Publicaciones

  • P. Zambrano et al., "Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach," in IEEE Access, vol. 7, pp. 142129-142146, 2019, doi: 10.1109/ACCESS.2019.2942805.
  • Zambrano, P., Torres, J., Yánez, Á., Macas, A., & Tello-Oquendo, L. (2020). Understanding cyberbullying as an information security attack—life cycle modeling. Annals of Telecommunications, 1-19.
  • Merchan-Lima, J., Astudillo-Salinas, F., Tello-Oquendo, L., Sánchez, F., López-Fonseca, G., & Quiroz, D. (2020). Information security management frameworks and strategies in higher education institutions: a systematic review. Annals of Telecommunications, 1-16.
  • D. Oña, L. Zapata, W. Fuertes, G. Rodríguez, E. Benavides and T. Toulkeridis, "Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods," 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 2019, pp. 161-163, doi: 10.1109/CSNet47905.2019.9108961.
  • J. Merchan-Lima, F. Astudillo-Salinas, L. Tello-Oquendo, F. Sanchez, G. Lopez and D. Quiroz, "Information Security Management Frameworks in Higher Education Institutions: An Overview," 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 2019, pp. 63-65, doi: 10.1109/CSNet47905.2019.9108845.
  • B. Espinoza, J. Simba, W. Fuertes, E. Benavides, R. Andrade and T. Toulkeridis, "Phishing Attack Detection: A Solution Based on the Typical Machine Learning Modeling Cycle," 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, pp. 202-207, doi: 10.1109/CSCI49370.2019.00041.
  • Cadena, A., Gualoto, F., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F., & Torres, J. (2020). Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. In Developments and Advances in Defense and Security (pp. 507-519). Springer, Singapore.
  • Andrade, R., Torres, J., Cadena, S. Cognitive Security for Incident Management Process. 2019. Advances in Intelligent Systems and Computing. (https://link.springer.com/chapter/10.1007/978-3-030-11890-7_59)
  • Tello-Oquendo, L., Tapia, F., Fuertes, W., Andrade, R., Samaniego, N., Torres, J., Cadena, A. A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy. 2019. Proceedings of the 21st International Conference on Enterprise Information Systems (ICEIS 2019).
  • Cadena, A., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F. Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. 2019. SIST Series.
  • Orellana, V., Cevallos, Y., Tello-Oquendo, L., Inca, D., Palacios, C., Rentería, L. Quality Evaluation Processes and its Impulse to Digital Transformation in Ecuadorian Universities. 2019. Proceedings of 2019 International Conference on eDemocracy & eGovernment (ICEDEG’19).
  • Andrade, R., Torres, J., Tello-Oquendo, L. Cognitive Security Task Using Big Data Tools. 2019. Proceedings of 2019 International Conference on eDemocracy & eGovernment.
  • Édgar Salguero Dorokhin, Walter Fuertes, and Edison Lascano, “On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key”. Security and Communication Networks, vol. 2019, Article ID 8214681, 10 pages, 2019. https://doi.org/10.1155/2019/8214681.
    (https://gtciberseguridad.cedia.edu.ec/es/publicaciones-gtciberseguridad)
  • Tello-Oquendo, L.; Tapia, F.; Fuertes, W.; Andrade, R.; Erazo, N.; Torres, J. and Cadena, A. (2019). A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy. In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-372-8, pages 328-336. DOI: 10.5220/0007753503280336