Now showing items 1-7 of 7

    • A Comparison of Authentication Methods via Keystroke Dynamics 

      Lo, Aron; Ayma-Quirita, Victor-Hugo; Gutiérrez-Cárdenas, Juan-Manuel (IEEEUS, 2020)
      Acceso restringido
      Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
    • Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics 

      Huancayo-Ramos, Katherinne-Shirley (Universidad de LimaPerú, 2020)
      Acceso abierto
      Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of ...
    • Comparación de técnicas de machine learning para detección de sitios web de phishing 

      Moncada-Vargas, Andrés-Eduardo (Universidad de LimaPE, 2020)
      Acceso abierto
      El phishing es el robo de datos personales a través de páginas web falsas. La víctima de este robo es dirigida a esta página falsa, donde se le solicita ingresar sus datos para validar su identidad. Es en ese momento que ...
    • Gestión de seguridad en redes corporativas 

      García-Pagan, Juan-José (Universidad de LimaPerú, 2007)
      Acceso abierto
      Este artículo tiene como objetivo incentivar al lector para que tome conciencia de la impor tancia de aplicar conceptos de seguridad en sus redes o sistemas informáticos. Para ello, Telefónica del Perú se apoya en cuatro ...
    • Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features 

      Maestre-Vidal, Jorge; Sotelo-Monge, Marco-Antonio (NLM (Medline)Suiza, 2020)
      Acceso abierto
      In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
    • Steganography and Data Loss Prevention: An overlooked risk? 

      Gutiérrez-Cárdenas, Juan-Manuel (Science and Engineering Research Support SocietyCorea del Sur, 2017)
      Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding ...
    • Systematic mapping of the literature on Secure Software Development 

      Nina-Hanco, Hernán; Pow-Sang, Jose Antonio; Villavicencio, Monica (IEEEUS, 2021)
      Acceso abierto
      The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ...