Walter Fuertes

Orcid: 0000-0001-9427-5766

According to our database1, Walter Fuertes authored at least 33 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems.
Expert Syst. Appl., March, 2024

2023
An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023

Traffic Classification in Software-Defined Networking by Employing Deep Learning Techniques: A Systematic Literature Review.
Proceedings of the Technologies and Innovation - 9th International Conference, 2023

2022
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities.
Comput. Networks, 2022

2021
Malware Security Evasion Techniques: An Original Keylogger Implementation.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

Management Support Systems Model for Incident Resolution in FinTech based on Business Intelligence.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

2019
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key.
Secur. Commun. Networks, 2019

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach.
IEEE Access, 2019

Visual Analytics for the Reduction of Air Pollution on Real-Time Data Derived from WSN.
Proceedings of the Developments and Advances in Defense and Security, 2019

Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study.
Proceedings of the Developments and Advances in Defense and Security, 2019

Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.
Proceedings of the Developments and Advances in Defense and Security, 2019

Cybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador.
Proceedings of the Information Technology and Systems, 2019

Contextual Analysis of Comments in B2C Facebook Fan Pages Based on the Levenshtein Algorithm.
Proceedings of the Information Technology and Systems, 2019

Data Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network.
Proceedings of the Information Technology and Systems, 2019

A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Serious 3D Game over a Cluster Computing for Situated Learning of Traffic Signals.
Proceedings of the 23rd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications DS-RT 2019, 2019

Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2018
Cookie Scout: An Analytic Model for Prevention of Cross-Site Scripting (XSS) Using a Cookie Classifier.
Proceedings of the International Conference on Information Technology & Systems, 2018

Early Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing.
Proceedings of the Technologies and Innovation - 4th International Conference, 2018

2017
An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence.
Syst., 2017

Dimensional data model for early alerts of malicious activities in a CSIRT.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks.
Proceedings of the International Conference on Software Security and Assurance, 2017

Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms.
Proceedings of the International Conference on Software Security and Assurance, 2017

BotHook: An option against Cyberpedophilia.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2016

On the Development of Strategic Games based on a Semiotic Analysis: A Case Study of an Optimized Tic-Tac-Toe.
Proceedings of the ICEIS 2016, 2016

A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wireless Sensors Using GSM Technology.
Proceedings of the 20th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2016

2015
On the Development of Advanced Parental Control Tools.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Distributed System as Internet of Things for a New Low-Cost, Air Pollution Wireless Monitoring on Real Time.
Proceedings of the 19th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2015

2014
Multi-player Educational Video Game over Cloud to Stimulate Logical Reasoning of Children.
Proceedings of the 18th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2014

2010
A generic model for the management of virtual network environments.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
An emulation of VoD services using virtual network environments.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML.
Ann. des Télécommunications, 2009


  Loading...