{"id":3856,"date":"2018-12-07T07:06:31","date_gmt":"2018-12-07T12:06:31","guid":{"rendered":"http:\/\/www.icesi.edu.co\/editorial\/?p=3856"},"modified":"2024-08-30T11:00:22","modified_gmt":"2024-08-30T16:00:22","slug":"ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.icesi.edu.co\/editorial\/ciberseguridad\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=http%3A%2F%2Frepository.icesi.edu.co%2Fbiblioteca_digital%2Fbitstream%2F10906%2F84046%2F3%2Fnavarro_ciberseguridad_ciencia_2018.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 0px;height: 0px;border: none;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading...<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"http:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/84046\/3\/navarro_ciberseguridad_ciencia_2018.pdf\" class=\"ead-document-btn\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><p class=\"embed_download\"><a href=\"http:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/84046\/3\/navarro_ciberseguridad_ciencia_2018.pdf\" download target=\"_blank\" rel=\"noopener\">Download\/Descargar <\/a><\/p><\/div>\n<strong>T\u00edtulo completo:<\/strong> Ciberseguridad: un enfoque desde la ciencia de datos.<br \/>\n<strong>Autores:<\/strong> Christian Camilo Urcuqui L\u00f3pez, Melisa Garc\u00eda Pe\u00f1a, Jos\u00e9 Luis Osorio Quintero y Andr\u00e9s Navarro Cadavid.<br \/>\n<strong>Editoriales:<\/strong> Editorial Universidad Icesi.<br \/>\n<strong>Producci\u00f3n editorial:<\/strong> Claros Editores SAS.<br \/>\n<strong>A\u00f1o de edici\u00f3n:<\/strong> 2018 | <strong>ISBN:<\/strong> 978-958-8936-55-0.<br \/>\n<span id=\"post-ratings-3856\" class=\"post-ratings\" data-nonce=\"ec884ab37c\"><img decoding=\"async\" id=\"rating_3856_1\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"1 estrella\" title=\"1 estrella\" onmouseover=\"current_rating(3856, 1, '1 estrella');\" onmouseout=\"ratings_off(4.6, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_3856_2\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"2 estrellas\" title=\"2 estrellas\" onmouseover=\"current_rating(3856, 2, '2 estrellas');\" onmouseout=\"ratings_off(4.6, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_3856_3\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"3 estrellas\" title=\"3 estrellas\" onmouseover=\"current_rating(3856, 3, '3 estrellas');\" onmouseout=\"ratings_off(4.6, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_3856_4\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"4 estrellas\" title=\"4 estrellas\" onmouseover=\"current_rating(3856, 4, '4 estrellas');\" onmouseout=\"ratings_off(4.6, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_3856_5\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_half.gif\" alt=\"5 estrellas\" title=\"5 estrellas\" onmouseover=\"current_rating(3856, 5, '5 estrellas');\" onmouseout=\"ratings_off(4.6, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/> (<strong>14<\/strong> votos, promedio: <strong>4,57<\/strong> sobre 5)<br \/><span class=\"post-ratings-text\" id=\"ratings_3856_text\"><\/span><\/span><span id=\"post-ratings-3856-loading\" class=\"post-ratings-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/loading.gif\" width=\"16\" height=\"16\" class=\"post-ratings-image\" \/>Loading...<\/span>\n<table style=\"border: none;\">\n<tbody style=\"border: none;\">\n<tr valign=\"top\">\n<td valign=\"top\" style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"\/\/cdn.plu.mx\/widget-popup.js\"><\/script><a href=\"https:\/\/plu.mx\/plum\/a\/?doi=10.18046\/EUI\/ee.4.2018\" data-popup=\"right\" data-size=\"large\" class=\"plumx-plum-print-popup\" data-site=\"plum\" data-hide-when-empty=\"true\" data-lang=\"es\" target=\"_blank\" rel=\"noopener\">Ciberseguridad: un enfoque desde la ciencia de datos<\/a>\n<\/td>\n<td style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"https:\/\/d1bxh8uas1mnw7.cloudfront.net\/assets\/embed.js\"><\/script><\/p>\n<div