivos interconectados. Se ePalabras claves:Autores:Richard RiveraFuentes:googleAvclass: A tool for massive malware labeling
Conference ObjectAbstract: Labeling a malicious executable as a variant of a known family is important for security applicationPalabras claves:AV labels, classification, Clustering, Malware labelingAutores:Caballero J., Kotzias P., Richard Rivera, Sebastián M.Fuentes:googlescopusAnálisis de características estáticas de ficheros ejecutables para la clasificación de Malware
OtherAbstract: El Malware es una grave amenaza para la seguridad de los sistemas. Con el uso generalizado de la WorPalabras claves:Autores:Richard RiveraFuentes:googleDeteccion y Clasificacion de Malware con el Sistema de Análisis de Malware Cuckoo
OtherAbstract: Actualmente el malware sigue siendo uno de los desaf´ıos mas grandes de la seguridad ´ informatica.Palabras claves:Autores:Richard RiveraFuentes:googleDetection and Classification of Facial Features Through the Use of Convolutional Neural Networks (CNN) in Alzheimer Patients
Conference ObjectAbstract: In recent years, the widespread use of artificial neural networks in the field of image processing hPalabras claves:ALGORITHMS, Alzheimer’s, cnn, imagesAutores:Carlos Marcelo Borja-Galeas, César Byron Guevara Maldonado, Cesar Guevara, David R. Castillo Salazar, Héctor Fernando Gómez-Alvarado, Hugo Arias-Flores, Jairo Hidalgo-Guijarro, José Varela-Aldás, Lanzarini L.C., Marco Yandún-Velasteguí, Richard Rivera, Washington Raúl Fierro-SaltosFuentes:googlescopusCybersecurity in iot: An analysis in countries of europe union
ArticleAbstract: Each day the Internet of Things (IoT) increases the number of interconnected devices. It is estimatePalabras claves:CYBERSECURITY, IOT, IoT Europe, IoT security, Vulnerability scanAutores:Jiménez C., Richard RiveraFuentes:scopusTwitter Mining for Multiclass Classification Events of Traffic and Pollution
Conference ObjectAbstract: During the last decade social media have generated tons of data, that is the primal information resoPalabras claves:Algorithms of classification, Pollution detection, SVM, Traffic detection, Twitter event detection, Twitter miningAutores:Carlos Marcelo Borja-Galeas, Cesar Guevara, Chamorro V., David R. Castillo Salazar, Hugo Arias-Flores, Jairo Hidalgo-Guijarro, José Varela-Aldás, Marco Yandún-Velasteguí, Richard Rivera, Washington Raúl Fierro-SaltosFuentes:scopusUn breve Análisis de Vulnerabilidades en dispositivos IOT en Ecuador
OtherAbstract: Este trabajo presenta un breve análisis de vulnerabilidades en dispositivos del Internet de las cosaPalabras claves:Autores:Richard RiveraFuentes:google