Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
Annales des Telecommunications/Annals of Telecommunications(1)
ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems(1)
IEEE Access(1)
Journal of Personalized Medicine(1)
A structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusInformation Security Management Frameworks in Higher Education Institutions: An Overview
Conference ObjectAbstract: An overview of academic articles focused on information security management (ISM) in higher educatioPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel López, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusInformation security management frameworks and strategies in higher education institutions: a systematic review
ArticleAbstract: Effective information security management (ISM) practices to protect the information assets of organPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel Lopez-Fonseca, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusMetrics and Indicators of Information Security Incident Management: A Systematic Mapping Study
Conference ObjectAbstract: The number of threats and vulnerabilities has increased rapidly in recent years. For this reason, orPalabras claves:empirical study, Indicators, Key performance indicators, METRICS, Security incident management, Security incidentsAutores:Alyssa Cadena, Franklin Gualoto, Jenny Torres, Luis Tello-Oquendo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusThe application of deep convolutional neural networks to brain cancer images: A survey
ReviewAbstract: In recent years, improved deep learning techniques have been applied to biomedical image processingPalabras claves:Brain cancer, classification, convolutional neural networks, Dcnn, deep learning, histology, MRI, segmentationAutores:Deysi Inca, Fornaciari E., Gomez G.A., Luis Tello-Oquendo, McDonnell M.D., Shirazi A.Z., Yaghoobi M., Yesenia CevallosFuentes:scopus