Mostrando ítems 1-18 de 18

    • A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America 

      Flor-Unda, Omar; Simbaña, Freddy; Larriva-Novo, Xavier; Acuña, Ángel; Tipán, Rolando; Acosta-Vargas, Patricia (Informatics, 2023)
      Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that ...
    • Aplicación para la comparación de Shodan y ZoomEye en la búsqueda de dispositivos IoT 

      Ochoa de Eguileor-López de Maturana, Gonzalo; Legarda-González, Jon (09/02/2022)
      La cantidad de dispositivos conectados a Internet aumenta de forma vertiginosa. Este hecho aporta muchos beneficios para las personas, pero también conlleva riesgos, dado que nos hace cada vez más dependientes de servicios ...
    • Ataques al protocolo de autenticación OPENID CONNECT + OAUTH2 

      Quiñonez-Murillo, Carlos Andres (07/02/2022)
      El trabajo ha realizado un análisis en profundidad de las metodologías y patrones de ataque a los protocolos de autenticación OPENID Connect con OAUTH2 en entornos de prueba que simulan implementaciones reales, así como ...
    • Cybersecurity Management in Micro, Small, and Medium Enterprises in Colombia 

      Díaz Piraquive, Flor Nancy; de Jesús Muriel-Perea, Yasser; González-Crespo, Rubén (Communications in Computer and Information Science, 2023)
      The aim of this research study is the analysis of the cybersecurity management in micro, small and medium enterprises (MSMEs or MIPYMES) in Colombia. To reach this objective, the quantitative approach methodology was used, ...
    • Development of an Intelligent Classifier Model for Denial of Service Attack Detection 

      Michelena, Álvaro; Aveleira-Mata, Jose; Jove, Esteban; Alaiz-Moretón, Héctor; Quintián, Héctor; Calvo-Rolle, José Luis (International Journal of Interactive Multimedia and Artificial Intelligence, 09/2023)
      The prevalence of Internet of Things (IoT) systems deployment is increasing across various domains, from residential to industrial settings. These systems are typically characterized by their modest computationa requirements ...
    • Evaluación y Propuesta de una Arquitectura de Correo Electrónico Seguro Basado en Blockchain 

      Piedrahita-Castillo, Diego (2022)
      El principal objetivo de esta investigación es el desarrollo de un protocolo de correo electrónico seguro aprovechando el potencial que nos brinda blockchain en aspectos de seguridad. En este trabajo se analiza el estado ...
    • “Exploit City”: Gamificación como método de adquisición de conductas seguras en la red 

      Dayekh-García, Alejandro (30/06/2021)
      “Exploit City” es una propuesta de gamificación que tiene el objetivo de dotar a preadolescentes de conocimientos y procedimientos en seguridad en la red. Los fundamentos teóricos, que sustentan su aplicación, se basan en ...
    • IDS colaborativo basado en Blockchain 

      Mínguez-Julián, Javier (19/09/2019)
      La ciberseguridad en las organizaciones es una clara necesidad en los tiempos actuales debido al creciente número de ciberataques en los últimos años. Este trabajo desarrolla una herramienta que proporciona un sistema ...
    • Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises 

      Lopez, Miguel Angel; Lombardo, Juan Manuel; López, Mabel; Alba, Carmen María; Velasco, Susana; Braojos, Manuel Alonso; Fuentes-García, Marta (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2020)
      Cyberattacks threaten continuously computer security in companies. These attacks evolve everyday, being more and more sophisticated and robust. In addition, they take advantage of security breaches in organizations and ...
    • Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec) 

      Namasudra, Suyel; González-Crespo, Rubén ; Kumar, Sathish (Computers and Electrical Engineering, 2022)
      With the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the ...
    • Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems 

      Díaz Piraquive, Flor Nancy ; Ortiz-Ruiz, Emanuel; González-Aragón, Jansen Jair; Avila-Bermeo, Harlinzo Hernan; Parada-Jaimes, Wilmer David (Springer Science and Business Media Deutschland GmbH, 2021)
      The threats in cyberspace materialize big digital security threats for any organization. New computer incidents are permanently reported, visualizing the advanced technical skills of cybercriminals and the cybersecurity ...
    • Methodology for Computer Security Incident Response Teams into IoT Strategy 

      Enciso Bernal, Alejandro ; Martinez Monterrubio, Sergio Mauricio ; Parra Puente, Javier ; González-Crespo, Rubén ; Verdú, Elena (KSII transactions on internet and information systems, 2021)
      At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ...
    • Metodología para la Implementación Segura de Tesorería de Criptomonedas en las Organizaciones 

      Alba-Rodriguez, Carlos Mario (24/12/2022)
      Alrededor del mundo existen organizaciones que han decidido afrontar el reto de innovación tecnológica que implica contar con cripto activos en su tesorería. Por tal motivo, este trabajo pretende ofrecer la metodología ...
    • New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution 

      Sabillon, Regner; Bermejo Higuera, Juan Ramón (2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings, 2023)
      This article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for ...
    • Pentesting de entornos Active Directory vulnerables 

      Temporal-Palomares, Álvaro (21/07/2021)
      Actualmente, la tecnología está experimentando un enorme crecimiento en todos los ámbitos de nuestro entorno, las organizaciones son conscientes de este crecimiento, y cada vez son más las que tratan de implantar estas ...
    • Review: machine learning techniques applied to cybersecurity 

      Martínez Torres, Javier ; Iglesias Comesaña, Carla; García-Nieto, Paulino J. (International Journal of Machine Learning and Cybernetics, 10/2019)
      Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ...
    • Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems 

      Pan, Yao; White, Jules; Schmidt, Douglas; Elhabashy, Ahmad; Sturm, Logan; Camelio, Jaime; Williams, Christopher (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated ...
    • The application of blockchain algorithms to the management of education certificates 

      Maestre, Raúl Jaime; Bermejo-Higuera, Javier; Gámez, Nádia; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio; Orcos, Lara (Evolutionary Intelligence, 2023)
      Blockchain is a new application technology in many sectors and the same is true in the world of education. Therefore, there is an increasingly emerging need to research blockchain technology, as it is still taking its first ...