Impact of social engineering attacks: A literature review W Fuertes, D Arévalo, JD Castro, M Ron, CA Estrada, R Andrade, ... Developments and Advances in Defense and Security: Proceedings of MICRADS …, 2022 | 12 | 2022 |
An implementation of an artifact for security in 5G networks using deep learning methods CA Estrada, W Fuertes, HO Cruz Periodicals of Engineering and Natural Sciences 9 (3), 603-614, 2021 | 4 | 2021 |
Malware security evasion techniques: an original keylogger implementation ÁA Royo, MS Rubio, W Fuertes, MC Cuervo, CA Estrada, T Toulkeridis World Conference on Information Systems and Technologies, 375-384, 2021 | 4 | 2021 |
An Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event CA Estrada, W Fuertes, JD Castro, D Nuñez-Agurto XV Multidisciplinary International Congress on Science and Technology, 241-254, 2021 | | 2021 |
An implementation of a Virus Focuses on Mobile Devices with Android. An Ethical Hacking Event. CA Estrada, W Fuertes Latin American Journal Of Computing 7 (2), 79-90, 2020 | | 2020 |
Malware Security Evasion Techniques: An Original Keylogger Implementation MC Cuervo, CA Estrada, T Toulkeridis | | |