Mostrando 7 resultados de: 7
Filtros aplicados
Subtipo de publicación
Conference Object(7)
Área temáticas
Ciencias de la computación(3)
Procesos sociales(2)
Programación informática, programas, datos, seguridad(2)
Artes(1)
Criminología(1)
Comparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages
Conference ObjectAbstract: Phishing webpages are a type of cyber-attack whose objective is to try to deceive people through fraPalabras claves:deep learning, HTML code content, Phishing, Text content, WEB SCRAPINGAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Sandra Sanchez-Gordon, VERONICA ISABEL MARTINEZ CEPEDA, Verónica Martínez-Cepeda, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAnalysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
Conference ObjectAbstract: One of the most effective attacks on cybersecurity is Social Engineering, in which the attacker decePalabras claves:CYBERSECURITY, Risk, social engineering, User behavior, vulnerabilitiesAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Luis Silva-Ordoñez, Rodrigo Vladimir Bastidas-Chalán, Ronny Rocohano-Rámos, Sandra Sanchez-Gordon, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusDevelopment Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCrowdsensing and Image Processing as a Method for Analysis and Population Count Based on the Classification and Validation of Multimedia
Conference ObjectAbstract: The growth of cities and the advancement of technology demands the development of solutions that canPalabras claves:Analysis, classification, CrowdSensing, Data validation, Georeferencing, image analysis, Population counting, sensor dataAutores:Alexander Mejía, Bryan Oscullo, Luis Tello-Oquendo, Tapia Freddy, Walter Marcelo Fuertes-DíazFuentes:scopusEarly Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing
Conference ObjectAbstract: During these last years, the use of mobile and Web technologies around the world has reached an incrPalabras claves:CLOUD COMPUTING, GEOLOCATION, Global Positioning System, Location based services, MOBILE DEVICESAutores:Adrián Mena, Diego Terán, Graciela Guerrero Idrovo, Joel Rivera, Tapia Freddy, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusInformation Security at Higher Education Institutions: A Systematic Literature Review
Conference ObjectAbstract: Information is considered an essential asset in Higher Education Institutions (IES) either public orPalabras claves:Data Protection, Higher education institutions, information security, Security measures, Security techniquesAutores:Daisy Imbaquingo-Esparza, David Molina, Javier F. Díaz, Mario Ron Egas, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus