Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Other(4)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Criminología(2)
Ciencias de la computación(1)
Interacción social(1)
Métodos informáticos especiales(1)
Área de conocimiento
Análisis de datos(1)
Aprendizaje automático(1)
Ciencia ambiental(1)
Ciencias de la computación(1)
Contaminación(1)
Origen
google(4)
Classification of phishing attack solutions by employing deep learning techniques: A systematic literature review
OtherAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleImpact of Social Engineering Attacks: A Literature Review
OtherAbstract: Social engineeringFuertes, Walter is the practice, which allowsArévalo, Diana attackers to obtainCaPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleMetrics and indicators of information security incident management: A systematic mapping study
OtherAbstract: The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, orPalabras claves:Autores:Alyssa Krupskaia Cadena Gomez, Walter Marcelo Fuertes-DíazFuentes:googleVisual analytics for the reduction of air pollution on real-time data derived from WSN
OtherAbstract: Nowadays, the contaminated and poor air quality that is inhaled by the city population in industrialPalabras claves:Autores:DORYS SOLEDAD QUIROZ CORRALES, Walter Marcelo Fuertes-DíazFuentes:google