Mostrando 8 resultados de: 8
Publisher
Advances in Intelligent Systems and Computing(1)
Associação Ibérica de Sistemas e Tecnologias de Informacao(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Proceedings of the ACM Conference on Computer and Communications Security(1)
Smart Innovation, Systems and Technologies(1)
Área temáticas
Ciencias de la computación(2)
Criminología(2)
Otros problemas y servicios sociales(2)
Funcionamiento de bibliotecas y archivos(1)
Métodos informáticos especiales(1)
Certified PUP: Abuse in authenticode code signing
Conference ObjectAbstract: Code signing is a solution to verify the integrity of software and its publisher's identity, but itPalabras claves:Code Signing, Malware, PUP, Windows AuthenticodeAutores:Caballero J., Kotzias P., Matic S., Richard RiveraFuentes:googlescopusCiberseguridad del IoT: Un Análisis en Países de la Unión Europea
OtherAbstract: Cada día el Internet de las Cosas (IoT) incrementa la cantidad de dispositivos interconectados. Se ePalabras claves:Autores:Richard RiveraFuentes:googleAvclass: A tool for massive malware labeling
Conference ObjectAbstract: Labeling a malicious executable as a variant of a known family is important for security applicationPalabras claves:AV labels, classification, Clustering, Malware labelingAutores:Caballero J., Kotzias P., Richard Rivera, Sebastián M.Fuentes:googlescopusAnálisis de características estáticas de ficheros ejecutables para la clasificación de Malware
OtherAbstract: El Malware es una grave amenaza para la seguridad de los sistemas. Con el uso generalizado de la WorPalabras claves:Autores:Richard RiveraFuentes:googleDeteccion y Clasificacion de Malware con el Sistema de Análisis de Malware Cuckoo
OtherAbstract: Actualmente el malware sigue siendo uno de los desaf´ıos mas grandes de la seguridad ´ informatica.Palabras claves:Autores:Richard RiveraFuentes:googleAn Analysis of Cyber Espionage Process
Conference ObjectAbstract: The recent increasing cases released worldwide on espionage require a knowledge systematization studPalabras claves:Computer security, Cyber espionage, MalwareAutores:Barriga J.J.A., Fernando Becerra, Jhonattan J. Barriga A., Leandro Pazmiño, Richard RiveraFuentes:googlescopusPreprocessing Information from a Data Network for the Detection of User Behavior Patterns
Conference ObjectAbstract: This study focuses on the preprocessing of information for the selection of the most significant chaPalabras claves:algorithm, Evolutionary neural networks, Genetic Algorithms, GreedyStepwise, intrusion detection, K-Means, ServerAutores:Bolaños-Tobar D., Carlos Marcelo Borja-Galeas, César Byron Guevara Maldonado, Cesar Guevara, David R. Castillo Salazar, Hugo Arias-Flores, Jairo Hidalgo-Guijarro, José Varela-Aldás, Marco Yandún-Velasteguí, Richard Rivera, Washington Raúl Fierro-SaltosFuentes:googlescopusTools for the detection and analysis of potentially unwanted programs
OtherAbstract: In this thesis we study potentially unwanted programs (PUP), a category of undesirable software thatPalabras claves:Autores:Richard RiveraFuentes:google