Mostrando 10 resultados de: 70
Filtros aplicados
Publisher
Springer International Publishing(5)
Communications in Computer and Information Science(4)
Lecture Notes in Networks and Systems(3)
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(2)
Electronics (Switzerland)(2)
Área temáticas
Ciencias de la computación(33)
Programación informática, programas, datos, seguridad(27)
Funcionamiento de bibliotecas y archivos(22)
Métodos informáticos especiales(13)
Dirección general(8)
Characterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusClassification of phishing attack solutions by employing deep learning techniques: A systematic literature review
OtherAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusComputer Graphics of the Regular Polygons and their Applications
OtherAbstract: The computer graphics of regular polygons and their applications is a scarcely studied area that allPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn implementation of a Virus Focuses on Mobile Devices with Android. An Ethical Hacking Event.
OtherAbstract: Mobile devices have become part of daily social life. However, the vulnerabilities of this equipmentPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn integral model to provide reactive and proactive services in an academic CSIRT based on business intelligence
OtherAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAnalytical Expression to Pbkp_redict the Overhead Produced by the VMware and Xen Virtualization Tools
OtherAbstract:Palabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Pbkp_rediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a pbkp_rediction model that prevents phishPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus