Mostrando 10 resultados de: 36
Filtros aplicados
Publisher
Springer International Publishing(3)
Springer Singapore(3)
Lecture Notes in Networks and Systems(2)
Universidad Pedagógica y Tecnológica de Colombia(2)
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(1)
Área temáticas
Programación informática, programas, datos, seguridad(11)
Ciencias de la computación(5)
Escuelas y sus actividades; educación especial(5)
Ciencia militar(4)
Criminología(4)
Classification of phishing attack solutions by employing deep learning techniques: A systematic literature review
OtherAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Pbkp_rediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a pbkp_rediction model that prevents phishPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy
OtherAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:Autores:Alyssa Krupskaia Cadena Gomez, Walter Marcelo Fuertes-DíazFuentes:googleA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA proposal of an entity name recognition algorithm to integrate governmental databases
Conference ObjectAbstract: Based on the analysis of existing name recognition techniques, an improvement in efficiency of suchPalabras claves:entity named recognition, name matching, natural language process, phonetic matching techniquesAutores:CÉSAR VILLACÍS, Delgado J., Fidel Castro, JUAN FERNANDO GALARRAGA HURTADO, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity baseline, an exploration, which permits to delineate national cybersecurity strategy in ecuador
OtherAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleCaracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura
OtherAbstract: En la Seguridad Informática, no importa que equipamiento de Software o Hardware se tenga instalado,Palabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:google