Mostrando 5 resultados de: 5
Filtros aplicados
Subtipo de publicación
Conference Object(5)
Publisher
Iberian Conference on Information Systems and Technologies, CISTI(2)
Advances in Intelligent Systems and Computing(1)
Communications in Computer and Information Science(1)
Smart Innovation, Systems and Technologies(1)
A Better Infected Hosts Detection Combining Ensemble Learning and Threat Intelligence
Conference ObjectAbstract: Ensemble learning techniques have been successfully proposed and used to improve threats detection iPalabras claves:CYBERSECURITY, ensemble learning, intrusion detection, MalwareAutores:Garcia S., Javier F. Díaz, Venosa P.Fuentes:scopusCybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusNational Cybersecurity Strategy for Developing Countries : Case study: Ecuador proposal
Conference ObjectAbstract: The use of Information and Communication Technologies maintains inherent risks that affect the procePalabras claves:CYBERSECURITY, GOOD PRACTICES, National Strategies, risksAutores:David Molina, Geovanni Ninahualpa Quiña, Javier F. Díaz, Mario Bernabe Ron Egas, Ninahuelpa G., Ron M.Fuentes:scopus