Mostrando 10 resultados de: 44
Publisher
Springer International Publishing(4)
Advances in Intelligent Systems and Computing(2)
Communications in Computer and Information Science(2)
IEEE(2)
Lecture Notes in Networks and Systems(2)
Área temáticas
Ciencias de la computación(12)
Funcionamiento de bibliotecas y archivos(11)
Criminología(8)
Dirección general(5)
Métodos informáticos especiales(5)
BotHook: An option against cyberpedophilia
OtherAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn implementation of an artifact for security in 5G networks using deep learning methods
OtherAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:Autores:HENRY OMAR CRUZ CARRILLO, Walter Marcelo Fuertes-DíazFuentes:googleAn integral model to provide reactive and proactive services in an academic CSIRT based on business intelligence
OtherAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Pbkp_rediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a pbkp_rediction model that prevents phishPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA comprehensive study about cybersecurity incident response capabilities in Ecuador
OtherAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleContextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm
Conference ObjectAbstract: The present study proposes the implementation of an algorithm to determine the degree of reliabilityPalabras claves:Business to Consumer, Data Mining, facebook, Levenshtein algorithm, Natural Language processing, SOCIAL NETWORKSAutores:Danny Jácome, Jorge Edison Lascano, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus