Mostrando 10 resultados de: 62
Filtros aplicados
Publisher
MDPI(3)
Springer International Publishing(3)
Universidad Pedagógica y Tecnológica de Colombia(3)
Communications in Computer and Information Science(2)
Luis Enrique Sánchez Crespo(2)
Área temáticas
Ciencias de la computación(28)
Programación informática, programas, datos, seguridad(24)
Funcionamiento de bibliotecas y archivos(11)
Dirección general(9)
Métodos informáticos especiales(9)
Área de conocimiento
Ciencias de la computación(29)
Red informática(11)
Software(9)
Inteligencia artificial(6)
Simulación por computadora(6)
A Container Orchestration Development that Optimizes the Etherpad Collaborative Editing Tool through a Novel Management System
OtherAbstract: The use of collaborative tools has notably increased recently. It is common to see distinct users thPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA New Real-Time Flight Simulator for Military Training Using Mechatronics and Cyber-Physical System Methods
OtherAbstract: So far, the aeronautical industry has developed flight simulators and space disorientation with highPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA comprehensive study about cybersecurity incident response capabilities in Ecuador
OtherAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusClasificador de E-mails Anti-Spam utilizando un Perceptrón Multicapa
OtherAbstract: La grandes amenazas del correo electrónico (e-mail) son los virus, gusanos, troyanos, ataques de denPalabras claves:Autores:JENNY ALEXANDRA RUIZ ROBALINO, Walter Marcelo Fuertes-DíazFuentes:google