Search
Now showing items 11-20 of 24
Is It Intelligent? A Systematic Review of Intelligence in the Most Cited Papers in IoT
(Springer, 2021)
Acceso restringido
Artificial intelligence is a buzz word and even more when its accomplishments have challenged our intelligence. However, what is intelligence? Is there a consensus in its meaning for researchers and professionals? Is it ...
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic Professionals, 2020)
Acceso abierto
In the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter
(Science and Information Organization, 2020)
Acceso abierto
Cyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
Software Components of an IoT Monitoring Platform in Google Cloud Platform: A Descriptive Research and an Architectural Proposal
(Springer, 2020)
Acceso restringido
As software engineers, it is not an easy task to build a software solution that customers consider easy to use, cost-benefit balanced, secured, high available and prepared for high demand. There are many solutions for ...
Dimensionality reduction via an orthogonal autoencoder approach for hyperspectral image classification
(The International Society for Photogrammetry and Remote Sensing, 2020)
Acceso abierto
Nowadays, the increasing amount of information provided by hyperspectral sensors requires optimal solutions to ease the subsequent analysis of the produced data. A common issue in this matter relates to the hyperspectral ...