
Lopez V.
14
Coauthors
5
Documentos
Volumen de publicaciones por año
Cargando gráfico
Año de publicación | Num. Publicaciones |
---|---|
2014 | 2 |
2016 | 1 |
2017 | 2 |
Publicaciones por áreas de conocimiento
Cargando gráfico
Área de conocimiento | Num. Publicaciones |
---|---|
Algoritmo | 4 |
Ciencias de la computación | 4 |
Red neuronal artificial | 1 |
Toma de decisiones | 1 |
Inteligencia artificial | 1 |
Publicaciones por áreas temáticas
Cargando gráfico
Área temática | Num. Publicaciones |
---|---|
Programación informática, programas, datos, seguridad | 4 |
Funcionamiento de bibliotecas y archivos | 2 |
Métodos informáticos especiales | 1 |
Física aplicada | 1 |
Sistemas | 1 |
Dirección general | 1 |
Principales fuentes de datos
Origen | Num. Publicaciones |
---|---|
Scopus | 5 |
Google Scholar | 3 |
RRAAE | 0 |
Cargando gráfico
Coautores destacados por número de publicaciones
Coautor | Num. Publicaciones |
---|---|
Cesar Guevara | 5 |
Santos M. | 5 |
César Byron Guevara Maldonado | 3 |
Martin J.A. | 1 |
Cargando gráfico
Top Keywords
Cargando gráfico
Publicaciones del autor
Negative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection
ArticleAbstract: In this paper an algorithm for detecting anomalous behavior on computer systems is proposed. The worPalabras claves:Anomaly detection, Behavior Profile, Computer Systems, Knuth Morris Pratt algorithm, Negative SelectionAutores:Cesar Guevara, Lopez V., Santos M.Fuentes:scopusTraining strategy to improve the efficiency of an intelligent detection system
Conference ObjectAbstract: Detection systems of computer accesses are essential for information security. In this article we prPalabras claves:Autores:Cesar Guevara, Lopez V., Santos M.Fuentes:scopusData leakage detection algorithm based on task sequences and probabilities
ArticleAbstract: In this paper we propose a novel algorithm to detect anomalous user behaviour in computer sessions.Palabras claves:Anomaly detection, Computer user behaviour, DATA LEAKAGE, Knowledge-based decision system, Markov chainsAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Santos M.Fuentes:googlescopusIntrusion detection with neural networks based on knowledge extraction by decision tree
Conference ObjectAbstract: Detection of intruders or unauthorized access to computers has always been critical when dealing witPalabras claves:Behavioral profile, decision tree, intrusion detection, Neural networks, pattern recognition, securityAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Santos M.Fuentes:googlescopusReaching a consensus on access detection by a decision system
Conference ObjectAbstract: Classification techniques based on Artificial Intelligence are computational tools that have been apPalabras claves:Artificial Intelligence, Decision Trees, heuristic methodologies, intrusion detection (IDS), Naïve Bayes, supervised classifying system UCSAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Martin J.A., Santos M.Fuentes:googlescopus