Mostrando 10 resultados de: 33
Filtros aplicados
Publisher
Applied Sciences (Switzerland)(3)
Advances in Cybersecurity Management(2)
IEEE Access(2)
Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019(2)
Springer International Publishing(2)
Área temáticas
Otros problemas y servicios sociales(7)
Programación informática, programas, datos, seguridad(6)
Física aplicada(5)
Funcionamiento de bibliotecas y archivos(4)
Métodos informáticos especiales(4)
Área de conocimiento
Ciencias de la computación(21)
Red informática(6)
Inteligencia artificial(5)
Aprendizaje automático(4)
Internet de las cosas(3)
2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)| 978-1-6654-5517-6/22/$31.00© 2022 IEEE| DOI: 10.1109/ICI2ST57350. 2022.00034
OtherAbstract: Author Index Toggle navigation IEEE Computer Society Digital Library Jobs Tech News Resource CenterPalabras claves:Autores:Boris Astudillo, José Lucio-Naranjo, Milton Escobar Sánchez, Roberto Omar AndradeFuentes:googleA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA Usability-focused Method to Design a Cybersecurity MOOC for Children
Conference ObjectAbstract: Teaching cybersecurity to children is not a trivial task due to the complexity of explaining online-Palabras claves:3D, addie, character design, CYBERSECURITY, DPIPE, Mooc, nielsen, STORYBOARD, sus, udl, Usability, VIRTUAL LEARNINGAutores:Cannon S.L., Daliana Zambrano, Denys A. Flores, Gomez C., Julián Andrés Galindo Losada, Luis Almeida, Martinez-Garcia G., Roberto Omar Andrade, Sergio JimenezFuentes:scopusA hybrid recommender for cybersecurity based on rating approach
Book PartAbstract: The main function of a security analyst is to protect and make the best decisions for preserving thePalabras claves:COLLABORATIVE FILTERING, Knowledge base, Recommendation system, Security analysis, Security operationsAutores:Carlos Ayala, Edison Loza-Aguirre, Kevin Jiménez, Roberto Omar AndradeFuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusAutomation tasks model for improving hardening levels on campus networks
Conference ObjectAbstract: Campus networks are an infrastructure that enables communication and access to services for users inPalabras claves:Ansible, Attack vector, Automation tasks, Campus network, Hardening processAutores:Aarón Echeverría, Iván Ortiz-Garcés, Roberto Omar AndradeFuentes:googlescopusBig Data Analytics Architecture for Cybersecurity Applications
OtherAbstract: The technological and social changes in the cur-rent information age pose new challenges for securitPalabras claves:Autores:Patricia Jimbo Santana, Roberto Omar AndradeFuentes:googleAnomaly detection under cognitive security model
OtherAbstract: Cybersecurity attacks are considered among the top five of risks worldwide, according to the World EPalabras claves:Autores:Roberto Omar AndradeFuentes:googleAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity Risk of IoT on Smart Cities
BookAbstract: This book covers the topics on cyber security in IoT systems used in different verticals such as agrPalabras claves:Bayesian-networks, CYBERSECURITY, fuzzy-techniques, IOT, IoT attacks, IoT networks, Risk analysis, Risk management, smart cityAutores:Iván Ortiz, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:scopus