Mostrando 6 resultados de: 6
Publisher
Communications in Computer and Information Science(1)
Electronics (Switzerland)(1)
IAENG International Journal of Computer Science(1)
Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019(1)
Proceedings - 2020 IEEE Latin-American Conference on Communications, LATINCOM 2020(1)
Área temáticas
Ciencias de la computación(4)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Ciencia militar(1)
Física aplicada(1)
Área de conocimiento
Ciencias de la computación(4)
Aprendizaje automático(3)
Ciencia ambiental(1)
Ingeniería de software(1)
Recursos hídricos(1)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(6)
ODS 8: Trabajo decente y crecimiento económico(5)
ODS 6: Agua limpia y saneamiento(1)
An unsupervised framework for anomaly detection in a water treatment system
Conference ObjectAbstract: Current Cyber-Physical Systems (CPSs) are sophisticated, complex, and equipped with networked sensorPalabras claves:Anomaly detection, Attention Mechanism, CPS, Multivariate Time SeriesAutores:Mayra MacAs, Wu C.Fuentes:scopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEfficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
OtherAbstract:Palabras claves:Autores:Cheng Q., Mayra MacAs, Wu C., Xing J., Yu D., Zhou H.Fuentes:scopusReview: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Conference ObjectAbstract: As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any buPalabras claves:Artificial Intelligence, CYBERSECURITY, Deep Neural Networks, Intrusion Detection Systems, Machine learningAutores:Mayra MacAs, Wu C.Fuentes:scopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopus