Mostrando 10 resultados de: 24
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(2)
Lecture Notes in Networks and Systems(2)
Smart Innovation, Systems and Technologies(2)
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(1)
2016 IEEE Ecuador Technical Chapters Meeting, ETCM 2016(1)
Área temáticas
Ciencias de la computación(10)
Programación informática, programas, datos, seguridad(6)
Métodos informáticos especiales(5)
Ciencia militar(4)
Administración pública y ciencia militar(1)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusAn implementation of an Artifact for security in 5G networks using Deep Learning methods.
ArticleAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:5g networks, deep learning, information security, neural networkAutores:Carlos Martín Estrada-Vásquez, Henry O. Cruz, Walter FuertesFuentes:scopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Pbkp_rediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a pbkp_rediction model that prevents phishPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA proposal of an entity name recognition algorithm to integrate governmental databases
Conference ObjectAbstract: Based on the analysis of existing name recognition techniques, an improvement in efficiency of suchPalabras claves:entity named recognition, name matching, natural language process, phonetic matching techniquesAutores:CÉSAR VILLACÍS, Delgado J., Fidel Castro, JUAN FERNANDO GALARRAGA HURTADO, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus