Results 41 to 50 of about 18,702 (208)

Creación de sinergias entre ecosistemas de ciberseguridad locales en la Unión Europea [PDF]

open access: yes, 2019
El ISSN corresponde a la versión electrónica del documentoAl disfrutar de una conexión privilegiada con sus ecosistemas locales, las regiones europeas desempeñan un papel importante a la hora de fortalecer la industria europea de la ciberseguridad y su ...
Comisión Europea. Dirección General de Política Regional y Urbana   +1 more
core  

CyberESP: An Integrated Cybersecurity Framework for SMEs

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 9, September 2025.
ABSTRACT Cybersecurity is a critical global concern, particularly for small‐ and medium‐sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi‐automated tool to ensure Spanish SMEs' cybersecurity management.
Jose A. Calvo‐Manzano   +5 more
wiley   +1 more source

Multiclass Classification Procedure for Detecting Attacks on MQTT‐IoT Protocol

open access: yesComplexity, Volume 2019, Issue 1, 2019., 2019
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected ...
Hector Alaiz-Moreton   +6 more
wiley   +1 more source

Cibersecurity and ciberdefense: what are they and what implications do they have for home security? [PDF]

open access: yes, 2014
Se vive en una era en donde la información va de la mano junto con la tecnología. De allí que ahora la población en general puede acceder a una cantidad significativa de información en tan solo unos pocos segundos, sin importar la distancia que separe a
Vargas Vargas, Edisson Mauricio
core  

Regulating Tools for Hacking: Limitations, Challenges and Possibilities

open access: yesPolicy &Internet, Volume 17, Issue 2, June 2025.
ABSTRACT Tools developed for the purpose of unilaterally exploiting computer systems and their communications will pose a persistent policy and regulatory problem. Regulation of hacking tools to date, however, has been piecemeal, inconsistent and often incoherent.
Diarmaid Harkin, Vas Panagiotopoulos
wiley   +1 more source

Secure UAV‐Based System to Detect Small Boats Using Neural Networks

open access: yesComplexity, Volume 2019, Issue 1, 2019., 2019
This work presents a system to detect small boats (pateras) to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles (UAV) combined with a top‐performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural ...
Moisés Lodeiro-Santiago   +4 more
wiley   +1 more source

Ciberseguridad en contabilidad: protegiendo la integridad de los datos financieros en empresas comerciales

open access: yesRevista Metropolitana de Ciencias Aplicadas
El estudio analizó la ciberseguridad en empresas de comercialización en Azogues, Ecuador, evaluando la exposición a riesgos cibernéticos, medidas de mitigación y preparación ante amenazas.
Mónica Elizabeth Calle-Tenesaca   +1 more
doaj   +1 more source

An Approach Based on Recurrent Neural Networks and Interactive Visualization to Improve Explainability in AI Systems

open access: yesBig Data and Cognitive Computing, 2023
This paper investigated the importance of explainability in artificial intelligence models and its application in the context of prediction in Formula (1).
William Villegas-Ch   +2 more
doaj   +1 more source

Cibercrimen e informática forense : introducción y análisis en El Salvador [PDF]

open access: yes, 2017
En este artículo se explica la situación de cibercrimen e informática forense, la importancia e interés dado por los gobiernos alrededor del mundo a este tema y un breve análisis enfocado en El Salvador a raíz de las medidas que abarcan leyes y políticas
Guadrón Gutiérrez, Ricardo Salvador   +2 more
core  

Perfil i competències de l'analista d'informació en l'àmbit de la seguretat pública [PDF]

open access: yes, 2017
L'analista d'informació esdevé un professional necessari en els camps socials de seguretat, gestió d'emergències i prevenció de riscos per gestionar la incertesa inherent a l'àmbit mateix.
Hernández Aguilar, Gemma   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy