Mostrando 5 resultados de: 5
Publisher
25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021(1)
Advances in Intelligent Systems and Computing(1)
CMES - Computer Modeling in Engineering and Sciences(1)
Lecture Notes in Networks and Systems(1)
Smart Innovation, Systems and Technologies(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Criminología(2)
Programación informática, programas, datos, seguridad(2)
Dirección general(1)
Física aplicada(1)
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Conference ObjectAbstract: Phishing is the technique by which the attacker tries to obtain confidential information from the usPalabras claves:CYBERSECURITY, deep learning, Machine learning, Phishing, social engineeringAutores:Eduardo Benavides-Astudillo, Sánchez-Rubio M., Sandra Sanchez-Gordon, Walter FuertesFuentes:scopusA Training Web Platform to Improve Cognitive Skills for Phishing Attacks Detection
Conference ObjectAbstract: Attackers adapt their attacks to be more effective based on exploiting technical and human vulnerabiPalabras claves:cognitive security, Cyberattacks, Decision-making, PhishingAutores:Diana Arévalo, María Fernanda Cazares, Roberto Omar Andrade, Sánchez-Rubio M., Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusHybrid security assessment methodology for web applications
ArticleAbstract: This study presents a methodology to evaluate and prevent security vulnerabilities issues for web apPalabras claves:Black Box, Dynamic application security testing, Interactive application security testing, Security analysis, Security Vulnerability, Static application security testing, Weakness, WEB APPLICATIONS, White boxAutores:Higuera J.B., Higuera J.R.B., Magreñán A.A., Roddy A. Correa, Sánchez-Rubio M., Sicilia J.A.Fuentes:scopusMalware Security Evasion Techniques: An Original Keylogger Implementation
Conference ObjectAbstract: The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 1Palabras claves:Evasion techniques, Keylogger, MalwareAutores:CARLOS ANDRES ESTRADA VASQUEZ, Cuervo M.C., Royo Á.A., Sánchez-Rubio M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusSocial engineering attacks: A systematic mapping study
Conference ObjectAbstract: Social engineering has become the most prominent attack since human beings are the weakest link in tPalabras claves:Cyber-attacks, security, social engineeringAutores:Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Johanna Villacís, Marco J. Pintag, Roberto Omar Andrade, Ron M., Sánchez-Rubio M., Walter FuertesFuentes:scopus