Search Results - "Macas, Mayra"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    A survey on deep learning for cybersecurity: Progress, challenges, and opportunities by Macas, Mayra, Wu, Chunming, Fuertes, Walter

    “…As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult to effectively monitor the produced volume of data, its…”
    Get full text
    Journal Article
  2. 2

    Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems by Macas, Mayra, Wu, Chunming, Fuertes, Walter

    Published in Expert systems with applications (15-03-2024)
    “…Over the last few years, the adoption of machine learning in a wide range of domains has been remarkable. Deep learning, in particular, has been extensively…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems by Macas, Mayra, Wu, Chunming

    “…As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any business. Artificial Intelligence (AI) and Machine Learning…”
    Get full text
    Conference Proceeding
  5. 5

    An Unsupervised Framework for Anomaly Detection in a Water Treatment System by Macas, Mayra, Wu, Chunming

    “…Current Cyber-Physical Systems (CPSs) are sophisticated, complex, and equipped with networked sensors and actuators. As such, they have become further exposed…”
    Get full text
    Conference Proceeding
  6. 6

    An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems by Macas, Mayra, Wu, Chunming, Fuertes, Walter

    Published 03-05-2024
    “…Anomaly detection is critical for the secure and reliable operation of industrial control systems. As our reliance on such complex cyber-physical systems…”
    Get full text
    Journal Article
  7. 7

    Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems by Macas, Mayra, Wu, Chunming

    Published 04-12-2020
    “…As the number of cyber-attacks is increasing, cybersecurity is evolving to a key concern for any business. Artificial Intelligence (AI) and Machine Learning…”
    Get full text
    Journal Article
  8. 8

    NORMAS DE CONTROL CONTABLE: OPERACIÓN IMPRESCINDIBLE EN LA GESTIÓN EMPRESARIAL: UN CASO ECUATORIANO by Navarro Silva, Otmara, López Macas, Mayra Elizabeth, Pérez Espinosa, María José

    Published in Universidad y sociedad (Cienfuegos) (01-09-2017)
    “…El control contable de una empresa resulta de suma importancia, ya que permite el registro de todas las operaciones, proporcionando información confiable y…”
    Get full text
    Journal Article
  9. 9

    Human and Cognitive Factors involved in Phishing Detection. A Literature Review by Arevalo, Diana, Valarezo, Daria, Fuertes, Walter, Fernanda Cazares, Maria, Andrade, Roberto O., Macas, Mayra

    “…Human and cognitive factors considerably influence social engineering attacks. Cybercriminals take advantage of the innocence, carelessness, stress, lack of…”
    Get full text
    Conference Proceeding
  10. 10

    Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation by Macas, Mayra, Lagla, Lidia, Fuertes, Walter, Guerrero, Graciela, Toulkeridis, Theofilos

    “…Innovation in the public-sector refers to the development of important improvements in the public administration and their corresponding services. One of such…”
    Get full text
    Conference Proceeding