Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
Communications in Computer and Information Science(4)
Lecture Notes in Networks and Systems(2)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
IAENG International Journal of Computer Science(1)
Área temáticas
Programación informática, programas, datos, seguridad(4)
Ciencias de la computación(3)
Criminología(2)
Escuelas y sus actividades; educación especial(2)
Conocimiento(1)
Área de conocimiento
Ciencias de la computación(6)
Aprendizaje automático(2)
Aprendizaje profundo(1)
Psicología social(1)
Visión por computadora(1)
Origen
google(5)
Comparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event
Conference ObjectAbstract: Ethical hacking is modern data protection and prevention technique proper to prevent information losPalabras claves:deep learning, ETHICAL HACKING, neural network, ReLUAutores:CARLOS ANDRES ESTRADA VASQUEZ, Daniel Nu˜nez-Agurto, Joyce Denisse Castro, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusDesign of an Academic CSIRT – A Proposal Based on Strategic Planning Principles
Conference ObjectAbstract: This work aims to design and implement an organizational model that supports the macro processes ofPalabras claves:Academic CSIRT, cert, Strategic planning processAutores:Daniel Nu˜nez-Agurto, Henry O. Cruz, Luis Recalde, Ricardo Carrera, Ron M., Tapia Freddy, Walter FuertesFuentes:scopusInferential Statistical Analysis in E-Learning University Education in Latin America in Times of COVID-19
Conference ObjectAbstract: Since the appearance of COVID-19, the teaching-learning processes in higher education have changed.Palabras claves:e-Learning, Inferential statistical analysis, ScilabAutores:Christian Coronel-Guerrero, Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gisella Mantilla-Morales, Milton Temistocles Andrade-Salazar, Rodrigo Vladimir Bastidas-Chalán, Samaniego-Salcán O.Fuentes:googlescopusMachine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions
ArticleAbstract: The growing diversification of Internet applications and the continuous evolution of network infrastPalabras claves:deep learning, Machine learning, Softwaredefined networking, traffic classificationAutores:Daniel Nu˜nez-Agurto, Luis Marrone, Mayra MacAs, Walter FuertesFuentes:scopusVulnerability of CAPTCHA Systems Using Bots with Computer Vision Abilities
Conference ObjectAbstract: CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. TheyPalabras claves:Bots, CAPTCHA, RPAAutores:Benjamin Santillán-Tituaña, Daniel Nu˜nez-Agurto, Germán Rodríguez-Galán, Jordy Quinatoa-Medina, Julio Villares-JimenezFuentes:scopusXSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Conference ObjectAbstract: QR codes are the means to offer more direct and instant access to information. However, QR codes havPalabras claves:BEEf, QR code, XSSAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela FloresFuentes:googlescopus