Mostrando 10 resultados de: 12
Filtros aplicados
Publisher
Smart Innovation, Systems and Technologies(3)
Advances in Intelligent Systems and Computing(2)
2017 1st Cyber Security in Networking Conference, CSNet 2017(1)
Communications in Computer and Information Science(1)
Computer Networks(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(5)
Programación informática, programas, datos, seguridad(5)
Relaciones internacionales(4)
Criminología(3)
Administración pública y ciencia militar(2)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Zambrano, Walter FuertesFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusCybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus