Mostrando 10 resultados de: 43
Filtros aplicados
Publisher
Communications in Computer and Information Science(7)
Advances in Intelligent Systems and Computing(3)
Lecture Notes in Networks and Systems(3)
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(2)
Electronics (Switzerland)(2)
Área temáticas
Ciencias de la computación(21)
Funcionamiento de bibliotecas y archivos(11)
Programación informática, programas, datos, seguridad(11)
Métodos informáticos especiales(6)
Dirección general(5)
Área de conocimiento
Ciencias de la computación(22)
Aprendizaje automático(4)
Inteligencia artificial(4)
Ciencia ambiental(3)
Ingeniería de software(3)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(37)
ODS 8: Trabajo decente y crecimiento económico(19)
ODS 17: Alianzas para lograr los objetivos(18)
ODS 4: Educación de calidad(16)
ODS 16: Paz, justicia e instituciones sólidas(12)
Origen
google(41)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA proposal of an entity name recognition algorithm to integrate governmental databases
Conference ObjectAbstract: Based on the analysis of existing name recognition techniques, an improvement in efficiency of suchPalabras claves:entity named recognition, name matching, natural language process, phonetic matching techniquesAutores:CÉSAR VILLACÍS, Delgado J., Fidel Castro, JUAN FERNANDO GALARRAGA HURTADO, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA survey on deep learning for cybersecurity: Progress, challenges, and opportunities
OtherAbstract: As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult toPalabras claves:Artificial Intelligence, Botnets, Cyber-threat, CYBERSECURITY, deep learning, Encrypted traffic analysis, intrusion detection, Machine learning, Spam filteringAutores:Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-Díaz, Wu C.Fuentes:googlescopusCharacterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus