Mostrando 10 resultados de: 153
Publisher
IEEE(10)
Springer International Publishing(9)
Communications in Computer and Information Science(7)
Universidad Pedagógica y Tecnológica de Colombia(5)
Springer Singapore(4)
Área temáticas
Ciencias de la computación(67)
Programación informática, programas, datos, seguridad(44)
Funcionamiento de bibliotecas y archivos(36)
Métodos informáticos especiales(22)
Dirección general(14)
Área de conocimiento
Ciencias de la computación(70)
Red informática(21)
Simulación por computadora(15)
Software(15)
Inteligencia artificial(12)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Container Orchestration Development that Optimizes the Etherpad Collaborative Editing Tool through a Novel Management System
OtherAbstract: The use of collaborative tools has notably increased recently. It is common to see distinct users thPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA Framework Based on Personality Traits to Identify Vulnerabilities to Social Engineering Attacks
Conference ObjectAbstract: Currently, all users massively use digital devices connected to the Internet. Because of this overcrPalabras claves:CYBERSECURITY, Five-Factor Model, framework, Personal trait, social engineeringAutores:Daniel Nu˜nez-Agurto, Eduardo Benavides-Astudillo, Gema Castillo-Zambrano, Germán Rodríguez-Galán, María Fernanda Cazares, Néstor Tipan-Guerrero, Walter Fuertes Díaz, Walter Marcelo Fuertes-DíazFuentes:googlescopusA New Real-Time Flight Simulator for Military Training Using Mechatronics and Cyber-Physical System Methods
OtherAbstract: So far, the aeronautical industry has developed flight simulators and space disorientation with highPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA Phishing-Attack-Detection Model Using Natural Language Processing and Deep Learning
OtherAbstract: Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages thPalabras claves:Autores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Walter Marcelo Fuertes-DíazFuentes:googleA Prediction Model to Prevent Phishing Attacks on E-Mails Using Data Mining Techniques
Conference ObjectAbstract: The current study presents a design and implementation of a prediction model that prevents phishingPalabras claves:Data Mining, pbkp_rediction model, Phishing, random forestAutores:Henry O. Cruz, HENRY OMAR CRUZ CARRILLO, Johanna Mishell Rosero, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy
OtherAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:Autores:Alyssa Krupskaia Cadena Gomez, Walter Marcelo Fuertes-DíazFuentes:googleA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusA comprehensive study about cybersecurity incident response capabilities in Ecuador
OtherAbstract: The increase of security threats and attacks in Ecuador, motivates the implementation of security inPalabras claves:Autores:Walter Marcelo Fuertes-DíazFuentes:googleA generic model for the management of virtual network environments
Conference ObjectAbstract: Currently, virtualization is a proven technology that potentially provides a great opportunity for iPalabras claves:Common Information Model, Configuration management, Modeling, Virtual network environment, VisualizationAutores:Fausto Meneses, Galán F., López De Vergara J.E., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus