Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(1)
Communications in Computer and Information Science(1)
Computer Networks(1)
Electronics (Switzerland)(1)
Área temáticas
Ciencias de la computación(3)
Ciencia militar(1)
Funcionamiento de bibliotecas y archivos(1)
Instrumentos de precisión y otros dispositivos(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ciencias de la computación(4)
Aprendizaje profundo(1)
Ingeniería de software(1)
Minería de datos(1)
Origen
scopus(4)
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusData Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation
Conference ObjectAbstract: Innovation in the public-sector refers to the development of important improvements in the public adPalabras claves:CRISP-DM, Data Mining, data networks attacks, IDS/IPS, Machine learning, public-sector innovationAutores:Graciela Guerrero Idrovo, Lidia Lagla, Mayra MacAs, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus