Mostrando 10 resultados de: 12
Filtros aplicados
Publisher
2018 ICAI Workshops, ICAIW 2018 - Joint Proceedings of the Workshop on Data Engineering and Analytics, WDEA 2018, Workshop on Smart Sustainable Cities, WSSC 2018, Workshop on Intelligent Transportation Systems, WITS 2018 and Workshop on Empirical Experiences on Software Reuse, WEESR 2018(1)
Electronics (Switzerland)(1)
IEEE(1)
Lecture Notes in Networks and Systems(1)
MDPI(1)
Área temáticas
Ciencias de la computación(7)
Métodos informáticos especiales(6)
Programación informática, programas, datos, seguridad(4)
Funcionamiento de bibliotecas y archivos(2)
Análisis numérico(1)
Área de conocimiento
Ciencias de la computación(10)
Cognición(2)
Algoritmo(1)
Desarrollo cognitivo(1)
Gestión de recursos humanos(1)
A Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of an artifact for security in 5G networks using deep learning methods
OtherAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:Autores:HENRY OMAR CRUZ CARRILLO, Walter Marcelo Fuertes-DíazFuentes:googleAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusFormalistic Modelling Based on Pattern Recognition Applied to the Knowledge and Human Talent Sector in Ecuador
Conference ObjectAbstract: The purpose of this study has been to analyze the data set about the education received by high schoPalabras claves:Association Rules, Clustering, Data Mining, Information systems applications, pattern recognitionAutores:Adrían Guayasmin, Mauricio Campaña, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusFrom cognitive skills to automated cybersecurity
OtherAbstract: Organizations should face cybersecurity attacks that can strongly affect their operational processesPalabras claves:Autores:Roberto Omar Andrade, Tapia Freddy, Walter Marcelo Fuertes-DíazFuentes:googleInformation security management in university campus using cognitive security
OtherAbstract: Nowadays, most universities offer free Internet connections, access to scientific databases, and advPalabras claves:Autores:Alyssa Krupskaia Cadena Gomez, Roberto Omar Andrade, Walter Marcelo Fuertes-DíazFuentes:googleIntelligent agents, voice and facial recognition applied in videogames in order to stimulate cognitive development of children—A case study of Tictactoe in 3D
OtherAbstract: Multiple products of the video game industry have been widely used in a variety of educational procePalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleImplementación de un algoritmo basado en criptografía neuronal y criptografía basada en ADN para generación de una clave pública y envío de mensajes seguros
Bachelor ThesisAbstract: En la actualidad, las tecnologías que almacenan y procesan la información crecen cada día, creciendoPalabras claves:Adn, Ciencia Y Tecnologia, identificacion genetica, MEDIDAS DE MITIGACIÓN, Medidas De SeguridadAutores:Edgar Luis Salguero Dorokhin, Walter Marcelo Fuertes-DíazFuentes:rraae