Mostrando 10 resultados de: 30
Filtros aplicados
Publisher
Springer International Publishing(4)
Communications in Computer and Information Science(3)
IEEE(2)
Springer Singapore(2)
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(1)
Área temáticas
Programación informática, programas, datos, seguridad(15)
Ciencias de la computación(10)
Funcionamiento de bibliotecas y archivos(10)
Criminología(8)
Interacción social(5)
Área de conocimiento
Ciencias de la computación(22)
Algoritmo(3)
Aprendizaje automático(3)
Administración pública(2)
Aprendizaje profundo(2)
A Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA comprehensive study about cybersecurity incident response capabilities in Ecuador
OtherAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA proposal of an entity name recognition algorithm to integrate governmental databases
Conference ObjectAbstract: Based on the analysis of existing name recognition techniques, an improvement in efficiency of suchPalabras claves:entity named recognition, name matching, natural language process, phonetic matching techniquesAutores:CÉSAR VILLACÍS, Delgado J., Fidel Castro, JUAN FERNANDO GALARRAGA HURTADO, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusClassification of phishing attack solutions by employing deep learning techniques: A systematic literature review
OtherAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleBotHook: An option against cyberpedophilia
OtherAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn implementation of a Virus Focuses on Mobile Devices with Android. An Ethical Hacking Event.
OtherAbstract: Mobile devices have become part of daily social life. However, the vulnerabilities of this equipmentPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (xss) using a cookie classifier
OtherAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn Exploratory Study of Cognitive Sciences Applied to Cybersecurity
ArticleAbstract: Cognitive security is the interception between cognitive science and artificial intelligence techniqPalabras claves:cognitive security, Cyberattacks, CYBERSECURITYAutores:Gustavo Ernesto Navas Ruilova, Iván Ortiz-Garcés, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus