Walter Fuertes
Orcid: 0000-0001-9427-5766
According to our database1,
Walter Fuertes
authored at least 36 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking.
Future Internet, May, 2024
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems.
Expert Syst. Appl., March, 2024
NDLP Phishing: A Fine-Tuned Application to Detect Phishing Attacks Based on Natural Language Processing and Deep Learning.
Int. J. Interact. Mob. Technol., 2024
An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems.
CoRR, 2024
2023
An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023
Traffic Classification in Software-Defined Networking by Employing Deep Learning Techniques: A Systematic Literature Review.
Proceedings of the Technologies and Innovation - 9th International Conference, 2023
2022
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities.
Comput. Networks, 2022
2021
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021
Management Support Systems Model for Incident Resolution in FinTech based on Business Intelligence.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021
2019
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key.
Secur. Commun. Networks, 2019
Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach.
IEEE Access, 2019
Visual Analytics for the Reduction of Air Pollution on Real-Time Data Derived from WSN.
Proceedings of the Developments and Advances in Defense and Security, 2019
Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study.
Proceedings of the Developments and Advances in Defense and Security, 2019
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.
Proceedings of the Developments and Advances in Defense and Security, 2019
Cybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador.
Proceedings of the Information Technology and Systems, 2019
Contextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm.
Proceedings of the Information Technology and Systems, 2019
Data Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network.
Proceedings of the Information Technology and Systems, 2019
A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
Proceedings of the 23rd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications DS-RT 2019, 2019
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
2018
Cookie Scout: An Analytic Model for Prevention of Cross-Site Scripting (XSS) Using a Cookie Classifier.
Proceedings of the International Conference on Information Technology & Systems, 2018
Early Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing.
Proceedings of the Technologies and Innovation - 4th International Conference, 2018
2017
An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence.
Syst., 2017
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017
Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks.
Proceedings of the International Conference on Software Security and Assurance, 2017
Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms.
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
2016
Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2016
On the Development of Strategic Games based on a Semiotic Analysis: A Case Study of an Optimized Tic-Tac-Toe.
Proceedings of the ICEIS 2016, 2016
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wireless Sensors Using GSM Technology.
Proceedings of the 20th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2016
2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Distributed System as Internet of Things for a New Low-Cost, Air Pollution Wireless Monitoring on Real Time.
Proceedings of the 19th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2015
2014
Multi-player Educational Video Game over Cloud to Stimulate Logical Reasoning of Children.
Proceedings of the 18th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2014
2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
2009
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML.
Ann. des Télécommunications, 2009