class=\"altmetric-embed\" data-badge-type=\"donut\" data-altmetric-id=\"89499869\"><\/div>\n<\/td>\n<td style=\"border: none; vertical-align: middle;\"><span class=\"__dimensions_badge_embed__\" data-doi=\"10.18046\/EUI\/ee.4.2018\" data-hide-zero-citations=\"true\" data-legend=\"hover-right\" data-style=\"small_circle\"><\/span><script async=\"\" src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script><\/td>\n<\/tr>\n<\/table>\n<div class=\"osc-res-tab tabbable   osc-tabs-left\"><div style=\"clear:both;width: 100%;\"><ul class=\"nav osc-res-nav nav-pills osc-tabs-left-ul\" id=\"oscitas-restabs-1-ciberseguridad-17594\"><li class=\"active\"><a href=\"#ert_pane1-0\" data-toggle=\"tab\">Descripci\u00f3n<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-1\" data-toggle=\"tab\">Contenido<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-2\" data-toggle=\"tab\">Autor(es)<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-3\" data-toggle=\"tab\">Leer en l\u00ednea<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-4\" data-toggle=\"tab\">Catalogaci\u00f3n<\/a><\/li><\/ul><\/div><div style=\"clear:both;width: 100%;\"><ul class=\"tab-content\" id=\"oscitas-restabcontent-1-ciberseguridad-17594\"><li class=\"tab-pane active\" id=\"ert_pane1-0\"><p style=\"text-align: justify;\">La creatividad y la creciente capacidad tecnol\u00f3gica de los cibercriminales hacen que garantizar la confidencialidad, integridad y disponibilidad de la informaci\u00f3n sea una tarea cada vez m\u00e1s compleja. Las metodolog\u00edas tradicionales, como los sistemas determin\u00edsticos basados en perfiles y firmas, y los an\u00e1lisis descriptivos y diagn\u00f3sticos, ya no son suficientes, por lo que es necesario probar con t\u00e9cnicas m\u00e1s complejas. En este libro, a partir de experiencias y experimentos precisos, se propone un procedimiento \u2013base para la construcci\u00f3n de un framework\u2013, con las actividades necesarias para el entrenamiento y la evaluaci\u00f3n de modelos de <i>machine learning<\/i>, \u00fatil para: detectar <i>malware<\/i> en dispositivos con sistema operativo Android e identificar a priori aplicaciones web maliciosas.<\/p>\n<p style=\"text-align: justify;\"><strong>C\u00f3mo citar (APA):<\/strong> Urcuqui L\u00f3pez, C. C.; Garc\u00eda Pe\u00f1a, M.; Osorio Quintero, J. L. y Navarro Cadavid, A. (2018). <i>Ciberseguridad: un enfoque desde la ciencia de datos<\/i>. Cali: Editorial Universidad Icesi. DOI: <a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2018\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.4.2018<\/a><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-1\"><strong>Tabla de contenido:<\/strong><\/p>\n<p>Presentaci\u00f3n<\/p>\n<p><strong>1 \/ Ciberseguridad y ciencia de datos<\/strong><\/p>\n<p><strong>2 \/ Ciberseguridad en Android<\/strong><\/p>\n<p><strong>3 \/ Ciberseguridad en aplicaciones web<\/strong><\/p>\n<p><strong>4 \/ A partir de las lecciones aprendidas<\/strong><\/p>\n<p>Referencias<br \/><\/li><li class=\"tab-pane \" id=\"ert_pane1-2\"><ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4627-1477\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Christian Camilo Urcuqui L\u00f3pez<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\">Melisa Garc\u00eda Pe\u00f1a.<\/li>\n<li style=\"text-align: justify;\">Jos\u00e9 Luis Osorio Quintero.<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4154-2119\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Andr\u00e9s Navarro Cadavid<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-3\"><div data-configid=\"31013679\/67438093\" style=\"width:100%; height:740px;\" class=\"issuuembed\"><\/div>\n<p><script type=\"text\/javascript\" src=\"\/\/e.issuu.com\/embed.js\" async=\"true\"><\/script><br \/><\/li><li class=\"tab-pane \" id=\"ert_pane1-4\"><table>\n<tbody>\n<tr class=\"first odd\">\n<th width=\"150\">\n<p style=\"text-align: left;\">T\u00edtulo (ingl\u00e9s):<\/p>\n<\/th>\n<td class=\"data last\">Cybersecurity: an approach based on data science.