Mostrando 10 resultados de: 22
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(3)
Communications in Computer and Information Science(2)
Smart Innovation, Systems and Technologies(2)
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(1)
2017 1st Cyber Security in Networking Conference, CSNet 2017(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(8)
Programación informática, programas, datos, seguridad(8)
Ciencias de la computación(7)
Criminología(5)
Dirección general(2)
Área de conocimiento
Ciencias de la computación(18)
Algoritmo(3)
Aprendizaje automático(2)
Aprendizaje profundo(2)
Inteligencia artificial(2)
A Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA proposal of an entity name recognition algorithm to integrate governmental databases
Conference ObjectAbstract: Based on the analysis of existing name recognition techniques, an improvement in efficiency of suchPalabras claves:entity named recognition, name matching, natural language process, phonetic matching techniquesAutores:CÉSAR VILLACÍS, Delgado J., Fidel Castro, JUAN FERNANDO GALARRAGA HURTADO, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusClassification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Walter FuertesFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event
Conference ObjectAbstract: Ethical hacking is modern data protection and prevention technique proper to prevent information losPalabras claves:deep learning, ETHICAL HACKING, neural network, ReLUAutores:CARLOS ANDRES ESTRADA VASQUEZ, Daniel Nu˜nez-Agurto, Joyce Denisse Castro, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus