Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
Advances in Science, Technology and Engineering Systems(1)
Frontiers in Artificial Intelligence and Applications(1)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(1)
Analysis of the software most used by hackers to carry out penetration testing in public organizations
Conference ObjectAbstract: Currently, the software handled by hackers is the main one to tackle a series of empirical knowledgePalabras claves:HACKER, HACKING, Hacking tools, Malicious program, Public OrganizationsAutores:González R.F.P., Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis to pbkp_redict cybercrime using information technology in a globalized environment
Conference ObjectAbstract: Today, IT plays a key role in the information-intensive global economy. The application of computersPalabras claves:Data Mining, Decision trees introduction, Information Technologies, Pbkp_redictAutores:Cisnero Andrade B.E., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusA survey and an IoT cybersecurity recommendation for public and private hospitals in Ecuador
ArticleAbstract: It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluatPalabras claves:HEALTH, Information Assets, IoT Architecture, IoT Cybersecurity, Public Hospital and PrivateAutores:Joseline Roxana Neira Melendrez, Luis Neira Clemente, Máximo Giovani Tandazo EspinozaFuentes:googlescopus