Mostrando 10 resultados de: 10
Publisher
Communications in Computer and Information Science(2)
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(1)
CEUR Workshop Proceedings(1)
Computer Networks(1)
Electronics (Switzerland)(1)
Área temáticas
Ciencias de la computación(7)
Funcionamiento de bibliotecas y archivos(2)
Instrumentos de precisión y otros dispositivos(2)
Programación informática, programas, datos, seguridad(2)
Ciencia militar(1)
An unsupervised framework for anomaly detection in a water treatment system
Conference ObjectAbstract: Current Cyber-Physical Systems (CPSs) are sophisticated, complex, and equipped with networked sensorPalabras claves:Anomaly detection, Attention Mechanism, CPS, Multivariate Time SeriesAutores:Mayra MacAs, Wu C.Fuentes:scopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusData Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation
Conference ObjectAbstract: Innovation in the public-sector refers to the development of important improvements in the public adPalabras claves:CRISP-DM, Data Mining, data networks attacks, IDS/IPS, Machine learning, public-sector innovationAutores:Graciela Guerrero Idrovo, Lidia Lagla, Mayra MacAs, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusArtificial Intelligence-Based Banana Ripeness Detection
Conference ObjectAbstract: This paper aims to construct an artificial intelligence model that detects the level of ripeness ofPalabras claves:Artificial Intelligence, Banana ripeness, HSV, RBF, SVM multiclassAutores:Jorge Enríquez, Mayra MacAsFuentes:scopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEnhanced cyber-physical security through deep learning techniques
Conference ObjectAbstract: Nowadays that various aspects of our lives depend on complex cyber-physical systems, automated anomaPalabras claves:Anomaly detection, Critical infrastructures, deep learningAutores:Chunming W., Mayra MacAsFuentes:scopusEfficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
OtherAbstract:Palabras claves:Autores:Cheng Q., Mayra MacAs, Wu C., Xing J., Yu D., Zhou H.Fuentes:scopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopusReview: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Conference ObjectAbstract: As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any buPalabras claves:Artificial Intelligence, CYBERSECURITY, Deep Neural Networks, Intrusion Detection Systems, Machine learningAutores:Mayra MacAs, Wu C.Fuentes:scopus