Mostrando 10 resultados de: 70
Filtros aplicados
Publisher
Springer International Publishing(5)
Communications in Computer and Information Science(4)
Lecture Notes in Networks and Systems(3)
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(2)
Electronics (Switzerland)(2)
Área temáticas
Ciencias de la computación(33)
Programación informática, programas, datos, seguridad(27)
Funcionamiento de bibliotecas y archivos(22)
Métodos informáticos especiales(13)
Dirección general(8)
Área de conocimiento
Inteligencia artificial(10)
Red informática(10)
Aprendizaje automático(6)
Algoritmo(3)
Análisis de datos(3)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy
OtherAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:Autores:Alyssa Krupskaia Cadena Gomez, Walter Marcelo Fuertes-DíazFuentes:googleA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA comprehensive study about cybersecurity incident response capabilities in Ecuador
OtherAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA low-cost IoT application for the urban traffic of vehicles, based on wireless sensors using GSM technology
OtherAbstract: Congestion of vehicular traffic in the cities with the highest population density results into a higPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus