Mostrando 10 resultados de: 36
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(3)
Smart Innovation, Systems and Technologies(3)
Communications in Computer and Information Science(2)
Electronics (Switzerland)(2)
Lecture Notes in Networks and Systems(2)
Área temáticas
Ciencias de la computación(17)
Funcionamiento de bibliotecas y archivos(13)
Programación informática, programas, datos, seguridad(9)
Criminología(6)
Métodos informáticos especiales(6)
Área de conocimiento
Ciencias de la computación(22)
Inteligencia artificial(7)
Aprendizaje automático(4)
Tecnología educativa(3)
Cognición(2)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA container orchestration development that optimizes the etherpad collaborative editing tool through a novel management system
ArticleAbstract: The use of collaborative tools has notably increased recently. It is common to see distinct users thPalabras claves:CLOUD COMPUTING, collaborative tools, CONTAINERS, Etherpad, Management systems, Microservices, MonolithicAutores:Jorge Edison Lascano, Mora M.á., Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:scopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusClassification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Walter FuertesFuentes:googlescopusAn integral model to provide reactive and proactive services in an academic csirt based on business intelligence
ArticleAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:CSIRT, Cyber-attacks, DATA WAREHOUSE, ETL, Incident Managers, KIMBALL, OLAPS, Scrum, Vulnerability AnalysisAutores:Francisco Reyes, Paúl Valladares, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:scopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus