Mostrando 10 resultados de: 33
Filtros aplicados
Publisher
Smart Innovation, Systems and Technologies(4)
Advances in Intelligent Systems and Computing(2)
Communications in Computer and Information Science(2)
Electronics (Switzerland)(2)
Universidad de las Fuerzas Armadas ESPE. Maestría en Gerencia de Sistemas.(2)
Área temáticas
Ciencias de la computación(17)
Programación informática, programas, datos, seguridad(10)
Dirección general(7)
Funcionamiento de bibliotecas y archivos(7)
Métodos informáticos especiales(4)
Área de conocimiento
Ciencias de la computación(16)
Ingeniería industrial(5)
Aprendizaje automático(4)
Red informática(4)
Software(4)
A Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA container orchestration development that optimizes the etherpad collaborative editing tool through a novel management system
ArticleAbstract: The use of collaborative tools has notably increased recently. It is common to see distinct users thPalabras claves:CLOUD COMPUTING, collaborative tools, CONTAINERS, Etherpad, Management systems, Microservices, MonolithicAutores:Jorge Edison Lascano, Mora M.á., Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:scopusA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn emulation of VoD services using virtual network environments
ArticleAbstract: Virtualization platforms are a viable alternative for the implementation of IP network experimentatiPalabras claves:Emulation, Performance measurement, traffic monitoring, Video streaming, VirtualizationAutores:López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of an Artifact for security in 5G networks using Deep Learning methods.
ArticleAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:5g networks, deep learning, information security, neural networkAutores:Carlos Martín Estrada-Vásquez, Henry O. Cruz, Walter FuertesFuentes:scopusContextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus