Searched for: +
(1 - 4 of 4)
document
Bustio-Martínez, Lázaro (author), Herrera-Semenets, Vitali (author), García-Mendoza, Juan-Luis (author), González-Ordiano, Jorge Ángel (author), Zúñiga-Morales, Luis (author), Sánchez Rivero, Rubén (author), Quiróz-Ibarra, José Emilio (author), Santander-Molina, Pedro Antonio (author), van den Berg, Jan (author), Buscaldi, Davide (author)
Persuasion is a human activity of influence. In marketing, persuasion can help customers find solutions to their problems, make informed choices, or convince someone to buy a useful (or useless) product or service. In computer crimes, persuasion can trick users into revealing sensitive information, or even performing actions that benefit...
conference paper 2024
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Decision trees are one of the most popular structures for decision-making and the representation of a set of rules. However, when a rule set is represented as a decision tree, some quirks in its structure may negatively affect its performance. For example, duplicate sub-trees and rule filters, that need to be evaluated more than once, could...
conference paper 2023
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...
journal article 2021
Searched for: +
(1 - 4 of 4)