Results 51 to 60 of about 18,702 (208)

Utilising Explainable AI to Enhance Real‐Time Student Performance Prediction in Educational Serious Games

open access: yesExpert Systems, Volume 42, Issue 3, March 2025.
ABSTRACT In recent years, serious games (SGs) have emerged as a powerful tool in education by combining pedagogy and entertainment, facilitating the acquisition of knowledge and skills in engaging environments. SGs enable the collection of valuable interaction data from students, allowing for the analysis of student performance, with artificial ...
Manuel J. Gomez   +4 more
wiley   +1 more source

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

open access: yesWireless Communications and Mobile Computing, Volume 2018, Issue 1, 2018., 2018
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life.
Ines Goicoechea-Telleria   +4 more
wiley   +1 more source

Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks

open access: yesInformatics
The Internet of Things (IoT) presents great potential in various fields such as home automation, healthcare, and industry, among others, but its infrastructure, the use of open source code, and lack of software updates make it vulnerable to cyberattacks ...
Fray L. Becerra-Suarez   +3 more
doaj   +1 more source

Ciberseguridad para la operación centralizada y distribuida de generación de energía eléctrica en ISAGEN

open access: yesIngeniería y Ciencia, 2020
Este artículo presenta repuesta a los retos de ciberseguridad enfrentados para la centralización del control de generación de energía eléctrica en la segunda empresa de este tipo en Colombia.
Diego Zuluaga
doaj   +1 more source

Conceptos de ciberseguridad

open access: yes, 2022
Esta presentación explica los 3 pilares de la ciberseguridad: integridad, confidencialidad y disponibilidad, además de los conceptos de autenticación, autorización y accounting. Igualmente, en esta presentación se incluyen diferentes actividades de análisis, siendo una de ellas la revisión del reporte de fugas de datos de Verizon del 2021, con el fin ...
openaire   +1 more source

El big data en la ciberdefensa y la ciberseguridad nacional versus el derecho a la privacidad del ciudadano colombiano [PDF]

open access: yes, 2018
21 p.El presente capítulo tiene por objeto realizar un estudio del big data en la ciberdefensa y ciberseguridad nacional vs. el derecho a la privacidad del ciudadano colombiano.
Becerra, Jairo   +5 more
core  

Improving Teacher Training Through Emotion Recognition and Data Fusion

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT The quality of education hinges on the proficiency and training of educators. Due to the importance of teacher training, the innovative platform Teacher Moments creates simulated classroom scenarios. In this scenario‐based learning, confusion is an important indicator to detect users who struggle with the simulations.
Mariano Albaladejo‐González   +4 more
wiley   +1 more source

Ciberseguridad en España: una propuesta para su gestión [PDF]

open access: yes, 2010
Las relaciones sociales, económicas y culturales dependen, cada vez más, de las tecnologías e infraestructuras de la información y comunicación (ciberespacio), haciendo necesario articular un sistema nacional de seguridad (ciberseguridad) que gestione ...
Fojón, José Enrique   +1 more
core  

Monte–Carlo Techniques Applied to CGH Generation Processes and Their Impact on the Image Quality Obtained

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
Partial Monte–Carlo Sampling (PMCS) techniques for CGH generation are presented, integrating them in the whole process of generating a CGH for a synthetic 3D scene, from design to rendering. Measurements of image quality indicate that it is possible to use a fraction of rays without any perceived loss of quality ABSTRACT Computer graphics aim to create
Juan A. Magallón   +2 more
wiley   +1 more source

SISTEMA DE DETECCIÓN Y RECONOCIMIENTO DE AMENAZAS DE CIBERSEGURIDAD EN LA NUBE

open access: yesTelemática, 2022
En la actualidad, la ciberseguridad se ha convertido en una obligación para todo proveedor de servicios. Mientras existen grupos de personas orientadas a explotar los servicios con fines malignos, otros desarrollan herramientas y mecanismos para ...
Ariel Baloira Reyes
doaj  

Home - About - Disclaimer - Privacy