Zobrazeno 1 - 10
of 208
pro vyhledávání: '"Escamilla-Ambrosio"'
Publikováno v:
Machine Learning and Knowledge Extraction, Vol 5, Iss 4, Pp 1826-1847 (2023)
The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is propose
Externí odkaz:
https://doaj.org/article/f455497ed1744a429305bedcafcd9f09
Publikováno v:
In Journal of Industrial Information Integration March 2024 38
Autor:
Leon Tabaro, Jean Marie Vianney Kinani, Alberto Jorge Rosales-Silva, Julio César Salgado-Ramírez, Dante Mújica-Vargas, Ponciano Jorge Escamilla-Ambrosio, Eduardo Ramos-Díaz
Publikováno v:
Information, Vol 15, Iss 8, p 473 (2024)
In this work, we explore the application of deep reinforcement learning (DRL) to algorithmic trading. While algorithmic trading is focused on using computer algorithms to automate a predefined trading strategy, in this work, we train a Double Deep Q-
Externí odkaz:
https://doaj.org/article/3547b98b3acc4e129149b0d00547a585
Publikováno v:
IEEE Access, Vol 11, Pp 121724-121738 (2023)
Most of the time, cybercriminals look for new ways to bypass security controls by improving their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting payments. Malware is called a ransomware. Recently, they have deman
Externí odkaz:
https://doaj.org/article/e6d98a17c8be487ea8b79b470c98a8dd
Autor:
Armando Adrián Miranda-González, Alberto Jorge Rosales-Silva, Dante Mújica-Vargas, Ponciano Jorge Escamilla-Ambrosio, Francisco Javier Gallegos-Funes, Jean Marie Vianney-Kinani, Erick Velázquez-Lozada, Luis Manuel Pérez-Hernández, Lucero Verónica Lozano-Vázquez
Publikováno v:
Entropy, Vol 25, Iss 10, p 1467 (2023)
Noise suppression algorithms have been used in various tasks such as computer vision, industrial inspection, and video surveillance, among others. The robust image processing systems need to be fed with images closer to a real scene; however, sometim
Externí odkaz:
https://doaj.org/article/f8ac472021d64202a7e51077f13a6b85
Autor:
Tabaro, Leon1 (AUTHOR) leontabaro@gmail.com, Kinani, Jean Marie Vianney2 (AUTHOR) leontabaro@gmail.com, Rosales-Silva, Alberto Jorge3 (AUTHOR) arosaless@ipn.mx, Salgado-Ramírez, Julio César4 (AUTHOR) csalgado@upp.edu.mx, Mújica-Vargas, Dante5 (AUTHOR) dante.mv@cenidet.tecnm.mx, Escamilla-Ambrosio, Ponciano Jorge6 (AUTHOR) pescamilla@cic.ipn.mx, Ramos-Díaz, Eduardo7 (AUTHOR) eduardo.ramos@uacm.edu.mx
Publikováno v:
Information (2078-2489). Aug2024, Vol. 15 Issue 8, p473. 24p.
Autor:
Andres Aharhel Mercado-Velazquez, Ponciano Jorge Escamilla-Ambrosio, Floriberto Ortiz-Rodriguez
Publikováno v:
IEEE Access, Vol 9, Pp 118406-118418 (2021)
Internet of Things (IoT) systems are becoming more common and present in our daily lives. The increase of Internet-connected devices has caused attackers to focus their attention more on these devices. Therefore, new and more sophisticated attacks on
Externí odkaz:
https://doaj.org/article/22b984d7a9fe4ca694ffe1383776c5cc
Autor:
Ponciano Jorge Escamilla-Ambrosio, David Alejandro Robles-Ramirez, Theo Tryfonas, Abraham Rodriguez-Mota, Gina Gallegos-Garcia, Moises Salinas-Rosales
Publikováno v:
IEEE Access, Vol 9, Pp 154112-154135 (2021)
In this paper, an approach referred to as IoTsecM is proposed. This proposal is a UML/SysML extension for security requirements modeling within the analysis stage in a waterfall development life cycle in a Model-Based Systems Engineering Approach. Io
Externí odkaz:
https://doaj.org/article/8a6a777413694210aa5127b910d6f38d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.