Mostrando 10 resultados de: 144
Filtros aplicados
Publisher
IEEE(10)
Springer International Publishing(9)
Communications in Computer and Information Science(6)
Universidad Pedagógica y Tecnológica de Colombia(5)
Springer Singapore(4)
Área temáticas
Ciencias de la computación(64)
Programación informática, programas, datos, seguridad(39)
Funcionamiento de bibliotecas y archivos(35)
Métodos informáticos especiales(21)
Física aplicada(14)
Characterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusClasificador de E-mails Anti-Spam utilizando un Perceptrón Multicapa
OtherAbstract: La grandes amenazas del correo electrónico (e-mail) son los virus, gusanos, troyanos, ataques de denPalabras claves:Autores:JENNY ALEXANDRA RUIZ ROBALINO, Walter Marcelo Fuertes-DíazFuentes:googleClassification of phishing attack solutions by employing deep learning techniques: A systematic literature review
OtherAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusComputer Graphics of the Regular Polygons and their Applications
OtherAbstract: The computer graphics of regular polygons and their applications is a scarcely studied area that allPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleBotHook: An option against cyberpedophilia
OtherAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn emulation of VoD services using virtual network environments
ArticleAbstract: Virtualization platforms are a viable alternative for the implementation of IP network experimentatiPalabras claves:Emulation, Performance measurement, traffic monitoring, Video streaming, VirtualizationAutores:López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn implementation of a Virus Focuses on Mobile Devices with Android. An Ethical Hacking Event.
OtherAbstract: Mobile devices have become part of daily social life. However, the vulnerabilities of this equipmentPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleAn implementation of an artifact for security in 5G networks using deep learning methods
OtherAbstract: The Fifth-Generation networks are vital in telecommunications, which reaches a substantial increasePalabras claves:Autores:HENRY OMAR CRUZ CARRILLO, Walter Marcelo Fuertes-DíazFuentes:googleAn integral model to provide reactive and proactive services in an academic CSIRT based on business intelligence
OtherAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:google