Mostrando 3 resultados de: 3
Filtros aplicados
Development Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusEVALUACIÓN CLÍNICA EPIDEMIOLÓGICA DE SALUD EN SUSCEPTIBLES EXPUESTOS A INHIBIDORES DE LA CHE EN SECTORES FRUTÍCOLAS DE PATATE, TUNGURAHUA-ECUA
OtherAbstract: Por uso indiscriminado de pesticidas, según la Organización Mundial de la Salud, tres millones de pePalabras claves:Autores:Ivan Arias, John Paúl Reyes Vásquez, John Reyes, Jorge Reyes, Roque SoriaFuentes:googlerraae