Mostrando 7 resultados de: 7
Filtros aplicados
Subtipo de publicación
Conference Object(7)
Área temáticas
Programación informática, programas, datos, seguridad(3)
Biblioteconomía y Documentación informatica(2)
Ciencias de la computación(2)
Funcionamiento de bibliotecas y archivos(2)
Relaciones internacionales(2)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusMathematical models applied in the design of a flight simulator for military training
Conference ObjectAbstract: The current study presents mathematical models of an aircraft, which has been considered as a mass sPalabras claves:Aerodynamic forces, Flight simulator, Kinematic control, Mathematical models of aircraftAutores:Aguirre C., Bastidas V., Betancourt J., CÉSAR VILLACÍS, Fabián Romero, Iván Rodríguez, Lozano C., Manolo Paredes-Calderón, Mario Navarrete, Santiago Chamorro, Solano J., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusImpact of Social Engineering Attacks: A Literature Review
Conference ObjectAbstract: Social engineering is the practice, which allows attackers to obtain sensitive or confidential inforPalabras claves:impact, Phishing, Social engineering attacks, vulnerabilityAutores:CARLOS ANDRES ESTRADA VASQUEZ, Diana Arévalo, Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Joyce Denisse Castro, Roberto Omar Andrade, Ron M., Walter FuertesFuentes:scopusMetrics and Indicators of Information Security Incident Management: A Systematic Mapping Study
Conference ObjectAbstract: The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, orPalabras claves:empirical study, Indicators, Key performance indicators, METRICS, Security incident management, Security incidentsAutores:Alyssa Cadena, Franklin Gualoto, Jenny Torres, Luis Tello-Oquendo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusVisual Analytics for the Reduction of Air Pollution on Real-Time Data Derived from WSN
Conference ObjectAbstract: Nowadays, the contaminated and poor air quality that is inhaled by the city population in industrialPalabras claves:air pollution, Data Mining, Visual Analytics, Wireless Sensor NetworksAutores:Byron Guanochanga, Diego S. Benitez, Dorys Quiroz, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusSituational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for Ecuador
Conference ObjectAbstract: The aim of this study has been to establish a Cybersecurity and Cyber defense model in Ecuador, basePalabras claves:Cyber defense, CYBERSECURITY, GCI, ICS, ISMS, ItuAutores:Fabián Bustamante, Ron M., Theofilos Tulkebkp_redis, Walter FuertesFuentes:scopus