Mostrando 10 resultados de: 87
Publisher
Applied Sciences (Switzerland)(4)
Springer International Publishing(3)
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018(2)
Advances in Cybersecurity Management(2)
Advances in Intelligent Systems and Computing(2)
Área temáticas
Ciencias de la computación(33)
Programación informática, programas, datos, seguridad(15)
Funcionamiento de bibliotecas y archivos(10)
Métodos informáticos especiales(7)
Otros problemas y servicios sociales(7)
Área de conocimiento
Ciencias de la computación(33)
Inteligencia artificial(12)
Red informática(9)
Aprendizaje automático(5)
Cognición(5)
2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)| 978-1-6654-5517-6/22/$31.00© 2022 IEEE| DOI: 10.1109/ICI2ST57350. 2022.00034
OtherAbstract: Author Index Toggle navigation IEEE Computer Society Digital Library Jobs Tech News Resource CenterPalabras claves:Autores:Boris Astudillo, José Lucio-Naranjo, Milton Escobar Sánchez, Roberto Omar AndradeFuentes:googleA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Usability-focused Method to Design a Cybersecurity MOOC for Children
Conference ObjectAbstract: Teaching cybersecurity to children is not a trivial task due to the complexity of explaining online-Palabras claves:3D, addie, character design, CYBERSECURITY, DPIPE, Mooc, nielsen, STORYBOARD, sus, udl, Usability, VIRTUAL LEARNINGAutores:Cannon S.L., Daliana Zambrano, Denys A. Flores, Gomez C., Julián Andrés Galindo Losada, Luis Almeida, Martinez-Garcia G., Roberto Omar Andrade, Sergio JimenezFuentes:scopusA comprehensive study of IOT for Alzheimer's disease
Conference ObjectAbstract: The aging process includes the degradation of physical and neurological functions in the people. AltPalabras claves:Alzheimer's, Ambient assisted living, Cognitive Stimulation, IOTAutores:María Fernanda Cazares, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA comprehensive study of the use of LoRa in the development of smart cities
ReviewAbstract: The New Urban Agenda (Agenda 2030) adopted at the United Nations Conference related to Sustainable UPalabras claves:Circular economy, IOT, LORA, LPWAN, smart cityAutores:Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusA hybrid recommender for cybersecurity based on rating approach
Book PartAbstract: The main function of a security analyst is to protect and make the best decisions for preserving thePalabras claves:COLLABORATIVE FILTERING, Knowledge base, Recommendation system, Security analysis, Security operationsAutores:Carlos Ayala, Edison Loza-Aguirre, Kevin Jiménez, Roberto Omar AndradeFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus