Mostrando 5 resultados de: 5
Filtros aplicados
Subtipo de publicación
Conference Object(5)
Área temáticas
Ciencias de la computación(3)
Criminología(1)
Funcionamiento de bibliotecas y archivos(1)
Ingeniería y operaciones afines(1)
Procesos sociales(1)
Área de conocimiento
Ciencias de la computación(3)
Aprendizaje automático(1)
Computación en la nube(1)
Educación superior(1)
Ingeniería de software(1)
Comparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEarly Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing
Conference ObjectAbstract: During these last years, the use of mobile and Web technologies around the world has reached an incrPalabras claves:CLOUD COMPUTING, GEOLOCATION, Global Positioning System, Location based services, MOBILE DEVICESAutores:Adrián Mena, Diego Terán, Graciela Guerrero Idrovo, Joel Rivera, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusInformation Security at Higher Education Institutions: A Systematic Literature Review
Conference ObjectAbstract: Information is considered an essential asset in Higher Education Institutions (IES) either public orPalabras claves:Data Protection, Higher education institutions, information security, Security measures, Security techniquesAutores:Daisy Imbaquingo-Esparza, David Molina, Javier F. Díaz, Mario Ron Egas, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus