Mostrando 10 resultados de: 43
Filtros aplicados
Publisher
Communications in Computer and Information Science(7)
Advances in Intelligent Systems and Computing(3)
Lecture Notes in Networks and Systems(3)
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(2)
Electronics (Switzerland)(2)
Área temáticas
Ciencias de la computación(21)
Funcionamiento de bibliotecas y archivos(11)
Programación informática, programas, datos, seguridad(11)
Métodos informáticos especiales(6)
Dirección general(5)
Área de conocimiento
Ciencias de la computación(22)
Aprendizaje automático(4)
Inteligencia artificial(4)
Ciencia ambiental(3)
Ingeniería de software(3)
Origen
google(41)
Characterizing phishing attacks using natural language processing
Conference ObjectAbstract: Currently, there are many ways that phishing attacks placed people and businesses at risk. In the ecPalabras claves:Mental model, Natural Language processing, PhishingAutores:Gustavo Ernesto Navas Ruilova, Jhonathan Herrera, María Fernanda Cazares, Roberto Omar Andrade, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusComparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn emulation of VoD services using virtual network environments
ArticleAbstract: Virtualization platforms are a viable alternative for the implementation of IP network experimentatiPalabras claves:Emulation, Performance measurement, traffic monitoring, Video streaming, VirtualizationAutores:López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Pbkp_rediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a pbkp_rediction model that prevents phishPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA methodological proposal concerning to the management of information security in Industrial Control Systems
Conference ObjectAbstract: The most recent international reports of security issues documented a growing number of cybernetic aPalabras claves:Automation, DCS, Industrial Control Systems, information security, ISMS, ISO 27000, NIST, PLC, ScadaAutores:Fabián Bustamante, Paul Diaz, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus