Results 51 to 60 of about 18,928 (207)

Ciberseguridad en España: una propuesta para su gestión [PDF]

open access: yes, 2010
Las relaciones sociales, económicas y culturales dependen, cada vez más, de las tecnologías e infraestructuras de la información y comunicación (ciberespacio), haciendo necesario articular un sistema nacional de seguridad (ciberseguridad) que gestione ...
Fojón, José Enrique   +1 more
core  

Utilising Explainable AI to Enhance Real‐Time Student Performance Prediction in Educational Serious Games

open access: yesExpert Systems, Volume 42, Issue 3, March 2025.
ABSTRACT In recent years, serious games (SGs) have emerged as a powerful tool in education by combining pedagogy and entertainment, facilitating the acquisition of knowledge and skills in engaging environments. SGs enable the collection of valuable interaction data from students, allowing for the analysis of student performance, with artificial ...
Manuel J. Gomez   +4 more
wiley   +1 more source

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

open access: yesWireless Communications and Mobile Computing, Volume 2018, Issue 1, 2018., 2018
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life.
Ines Goicoechea-Telleria   +4 more
wiley   +1 more source

Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks

open access: yesInformatics
The Internet of Things (IoT) presents great potential in various fields such as home automation, healthcare, and industry, among others, but its infrastructure, the use of open source code, and lack of software updates make it vulnerable to cyberattacks ...
Fray L. Becerra-Suarez   +3 more
doaj   +1 more source

Cibercrimen e informática forense : introducción y análisis en El Salvador [PDF]

open access: yes, 2017
En este artículo se explica la situación de cibercrimen e informática forense, la importancia e interés dado por los gobiernos alrededor del mundo a este tema y un breve análisis enfocado en El Salvador a raíz de las medidas que abarcan leyes y políticas
Guadrón Gutiérrez, Ricardo Salvador   +2 more
core  

Conceptos de ciberseguridad

open access: yes, 2022
Esta presentación explica los 3 pilares de la ciberseguridad: integridad, confidencialidad y disponibilidad, además de los conceptos de autenticación, autorización y accounting. Igualmente, en esta presentación se incluyen diferentes actividades de análisis, siendo una de ellas la revisión del reporte de fugas de datos de Verizon del 2021, con el fin ...
openaire   +1 more source

Improving Teacher Training Through Emotion Recognition and Data Fusion

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT The quality of education hinges on the proficiency and training of educators. Due to the importance of teacher training, the innovative platform Teacher Moments creates simulated classroom scenarios. In this scenario‐based learning, confusion is an important indicator to detect users who struggle with the simulations.
Mariano Albaladejo‐González   +4 more
wiley   +1 more source

El big data en la ciberdefensa y la ciberseguridad nacional versus el derecho a la privacidad del ciudadano colombiano [PDF]

open access: yes, 2018
21 p.El presente capítulo tiene por objeto realizar un estudio del big data en la ciberdefensa y ciberseguridad nacional vs. el derecho a la privacidad del ciudadano colombiano.
Becerra, Jairo   +5 more
core  

Perfil i competències de l'analista d'informació en l'àmbit de la seguretat pública [PDF]

open access: yes, 2017
L'analista d'informació esdevé un professional necessari en els camps socials de seguretat, gestió d'emergències i prevenció de riscos per gestionar la incertesa inherent a l'àmbit mateix.
Hernández Aguilar, Gemma   +1 more
core   +2 more sources

Monte–Carlo Techniques Applied to CGH Generation Processes and Their Impact on the Image Quality Obtained

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
Partial Monte–Carlo Sampling (PMCS) techniques for CGH generation are presented, integrating them in the whole process of generating a CGH for a synthetic 3D scene, from design to rendering. Measurements of image quality indicate that it is possible to use a fraction of rays without any perceived loss of quality ABSTRACT Computer graphics aim to create
Juan A. Magallón   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy