Buscar
Mostrando ítems 1-10 de 44
Virus, a whole case, but not lostVirus informáticos, todo un caso, pero no perdido
(Universidad Autónoma de Tamaulipas, 2010)
IoT Honeynet com Emulação da Internet
(Universidade Federal de São CarlosUFSCarPrograma de Pós-Graduação em Ciência da Computação - PPGCCCâmpus São Carlos, 2019-02-25)
This work argues that the growth in numbers of IoT (Internet of Things) in our lives (eg Amazon Echo, cameras, etc.), as well as their increasing computing power, arouses the interest of hackers and consequently, their ...
DeepMAL - Deep learning models for malware traffic detection and classification.
(Springer, 2021)
Robust network security systems are essential to prevent and mitigate the harming effects of the ever-growing occurrence of network attacks. In recent years, machine learning-based systems have gain popularity for network ...
Estado del arte utilizando mapeo sistemático para las técnicas de análisis de malware en android
(2021-11)
Malware attacks go to Android are a global prob lem, so that to prevent attacks on mobile devices, some techniques
have been proposed to study the differents types of malicious
programs. In this research, a state of the ...
CybercrimesDelitos Informáticos
(Pontificia Universidad Católica del Perú, 2014)
Los sistemas operativo comerciales y Opensource sobre evitar las amenazas en la ciberseguridad para los usuarios.
(Babahoyo: UTB-FAFI. 2022, 2022)
Delitos InformáticosCybercrimes
(Pontificia Universidad Católica del PerúPE, 2018)
Avaliação do impacto de ataques DDoS e Malware: uma abordagem baseada em árvore de ataque
(Universidade Federal de PernambucoUFPEBrasilPrograma de Pos Graduacao em Ciencia da Computacao, 2019)