Mostrando 10 resultados de: 10
Filtros aplicados
Publisher
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(1)
ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems(1)
IEEE Access(1)
Lecture Notes in Networks and Systems(1)
Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019(1)
Área temáticas
Ciencias de la computación(4)
Métodos informáticos especiales(2)
Biblioteconomía y Documentación informatica(1)
Biografía, genealogía, insignias(1)
Ciencia militar(1)
A Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusCorrespondencia a Wallace W. Atwood
OtherAbstract: Papel copia amarillo, roturas y faltantesPalabras claves:Correspondencia, Wallace W. AtwoodAutores:Roberto Andrade, Roberto Omar AndradeFuentes:rraaeEnhancing intelligence SOC with big data tools
Conference ObjectAbstract: Traditional security tools are based on predetermined signatures or rules that show rigidity in thePalabras claves:BIG DATA, cognitive security, CYBERSECURITY, security operation centerAutores:Jenny Torres, Roberto Omar AndradeFuentes:googlescopusDiseño y dimensionamiento de un equipo de un equipo de respuesta ante incidentes de seguridad informática (CSIRT)
OtherAbstract: El presente artículo se enfoca en el diseño y dimensionamiento de un equipo de respuesta ante incidePalabras claves:Autores:Roberto Omar AndradeFuentes:googleLa gamificación en el desarrollo del pensamiento computacional para fortalecer los procesos de toma de decisiones
OtherAbstract: La tecnología ha impulsado cambios en los diferentes aspectos en la dinámica comportamental del serPalabras claves:Autores:Roberto Omar AndradeFuentes:googleMetrics and Indicators of Information Security Incident Management: A Systematic Mapping Study
Conference ObjectAbstract: The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, orPalabras claves:empirical study, Indicators, Key performance indicators, METRICS, Security incident management, Security incidentsAutores:Alyssa Cadena, Franklin Gualoto, Jenny Torres, Luis Tello-Oquendo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusPhishing attack detection: A solution based on the typical machine learning modeling cycle
Conference ObjectAbstract: The aim of the current study has been the design and development of a model for detecting Phishing aPalabras claves:decision tree, Machmachine learning, Naïve Bayes, Phishing, Supervised learningAutores:Bryan Espinosa, Eduardo Benavides-Astudillo, Jessica Simba, Roberto Omar Andrade, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusRequerimientos on line – servicios de internet para atención de requerimientos y servicios al cliente
ArticleAbstract: Our thesis is an important tool for the company INTERAGUA in the area of customer service, improvinPalabras claves:BENEFICIOS DE REQUERIMIENTOS ONLINE, CLASIFICACIÓN Y DISTRIBUCIÓN DE REQUERIMIENTOS, DES CONGESTIONAMIENTO EN EL ÁREA DE ATENCIÓN AL CLIENTE, HERRAMIENTA DE TRABAJO INTERAGUA, POLÍTICAS DE EVALUACIÓN DE TRÁMITES, SISTEMA DE CONTROL Y SEGURIDAD, TIPOS DE RECLAMOS PARA PAGOS ONLINEAutores:Lidia Florinda Dominguez Menoscal, Monica Celi, Roberto Andrade, Roberto Omar AndradeFuentes:rraaeTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus