Search Results - "Macas, Mayra"
-
1
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-07-2022)“…As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult to effectively monitor the produced volume of data, its…”
Get full text
Journal Article -
2
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Published in Expert systems with applications (15-03-2024)“…Over the last few years, the adoption of machine learning in a wide range of domains has been remarkable. Deep learning, in particular, has been extensively…”
Get full text
Journal Article -
3
Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
Published in Science China. Information sciences (01-08-2022)Get full text
Journal Article -
4
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Published in 2020 IEEE Latin-American Conference on Communications (LATINCOM) (18-11-2020)“…As the number of cyber-attacks is increasing, cyber-security is evolving to a key concern for any business. Artificial Intelligence (AI) and Machine Learning…”
Get full text
Conference Proceeding -
5
An Unsupervised Framework for Anomaly Detection in a Water Treatment System
Published in 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) (01-12-2019)“…Current Cyber-Physical Systems (CPSs) are sophisticated, complex, and equipped with networked sensors and actuators. As such, they have become further exposed…”
Get full text
Conference Proceeding -
6
An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems
Published 03-05-2024“…Anomaly detection is critical for the secure and reliable operation of industrial control systems. As our reliance on such complex cyber-physical systems…”
Get full text
Journal Article -
7
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Published 04-12-2020“…As the number of cyber-attacks is increasing, cybersecurity is evolving to a key concern for any business. Artificial Intelligence (AI) and Machine Learning…”
Get full text
Journal Article -
8
NORMAS DE CONTROL CONTABLE: OPERACIÓN IMPRESCINDIBLE EN LA GESTIÓN EMPRESARIAL: UN CASO ECUATORIANO
Published in Universidad y sociedad (Cienfuegos) (01-09-2017)“…El control contable de una empresa resulta de suma importancia, ya que permite el registro de todas las operaciones, proporcionando información confiable y…”
Get full text
Journal Article -
9
Human and Cognitive Factors involved in Phishing Detection. A Literature Review
Published in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) (24-07-2023)“…Human and cognitive factors considerably influence social engineering attacks. Cybercriminals take advantage of the innocence, carelessness, stress, lack of…”
Get full text
Conference Proceeding -
10
Data Mining model in the discovery of trends and patterns of intruder attacks on the data network as a public-sector innovation
Published in 2017 Fourth International Conference on eDemocracy & eGovernment (ICEDEG) (01-04-2017)“…Innovation in the public-sector refers to the development of important improvements in the public administration and their corresponding services. One of such…”
Get full text
Conference Proceeding