Mostrando 9 resultados de: 9
Filtros aplicados
Publisher
Annales des Telecommunications/Annals of Telecommunications(2)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
2019 6th International Conference on eDemocracy and eGovernment, ICEDEG 2019(1)
ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems(1)
IEEE Access(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(4)
Ciencias de la computación(3)
Interacción social(2)
Programación informática, programas, datos, seguridad(2)
Bioquímica(1)
Área de conocimiento
Ciencias de la computación(4)
Aprendizaje automático(1)
Biotecnología(1)
Educación superior(1)
Psicología social(1)
A brief review on DNA storage, compression, and digitalization
ReviewAbstract: Deoxyribonucleic acid (DNA) comprises four nucleotides and twenty amino acids (a combination of nuclPalabras claves:COMPRESSION, Digital information and representation, DNA, Storage mediumAutores:Deysi Inca, Gonzalo Samaniego Erazo, Ivone Santillán, Luis Tello-Oquendo, Nakano T., Rushdi A., Shirazi A.Z., Yesenia CevallosFuentes:scopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusInformation Security Management Frameworks in Higher Education Institutions: An Overview
Conference ObjectAbstract: An overview of academic articles focused on information security management (ISM) in higher educatioPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel López, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusInformation security management frameworks and strategies in higher education institutions: a systematic review
ArticleAbstract: Effective information security management (ISM) practices to protect the information assets of organPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel Lopez-Fonseca, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusQuality evaluation processes and its impulse to digital transformation in ecuadorian universities
Conference ObjectAbstract: Information and communication technologies (ICTs)affect the different processes universities developPalabras claves:Digital transformation, higher education, Quality-assuranceAutores:César Palacios Arias, Deysi Inca, Leonardo Rentería, Leonardo Renteria Bustamante, Luis Tello-Oquendo, Yesenia CevallosFuentes:scopusOn the efficient digital code representation in DNA-based data storage
Conference ObjectAbstract: Deoxyribonucleic acid (DNA), the life molecule, is composed of four nucleotides: Adenine, Guanine, CPalabras claves:bio-host, COMPRESSION, digital codes, digital communication systems, DNA, Storage mediumAutores:Deysi Inca, Gomez G.A., Gonzalo Samaniego Erazo, Ivone Santillán, Luis Tello-Oquendo, Shirazi A.Z., Yesenia CevallosFuentes:scopusOn the modeling of cyber-attacks associated with social engineering: A parental control prototype
ArticleAbstract: Nowadays, the psychological techniques used to harass, intimidate, threaten, steal information are mPalabras claves:APT, bullying, Cyber-attack, Grooming, pattern behavior, social engineering, topic modelAutores:Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Velásquez L.Fuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusUnderstanding cyberbullying as an information security attack—life cycle modeling
ArticleAbstract: Nowadays, cyberbullying cases are more common due to free access to technological resources. StudiesPalabras claves:APT, CYBERBULLYING, pattern behavior, social engineeringAutores:Alexandra Macas, Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Xavier Zambrano Rodríguez, Patricio ZambranoFuentes:googlescopus