Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
CEUR Workshop Proceedings(1)
Communications in Computer and Information Science(1)
Computer Networks(1)
Electronics (Switzerland)(1)
IAENG International Journal of Computer Science(1)
Área temáticas
Ciencias de la computación(6)
Funcionamiento de bibliotecas y archivos(2)
Instrumentos de precisión y otros dispositivos(2)
Programación informática, programas, datos, seguridad(2)
Ciencia militar(1)
Área de conocimiento
Ciencias de la computación(6)
Aprendizaje automático(3)
Aprendizaje profundo(1)
Ciencia ambiental(1)
Ingeniería de software(1)
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusAn unsupervised framework for anomaly detection in a water treatment system
Conference ObjectAbstract: Current Cyber-Physical Systems (CPSs) are sophisticated, complex, and equipped with networked sensorPalabras claves:Anomaly detection, Attention Mechanism, CPS, Multivariate Time SeriesAutores:Mayra MacAs, Wu C.Fuentes:scopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEfficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
OtherAbstract:Palabras claves:Autores:Cheng Q., Mayra MacAs, Wu C., Xing J., Yu D., Zhou H.Fuentes:scopusEnhanced cyber-physical security through deep learning techniques
Conference ObjectAbstract: Nowadays that various aspects of our lives depend on complex cyber-physical systems, automated anomaPalabras claves:Anomaly detection, Critical infrastructures, deep learningAutores:Chunming W., Mayra MacAsFuentes:scopusReview: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Conference ObjectAbstract: As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any buPalabras claves:Artificial Intelligence, CYBERSECURITY, Deep Neural Networks, Intrusion Detection Systems, Machine learningAutores:Mayra MacAs, Wu C.Fuentes:scopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopus