Mostrando 10 resultados de: 10
Filtros aplicados
Publisher
Annales des Telecommunications/Annals of Telecommunications(2)
IEEE Access(2)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
2021 IEEE 18th Annual Consumer Communications and Networking Conference, CCNC 2021(1)
Internet of Things(1)
Área temáticas
Ciencias de la computación(6)
Funcionamiento de bibliotecas y archivos(3)
Física aplicada(2)
Interacción social(2)
Métodos informáticos especiales(2)
Área de conocimiento
Ciencias de la computación(6)
Análisis de datos(1)
Aprendizaje automático(1)
Big data(1)
Comunicación(1)
Objetivos de Desarrollo Sostenible
ODS 16: Paz, justicia e instituciones sólidas(7)
ODS 9: Industria, innovación e infraestructura(7)
ODS 4: Educación de calidad(5)
ODS 17: Alianzas para lograr los objetivos(3)
ODS 11: Ciudades y comunidades sostenibles(2)
Origen
scopus(10)
A Comprehensive Study of the IoT Cybersecurity in Smart Cities
ArticleAbstract: Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud ComPalabras claves:Bayesian network, CYBERSECURITY, IOT, Maturity model, Risk Assessment, smart cityAutores:Iván Ortiz-Garcés, Luis Tello-Oquendo, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusGenetic expression in biological systems: A digital communication perspective
OtherAbstract: The transcription and translation of Deoxyribonucleic Acid (DNA) involve the processing of genetic iPalabras claves:biological communication, DIGITAL COMMUNICATION, DNA, Genetic expression, proteins, RNAAutores:César Palacios Arias, Deysi Inca, Leonardo Rentería, Leonardo Renteria Bustamante, Luis Tello-OquendoFuentes:googlescopusExperimental demonstration for indoor localization based on AoA of bluetooth 5.1 using software defined radio
Conference ObjectAbstract: The new direction-finding feature incorporated in version 5.1 of the Bluetooth Core Specification acPalabras claves:angle of arrival, Bluetooth low energy, indoor localization, software defined radioAutores:Dr. Carlos Ramiro Peñafiel-Ojeda, Fabricio A. Toasa, Giovanny Cuzco, Luis Tello-OquendoFuentes:googlescopusInformation Security Management Frameworks in Higher Education Institutions: An Overview
Conference ObjectAbstract: An overview of academic articles focused on information security management (ISM) in higher educatioPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel López, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusInformation security management frameworks and strategies in higher education institutions: a systematic review
ArticleAbstract: Effective information security management (ISM) practices to protect the information assets of organPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel Lopez-Fonseca, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusIntegration of AI and IoT Approaches for Evaluating Cybersecurity Risk on Smart City
Book PartAbstract: Cities have adopted the smart city model based on decision-making to maintain their sustainability aPalabras claves:Bayesian network, DIGITAL TWIN, IOT, Risk analysis, smart cityAutores:Iván Ortiz, Luis Tello-Oquendo, Miguel Flores, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusUnderstanding cyberbullying as an information security attack—life cycle modeling
ArticleAbstract: Nowadays, cyberbullying cases are more common due to free access to technological resources. StudiesPalabras claves:APT, CYBERBULLYING, pattern behavior, social engineeringAutores:Alexandra Macas, Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Xavier Zambrano Rodríguez, Patricio ZambranoFuentes:googlescopusOn the modeling of cyber-attacks associated with social engineering: A parental control prototype
ArticleAbstract: Nowadays, the psychological techniques used to harass, intimidate, threaten, steal information are mPalabras claves:APT, bullying, Cyber-attack, Grooming, pattern behavior, social engineering, topic modelAutores:Ángel Yánez, Jenny Torres, Luis Tello-Oquendo, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Velásquez L.Fuentes:googlescopus