Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021(1)
Advances in Intelligent Systems and Computing(1)
CMES - Computer Modeling in Engineering and Sciences(1)
Lecture Notes in Networks and Systems(1)
Smart Innovation, Systems and Technologies(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Criminología(2)
Programación informática, programas, datos, seguridad(2)
Dirección general(1)
Física aplicada(1)
Área de conocimiento
Ciencias de la computación(4)
Aprendizaje automático(1)
Cognición(1)
Inteligencia artificial(1)
Origen
google(1)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusHybrid security assessment methodology for web applications
ArticleAbstract: This study presents a methodology to evaluate and prevent security vulnerabilities issues for web apPalabras claves:Black Box, Dynamic application security testing, Interactive application security testing, Security analysis, Security Vulnerability, Static application security testing, Weakness, WEB APPLICATIONS, White boxAutores:Higuera J.B., Higuera J.R.B., Magreñán A.A., Roddy A. Correa, Sánchez-Rubio M., Sicilia J.A.Fuentes:scopusMalware Security Evasion Techniques: An Original Keylogger Implementation
Conference ObjectAbstract: The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 1Palabras claves:Evasion techniques, Keylogger, MalwareAutores:CARLOS ANDRES ESTRADA VASQUEZ, Cuervo M.C., Royo Á.A., Sánchez-Rubio M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusSocial engineering attacks: A systematic mapping study
Conference ObjectAbstract: Social engineering has become the most prominent attack since human beings are the weakest link in tPalabras claves:Cyber-attacks, security, social engineeringAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Johanna Villacís, Marco J. Pintag, Roberto Omar Andrade, Ron M., Sánchez-Rubio M., Walter FuertesFuentes:scopus