Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019(2)
Advances in Cybersecurity Management(1)
IEEE Access(1)
Revista Politecnica(1)
Área temáticas
Ciencias de la computación(4)
Funcionamiento de bibliotecas y archivos(2)
Métodos informáticos especiales(1)
Otros problemas y servicios sociales(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ciencias de la computación(5)
Analysis and Design of a Pbkp_redictive Model for Phishing Detection Based on Url and Email Corpus
ArticleAbstract: One of the most reported cyber crimes worldwide is phishing, and various anti-phishing systems (APS)Palabras claves:Anti-phishing, Cyberattacks, MIDDLEWARE, Phishing, threatAutores:Fernanda Albán, Menthor Urvina, Roberto Omar AndradeFuentes:scopusA hybrid recommender for cybersecurity based on rating approach
Book PartAbstract: The main function of a security analyst is to protect and make the best decisions for preserving thePalabras claves:COLLABORATIVE FILTERING, Knowledge base, Recommendation system, Security analysis, Security operationsAutores:Carlos Ayala, Edison Loza-Aguirre, Kevin Jiménez, Roberto Omar AndradeFuentes:googlescopusDetection of phishing attacks with machine learning techniques in cognitive security architecture
Conference ObjectAbstract: The number of phishing attacks has increased in Latin America, exceeding the operational skills of cPalabras claves:Artificial Intelligence, artificial neural networks, CYBERSECURITY, Machine learning, PhishingAutores:Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar AndradeFuentes:googlescopusPhishing attack detection: A solution based on the typical machine learning modeling cycle
Conference ObjectAbstract: The aim of the current study has been the design and development of a model for detecting Phishing aPalabras claves:decision tree, Machmachine learning, Naïve Bayes, Phishing, Supervised learningAutores:Bryan Espinosa, Eduardo Benavides-Astudillo, Jessica Simba, Roberto Omar Andrade, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus