ListarRESULTADOS DE INVESTIGACIÓN por tema "cybersecurity"
Mostrando ítems 1-8 de 8
-
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
(Informatics, 2023)Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that ... -
Cybersecurity Management in Micro, Small, and Medium Enterprises in Colombia
(Communications in Computer and Information Science, 2023)The aim of this research study is the analysis of the cybersecurity management in micro, small and medium enterprises (MSMEs or MIPYMES) in Colombia. To reach this objective, the quantitative approach methodology was used, ... -
Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)
(Computers and Electrical Engineering, 2022)With the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the ... -
Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems
(Springer Science and Business Media Deutschland GmbH, 2021)The threats in cyberspace materialize big digital security threats for any organization. New computer incidents are permanently reported, visualizing the advanced technical skills of cybercriminals and the cybersecurity ... -
Methodology for Computer Security Incident Response Teams into IoT Strategy
(KSII transactions on internet and information systems, 2021)At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ... -
New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution
(2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings, 2023)This article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for ... -
Review: machine learning techniques applied to cybersecurity
(International Journal of Machine Learning and Cybernetics, 10/2019)Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ... -
The application of blockchain algorithms to the management of education certificates
(Evolutionary Intelligence, 2023)Blockchain is a new application technology in many sectors and the same is true in the world of education. Therefore, there is an increasingly emerging need to research blockchain technology, as it is still taking its first ...