Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
2018 ICAI Workshops, ICAIW 2018 - Joint Proceedings of the Workshop on Data Engineering and Analytics, WDEA 2018, Workshop on Smart Sustainable Cities, WSSC 2018, Workshop on Intelligent Transportation Systems, WITS 2018 and Workshop on Empirical Experiences on Software Reuse, WEESR 2018(1)
Electronics (Switzerland)(1)
ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems(1)
Lecture Notes in Networks and Systems(1)
Proceedings of Computing Conference 2017(1)
Área temáticas
Ciencias de la computación(4)
Métodos informáticos especiales(3)
Análisis numérico(1)
Artes escénicas y recreativas(1)
Economía(1)
Characterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusFormalistic Modelling Based on Pattern Recognition Applied to the Knowledge and Human Talent Sector in Ecuador
Conference ObjectAbstract: The purpose of this study has been to analyze the data set about the education received by high schoPalabras claves:Association Rules, Clustering, Data Mining, Information systems applications, pattern recognitionAutores:Adrían Guayasmin, Mauricio Campaña, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusOn the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key
ArticleAbstract: When establishing a cryptographic key between two users, the asymmetric cryptography scheme is generPalabras claves:Autores:Édgar Salguero Dorokhin, Jorge Edison Lascano, Walter FuertesFuentes:scopusOn the development of strategic games based on a Semiotic analysis: A case study of an optimized Tic-Tac-Toe
Conference ObjectAbstract: A picture can express something instead of having a thousand words that cannot do it. This phrase, wPalabras claves:Artificial Intelligence, Semiotic models for videogames, semiotics, Tic-Tac-Toe, VIDEOGAMESAutores:Ana Tacuri, CÉSAR VILLACÍS, Édgar Salguero Dorokhin, Hernán Aules, Margarita Zambrano, Mónica Santillán Trujillo, Walter FuertesFuentes:scopusIntelligent agents, voice and facial recognition applied in videogames in order to stimulate cognitive development of children - A case study of Tictactoe in 3D
Conference ObjectAbstract: Multiple products of the video game industry have been widely used in a variety of educational procePalabras claves:Cognitive development, face recognition, Game-based learning, intelligent agents, videogame, Voice recognitionAutores:CÉSAR VILLACÍS, Freddy Pilaluisa, Hernán Aules, Margarita Zambrano, Theofilos Toulkeridis, Walter FuertesFuentes:scopus