Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(1)
CEUR Workshop Proceedings(1)
Communications in Computer and Information Science(1)
Computer Networks(1)
IAENG International Journal of Computer Science(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(1)
Instrumentos de precisión y otros dispositivos(1)
Programación informática, programas, datos, seguridad(1)
Relaciones internacionales(1)
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusData Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation
Conference ObjectAbstract: Innovation in the public-sector refers to the development of important improvements in the public adPalabras claves:CRISP-DM, Data Mining, data networks attacks, IDS/IPS, Machine learning, public-sector innovationAutores:Graciela Guerrero Idrovo, Lidia Lagla, Mayra MacAs, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEnhanced cyber-physical security through deep learning techniques
Conference ObjectAbstract: Nowadays that various aspects of our lives depend on complex cyber-physical systems, automated anomaPalabras claves:Anomaly detection, Critical infrastructures, deep learningAutores:Chunming W., Mayra MacAsFuentes:scopusEfficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
OtherAbstract:Palabras claves:Autores:Cheng Q., Mayra MacAs, Wu C., Xing J., Yu D., Zhou H.Fuentes:scopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopusReview: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Conference ObjectAbstract: As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any buPalabras claves:Artificial Intelligence, CYBERSECURITY, Deep Neural Networks, Intrusion Detection Systems, Machine learningAutores:Mayra MacAs, Wu C.Fuentes:scopus