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">DOI\/URL:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2018\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.4.2018<\/a><\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Editorial(es):<\/p>\n<\/th>\n<td class=\"data last\">Universidad Icesi.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Autor(es):<\/p>\n<\/th>\n<td class=\"data last\">Christian Camilo Urcuqui L\u00f3pez, Melisa Garc\u00eda Pe\u00f1a, Jos\u00e9 Luis Osorio Quintero y Andr\u00e9s Navarro Cadavid.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Palabras clave:<\/p>\n<\/th>\n<td class=\"data last\">Machine learning, Intelligent systems, Cyber security.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">ISBN:<\/p>\n<\/th>\n<td class=\"data last\">978-958-8936-55-0.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Fecha de edici\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Diciembre de 2018.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">No. de p\u00e1ginas:<\/p>\n<\/th>\n<td class=\"data last\">86.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Idioma(s):<\/p>\n<\/th>\n<td class=\"data last\">Espa\u00f1ol.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Formato(s):<\/p>\n<\/th>\n<td class=\"data last\">Libro impreso (tapa r\u00fastica) y electr\u00f3nico (PDF).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Alto x ancho:<\/p>\n<\/th>\n<td class=\"data last\">24 x 19 cm<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Colecci\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Edici\u00f3n especial.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Producto:<\/p>\n<\/th>\n<td class=\"data last\">Libro de investigaci\u00f3n.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Observaciones:<\/p>\n<\/th>\n<td class=\"data last\">Incluye referencias bibliogr\u00e1ficas.<\/td>\n<\/tr>\n<tr class=\"last odd\">\n<th>\n<p style=\"text-align: left;\">Registro DSpace:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2018\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2016\/04\/downloadIcon-e1460499009176.png\" alt=\"Icono de Repositorio - Contenido en la Nube\" width=\"25\" height=\"25\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo completo: Ciberseguridad: un enfoque desde la ciencia de datos. Autores: Christian Camilo Urcuqui L\u00f3pez, Melisa Garc\u00eda Pe\u00f1a, Jos\u00e9 Luis Osorio Quintero y Andr\u00e9s Navarro Cadavid. Editoriales: Editorial Universidad Icesi. Producci\u00f3n editorial: Claros Editores SAS. A\u00f1o de edici\u00f3n: 2018 | ISBN: 978-958-8936-55-0. Ciberseguridad: un enfoque desde la ciencia de datos<\/p>\n","protected":false},"author":3,"featured_media":3892,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[166],"tags":[263,274,346,465,529,530,531,532,534,656,657,870,903],"class_list":["post-3856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ediciones-especiales","tag-fi","tag-libro-de-investigacion","tag-346","tag-descarga-gratuita","tag-android","tag-ciberseguridad","tag-malware","tag-seguridad-informatica","tag-andres-navarro-cadavid","tag-filcali-2019","tag-fvla-2020","tag-christian-urcuqui","tag-fidca"],"_links":{"self":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/3856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/comments?post=3856"}],"version-history":[{"count":10,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/3856\/revisions"}],"predecessor-version":[{"id":7867,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/3856\/revisions\/7867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media\/3892"}],"wp:attachment":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media?parent=3856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/categories?post=3856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/tags?post=3856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}