Mostrando 10 resultados de: 79
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(8)
Smart Innovation, Systems and Technologies(7)
Communications in Computer and Information Science(5)
Lecture Notes in Networks and Systems(4)
Electronics (Switzerland)(3)
Área temáticas
Ciencias de la computación(37)
Funcionamiento de bibliotecas y archivos(20)
Programación informática, programas, datos, seguridad(19)
Métodos informáticos especiales(9)
Criminología(8)
Área de conocimiento
Ciencias de la computación(40)
Aprendizaje automático(8)
Ciencia ambiental(8)
Inteligencia artificial(7)
Red informática(5)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(67)
ODS 17: Alianzas para lograr los objetivos(37)
ODS 4: Educación de calidad(33)
ODS 8: Trabajo decente y crecimiento económico(28)
ODS 16: Paz, justicia e instituciones sólidas(25)
Origen
google(49)
Formalistic Modelling Based on Pattern Recognition Applied to the Knowledge and Human Talent Sector in Ecuador
Conference ObjectAbstract: The purpose of this study has been to analyze the data set about the education received by high schoPalabras claves:Association Rules, Clustering, Data Mining, Information systems applications, pattern recognitionAutores:Adrían Guayasmin, Mauricio Campaña, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusFrom monolithic systems to microservices: A comparative study of performance
ArticleAbstract: Currently, organizations face the need to create scalable applications in an agile way that impactsPalabras claves:Architecture, Cloud, CONTAINERS, mathematical model, METRICS, Microservices, Monolithic, performanceAutores:Edwin Flores, Edwin Geovanny Flores Castro, Hernán Aules, Mora M.á., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Walter FuertesFuentes:googlescopusEarly Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing
Conference ObjectAbstract: During these last years, the use of mobile and Web technologies around the world has reached an incrPalabras claves:CLOUD COMPUTING, GEOLOCATION, Global Positioning System, Location based services, MOBILE DEVICESAutores:Adrián Mena, Diego Terán, Graciela Guerrero Idrovo, Joel Rivera, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEarly detection of Alzheimer's using digital image processing through iridology, an alternative method
ArticleAbstract: Over the years, alternative medicine has carried out numerous systematic studies related to the ophtPalabras claves:Alternative Medicine, Alzheimer's, digital image processing, Iridology, Machine learning, Newton's InterpolationAutores:Derlin Morocho, Fernando Hernandez-Carraso, Roberto Vega, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusContextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusDimensional data model for early alerts of malicious activities in a CSIRT
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities and cyber-attacks increase security incidents aPalabras claves:BI, CSIRT, Data warehousing, Dimensional Data Model, Early Warning to Computer Attacks, ETL Process, OLAP cubesAutores:Paúl Valladares, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus