Mostrando 8 resultados de: 8
Filtros aplicados
Subtipo de publicación
Conference Object(8)
Área temáticas
Programación informática, programas, datos, seguridad(5)
Ciencias de la computación(2)
Funcionamiento de bibliotecas y archivos(2)
Administración pública y ciencia militar(1)
Ciencia militar(1)
Área de conocimiento
Ciencias de la computación(4)
Ciencia ambiental(2)
Contaminación del aire(2)
Aprendizaje automático(1)
Computación en la nube(1)
Contextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusData Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network
Conference ObjectAbstract: Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort,Palabras claves:air pollution, Business intelligence, data analytics, Data Mining, pattern recognition, wireless sensor networkAutores:Alyssa Cadena, Diego S. Benitez, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Comprehensive Study About Cybersecurity Incident Response Capabilities in Ecuador
Conference ObjectAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:CSIRT, Cybersecurity metrics, Cybersecurity skills, Incident responseAutores:Daniela Cordova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter FuertesFuentes:scopusMalware Security Evasion Techniques: An Original Keylogger Implementation
Conference ObjectAbstract: The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 1Palabras claves:Evasion techniques, Keylogger, MalwareAutores:CARLOS ANDRES ESTRADA VASQUEZ, Cuervo M.C., Royo Á.A., Sánchez-Rubio M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusReal-time air pollution monitoring systems using wireless sensor networks connected in a cloud-computing, wrapped up web services
Conference ObjectAbstract: Air pollution continues to grow at an alarming rate, decreasing the quality of life around the worldPalabras claves:air pollution, IAAS, IOT, WEB SERVICES, WSNAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Santiago Salvador, Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus