Linked e-resources

Details

Intro
Preface
Conference Organization
Contents
A Location-Based Mobile Advertising System for Small-to-Medium Businesses
1 Introduction
2 Design
3 Implementation
4 Evaluation
4.1 Performance
4.2 Power Consumption Overhead
4.3 Overhead Analysis
5 Conclusions
Data Availability
References
Cyber Threat Intelligence Methodologies: Hunting Cyber Threats with Threat Intelligence Platforms and Deception Techniques
1 Introduction
1.1 Contributions
2 Importance and Challenges of CTI
2.1 CTI Challenges
3 CTI Methodologies

3.1 Cyber Kill Chain Model
3.2 The Diamond Model of Intrusion Analysis
3.3 MITRE ATT&CK
3.4 MITRE Shield
4 Threat Intelligence Platform (TIP)
4.1 T-Pot: Platform Based on Deception Techniques
5 Experimentation and Results
5.1 Case Study
6 Conclusions
References
Probabilistic Update Policy to Deal with Bandits for Staged Problems Applied to Cases
1 Introduction
2 Multi-Armed Bandit Problem
3 The Problem of Dynamic Cases
4 Model
5 Exploitation and Exploration
6 Algorithmic Implementation of the Model
7 Numerical Experiments

8 Adaptation of the CMMN Model
9 Conclusions
Bibliography
Virtual Job Expo: A Practical Approach to Virtual Reality in Different Development Engines
1 Introduction
2 Hardware and Software Needed for Virtual Reality
3 A-Frame
4 Implementation of 3D
4.1 Architecture
4.2 Physics
4.3 Electronics
4.4 Multimedia
5 Virtual Experience
6 Unity 3D
7 A-Frame vs. Unity
8 Conclusions
9 Remarks
References
Towards the Comprehensive Detection of Fake News in Socio-digital Media in Mexico with Machine Learning
1 Introduction
2 Literature Review

3 Proposed Method
4 Development Phases
5 Conclusion
References
Virtual Reality Training Simulation for Controlled Land Unmanned Vehicle: A Feasibility Model
1 Introduction
2 Method
2.1 Assignment Phase
2.1.1 2D Unity Requirements for the Simulator
2.1.2 CAD Requirements for the Simulator
2.1.3 Unity Editor Requirements
2.2 Analysis Phase
2.3 Creation Phase
2.3.1 CAD Design
2.3.2 Blender
2.3.3 Unity Editor 2D
2.3.4 Unity Editor
3 Testing
4 Conclusions
References
Data-Driven Cyber Threat Intelligence: A Survey of MexicanTerritory

1 Introduction
1.1 Contributions
2 Current State of Cybersecurity in Mexico
2.1 Cybercrime in Mexico
2.2 Cybersecurity Initiatives in Mexico
2.3 Cybersecurity in the Mexican Financial System
3 Cyber Threat Intelligence
3.1 CTI Processes and Methodology
3.2 CTI Mexico Feeds
4 Conclusion
4.1 Challenges and Future Work
References
Fusion of Digital Mammography with High-Resolution Breast PET: An Application to Breast Imaging
1 Introduction
2 Breast Cancer Screening
3 Breast Imaging Technologies
3.1 Mammography
3.2 High-Resolution Breast PET

Browse Subjects

Show more subjects...

Statistics

from
to
Export