Searched for: %2520
(1 - 4 of 4)
document
Bustio-Martínez, Lázaro (author), Herrera-Semenets, Vitali (author), García-Mendoza, Juan-Luis (author), González-Ordiano, Jorge Ángel (author), Zúñiga-Morales, Luis (author), Sánchez Rivero, Rubén (author), Quiróz-Ibarra, José Emilio (author), Santander-Molina, Pedro Antonio (author), van den Berg, Jan (author), Buscaldi, Davide (author)
Persuasion is a human activity of influence. In marketing, persuasion can help customers find solutions to their problems, make informed choices, or convince someone to buy a useful (or useless) product or service. In computer crimes, persuasion can trick users into revealing sensitive information, or even performing actions that benefit...
conference paper 2024
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Decision trees are one of the most popular structures for decision-making and the representation of a set of rules. However, when a rule set is represented as a decision tree, some quirks in its structure may negatively affect its performance. For example, duplicate sub-trees and rule filters, that need to be evaluated more than once, could...
conference paper 2023
document
Herrera-Semenets, Vitali (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size...
journal article 2022
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...
journal article 2021
Searched for: %2520
(1 - 4 of 4)