Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
Communications in Computer and Information Science(1)
Computer Networks(1)
IAENG International Journal of Computer Science(1)
Lecture Notes in Networks and Systems(1)
Periodicals of Engineering and Natural Sciences(1)
Área temáticas
Ciencias de la computación(3)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Criminología(1)
Instrumentos de precisión y otros dispositivos(1)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of an Artifact for security in 5G networks using Deep Learning methods.
ArticleAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:5g networks, deep learning, information security, neural networkAutores:Carlos Martín Estrada-Vásquez, Henry O. Cruz, Walter FuertesFuentes:scopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusAn Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event
Conference ObjectAbstract: Ethical hacking is modern data protection and prevention technique proper to prevent information losPalabras claves:deep learning, ETHICAL HACKING, neural network, ReLUAutores:CARLOS ANDRES ESTRADA VASQUEZ, Daniel Nu˜nez-Agurto, Joyce Denisse Castro, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopus