Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
Advances in Intelligent Systems and Computing(1)
Communications in Computer and Information Science(1)
IAENG International Journal of Computer Science(1)
IEEE Access(1)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of an Artifact for security in 5G networks using Deep Learning methods.
ArticleAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:5g networks, deep learning, information security, neural networkAutores:Carlos Martín Estrada-Vásquez, Henry O. Cruz, Walter FuertesFuentes:scopusContextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopusPhishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods
Conference ObjectAbstract: The main aim of the current study has been to provide a novel tool for detecting phishing attacks anPalabras claves:feature selection, Neural networks, Phishing, security, social engineeringAutores:Diego Oña, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Lenin Zapata, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusPhishing attack detection: A solution based on the typical machine learning modeling cycle
Conference ObjectAbstract: The aim of the current study has been the design and development of a model for detecting Phishing aPalabras claves:decision tree, Machmachine learning, Naïve Bayes, Phishing, Supervised learningAutores:Bryan Espinosa, Eduardo Benavides-Astudillo, Jessica Simba, Roberto Omar Andrade, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus