Mostrando 10 resultados de: 21
Publisher
Advances in Intelligent Systems and Computing(5)
Smart Innovation, Systems and Technologies(3)
Lecture Notes in Networks and Systems(2)
Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017(2)
Communications in Computer and Information Science(1)
Área temáticas
Criminología(6)
Funcionamiento de bibliotecas y archivos(6)
Ciencias de la computación(4)
Otros problemas y servicios sociales(3)
Administración pública y ciencia militar(2)
Área de conocimiento
Ciencias de la computación(13)
Aprendizaje automático(2)
Algoritmo(1)
Aprendizaje profundo(1)
Ingeniería industrial(1)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of an Artifact for security in 5G networks using Deep Learning methods.
ArticleAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:5g networks, deep learning, information security, neural networkAutores:Carlos Martín Estrada-Vásquez, Henry O. Cruz, Walter FuertesFuentes:scopusAn integral model to provide reactive and proactive services in an academic csirt based on business intelligence
ArticleAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:CSIRT, Cyber-attacks, DATA WAREHOUSE, ETL, Incident Managers, KIMBALL, OLAPS, Scrum, Vulnerability AnalysisAutores:Francisco Reyes, Paúl Valladares, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:scopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusContextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event
Conference ObjectAbstract: Ethical hacking is modern data protection and prevention technique proper to prevent information losPalabras claves:deep learning, ETHICAL HACKING, neural network, ReLUAutores:CARLOS ANDRES ESTRADA VASQUEZ, Daniel Nu˜nez-Agurto, Joyce Denisse Castro, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus