• español
    • English
  • Policies
  • English 
    • español
    • English
  • Login
Search 
  •   Repositorio Institucional ULima
  • Artículos científicos
  • Ingeniería de Sistemas
  • Search
  •   Repositorio Institucional ULima
  • Artículos científicos
  • Ingeniería de Sistemas
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-6 of 6

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Systematic mapping of the literature on Secure Software Development 

Nina Hanco, Hernán; Pow Sang, Jose Antonio; Villavicencio, Monica (IEEE, 2021)
Acceso abierto
The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ...
Thumbnail

Comparación de técnicas de machine learning para detección de sitios web de phishing 

Moncada Vargas, Andrés Eduardo (Universidad de Lima, 2020)
Acceso abierto
El phishing es el robo de datos personales a través de páginas web falsas. La víctima de este robo es dirigida a esta página falsa, donde se le solicita ingresar sus datos para validar su identidad. Es en ese momento que ...
Thumbnail

Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics 

Huancayo Ramos, Katherinne Shirley; Sotelo Monge, Marco Antonio; Maestre Vidal, Jorge (Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
Thumbnail

EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats 

Maestre Vidal, Jorge; Sotelo Monge, Marco Antonio; Martínez Monterrubio, Sergio Mauricio (Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
Thumbnail

Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features 

Maestre Vidal, Jorge; Sotelo Monge, Marco Antonio (NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
Thumbnail

A Comparison of Authentication Methods via Keystroke Dynamics 

Lo, Aron; Ayma Quirita, Victor Hugo; Gutiérrez Cárdenas, Juan Manuel (IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...

Contacto: repositorio@ulima.edu.pe

Todos los derechos reservados. Diseñado por Chimera Software
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsAdvisorsAuthors UlimaArea / Line of researchCategory / SubcategoryDocument typeThis CollectionBy Issue DateAuthorsTitlesSubjectsAdvisorsAuthors UlimaArea / Line of researchCategory / SubcategoryDocument type

My Account

LoginRegister

Discover

Other ContributorSotelo Monge, Marco Antonio (3)Gutiérrez Cárdenas, Juan Manuel (1)Huancayo Ramos, Katherinne Shirley (1)Lo, Aron (1)Moncada Vargas, Andrés Eduardo (1)Category / SubcategoryIngeniería de sistemas / Diseño y métodos (4)Ingeniería de sistemas / Software (1)Pendiente / Pendiente (1)Document typeArtículo en Scopus (3)Artículo de conferencia en Scopus (1)Artículo en DOAJ (1)Artículo en Scopus y Web of Science (SCIE) (1)Subject
Seguridad informática (6)
Computer security (4)Data protection (3)Protección de datos (2)Biometry (1)Date2021 (1)2020 (5)

Contacto: repositorio@ulima.edu.pe

Todos los derechos reservados. Diseñado por Chimera Software