Mostrando 10 resultados de: 40
Filtros aplicados
Publisher
Applied Sciences (Switzerland)(4)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(2)
Advances in Cybersecurity Management(2)
Advances in Intelligent Systems and Computing(2)
IEEE Access(2)
Área temáticas
Ciencias de la computación(20)
Programación informática, programas, datos, seguridad(13)
Métodos informáticos especiales(7)
Funcionamiento de bibliotecas y archivos(6)
Procesos sociales(5)
Área de conocimiento
Ciencias de la computación(25)
Red informática(9)
Inteligencia artificial(8)
Aprendizaje automático(5)
Cognición(4)
Origen
google(27)
Characterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCognitive Security for Incident Management Process
Conference ObjectAbstract: This work presents the literature review about the process of handling security incidents to identifPalabras claves:Big-data, cognitive security, detection, Incident responseAutores:Jenny Torres, Roberto Omar Andrade, Susana Graciela CadenaFuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusCognitive security: A comprehensive study of cognitive science in cybersecurity
ArticleAbstract: Nowadays, IoT, cloud computing, mobile and social networks are generating a transformation in socialPalabras claves:Cognitive science, cognitive security, Cyber operations, situation awarenessAutores:Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusAutomatic Detection of Fake News in Spanish: Ecuadorian Political Satire
ArticleAbstract: The circulation of fake news on internet, especially those of political satire through social media,Palabras claves:Fact-checking, Machine learning, Natural Language processing, Supervised classificationAutores:Miguel Flores, Nicolás Mafla, Roberto Omar Andrade, Sergio Castillo-PáezFuentes:scopusAutomation tasks model for improving hardening levels on campus networks
Conference ObjectAbstract: Campus networks are an infrastructure that enables communication and access to services for users inPalabras claves:Ansible, Attack vector, Automation tasks, Campus network, Hardening processAutores:Aarón Echeverría, Iván Ortiz-Garcés, Roberto Omar AndradeFuentes:googlescopusAnalysis and Design of a Pbkp_redictive Model for Phishing Detection Based on Url and Email Corpus
ArticleAbstract: One of the most reported cyber crimes worldwide is phishing, and various anti-phishing systems (APS)Palabras claves:Anti-phishing, Cyberattacks, MIDDLEWARE, Phishing, threatAutores:Fernanda Albán, Menthor Urvina, Roberto Omar AndradeFuentes:scopusA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus