{"id":6732,"date":"2022-08-15T17:38:00","date_gmt":"2022-08-15T22:38:00","guid":{"rendered":"https:\/\/www.icesi.edu.co\/editorial\/?p=6732"},"modified":"2025-02-05T16:32:12","modified_gmt":"2025-02-05T21:32:12","slug":"ciberseguridad-datos","status":"publish","type":"post","link":"https:\/\/www.icesi.edu.co\/editorial\/ciberseguridad-datos\/","title":{"rendered":"Ciberseguridad: los datos tienen la respuesta"},"content":{"rendered":"<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Frepository.icesi.edu.co%2Fbiblioteca_digital%2Fbitstream%2F10906%2F95342%2F1%2Furcuqui_ciberseguridad_todo_2022.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 0px;height: 0px;border: none;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading...<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/95342\/1\/urcuqui_ciberseguridad_todo_2022.pdf\" class=\"ead-document-btn\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><p class=\"embed_download\"><a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/95342\/1\/urcuqui_ciberseguridad_todo_2022.pdf\" download target=\"_blank\" rel=\"noopener\">Download\/Descargar <\/a><\/p><\/div>\n<strong>T\u00edtulo completo:<\/strong> Ciberseguridad: los datos tienen la respuesta.<br \/>\n<strong>Coordinadores:<\/strong> Christian Camilo Urcuqui L\u00f3pez y Andr\u00e9s Navarro Cadavid.<br \/>\n<strong>Autores:<\/strong> Brayan Andr\u00e9s Henao, Juan Sebasti\u00e1n Prada, Andr\u00e9s Felipe P\u00e9rez Belalc\u00e1zar, Steven Bernal Tovar, Julio C\u00e9sar Gaviria Jaramillo, \u00c1nderson Ram\u00edrez, Jhoan Steven Delgado Villarreal, David Alejandro Huertas Trujillo, Brayan Jos\u00e9 Vargas Plaza, Bayron Daymiro Campaz Hurtado, Juan David D\u00edaz Monsalve, Santiago Guti\u00e9rrez Bola\u00f1os, Cristhian Eduardo Castillo Meneses, Kevin Gianmarco Zarama Luna, Javier D\u00edaz Cely, Christian Camilo Urcuqui L\u00f3pez y Andr\u00e9s Navarro Cadavid.<br \/>\n<strong>Editoriales:<\/strong> Editorial Universidad Icesi.<br \/>\n<strong>Producci\u00f3n editorial:<\/strong> Claros Editores SAS.<br \/>\n<strong>A\u00f1o de edici\u00f3n:<\/strong> 2022 | <strong>ISBN:<\/strong> 978-628-7538-78-8.<br \/>\n<span id=\"post-ratings-6732\" class=\"post-ratings\" data-nonce=\"2e0f87cd27\"><img decoding=\"async\" id=\"rating_6732_1\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"1 estrella\" title=\"1 estrella\" onmouseover=\"current_rating(6732, 1, '1 estrella');\" onmouseout=\"ratings_off(4.8, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_6732_2\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"2 estrellas\" title=\"2 estrellas\" onmouseover=\"current_rating(6732, 2, '2 estrellas');\" onmouseout=\"ratings_off(4.8, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_6732_3\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"3 estrellas\" title=\"3 estrellas\" onmouseover=\"current_rating(6732, 3, '3 estrellas');\" onmouseout=\"ratings_off(4.8, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_6732_4\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"4 estrellas\" title=\"4 estrellas\" onmouseover=\"current_rating(6732, 4, '4 estrellas');\" onmouseout=\"ratings_off(4.8, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_6732_5\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_half.gif\" alt=\"5 estrellas\" title=\"5 estrellas\" onmouseover=\"current_rating(6732, 5, '5 estrellas');\" onmouseout=\"ratings_off(4.8, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/> (<strong>24<\/strong> votos, promedio: <strong>4,83<\/strong> sobre 5)<br \/><span class=\"post-ratings-text\" id=\"ratings_6732_text\"><\/span><\/span><span id=\"post-ratings-6732-loading\" class=\"post-ratings-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/loading.gif\" width=\"16\" height=\"16\" class=\"post-ratings-image\" \/>Loading...<\/span>\n<table style=\"border: none;\">\n<tbody style=\"border: none;\">\n<tr valign=\"top\">\n<td valign=\"top\" style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"\/\/cdn.plu.mx\/widget-popup.js\"><\/script><a href=\"https:\/\/plu.mx\/plum\/a\/?doi=10.18046\/EUI\/ee.4.2022\" data-popup=\"right\" data-size=\"large\" class=\"plumx-plum-print-popup\" data-site=\"plum\" data-hide-when-empty=\"true\" data-lang=\"es\" target=\"_blank\" rel=\"noopener\">Ciberseguridad: los datos tienen la respuesta<\/a><\/td>\n<td style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"https:\/\/d1bxh8uas1mnw7.cloudfront.net\/assets\/embed.js\"><\/script><\/p>\n<div class=\"altmetric-embed\" data-badge-type=\"donut\" data-altmetric-id=\"\"><\/div>\n<\/td>\n<td style=\"border: none; vertical-align: middle;\"><span class=\"__dimensions_badge_embed__\" data-doi=\"10.18046\/EUI\/ee.4.2022\" data-hide-zero-citations=\"true\" data-legend=\"hover-right\" data-style=\"small_circle\"><\/span><script async=\"\" src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script><\/td>\n<\/tr>\n<\/table>\n<div class=\"osc-res-tab tabbable   osc-tabs-left\"><div style=\"clear:both;width: 100%;\"><ul class=\"nav osc-res-nav nav-pills osc-tabs-left-ul\" id=\"oscitas-restabs-1-ciberseguridad-datos-54454\"><li class=\"active\"><a href=\"#ert_pane1-0\" data-toggle=\"tab\">Descripci\u00f3n<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-1\" data-toggle=\"tab\">Contenido<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-2\" data-toggle=\"tab\">Autor(es)<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-3\" data-toggle=\"tab\">Catalogaci\u00f3n<\/a><\/li><\/ul><\/div><div style=\"clear:both;width: 100%;\"><ul class=\"tab-content\" id=\"oscitas-restabcontent-1-ciberseguridad-datos-54454\"><li class=\"tab-pane active\" id=\"ert_pane1-0\"><p style=\"text-align: justify;\">Este libro presenta la importancia de la informaci\u00f3n y la manera de utilizarla para el proceso de ciencia de datos, para luego introducir los fundamentos te\u00f3ricos de ambas disciplinas y presentar su aplicaci\u00f3n en ocho proyectos de investigaci\u00f3n, los cuales buscan orientar al lector sobre c\u00f3mo utilizar la inteligencia artificial tanto desde la perspectiva defensiva como en la ofensiva. En el aspecto defensivo, en el libro se aborda la realizaci\u00f3n de experimentos precisos para el desarrollo de modelos para la detecci\u00f3n de <i>malware<\/i> en dispositivos Android, <i>cryptojacking<\/i>, <i>deepfakes<\/i> y <i>botnets<\/i> maliciosas; y en el enfoque ofensivo, se exploran modelos para la generaci\u00f3n de contenido multimedia no leg\u00edtimo y se introduce el concepto de aprendizaje seguro y la aplicaci\u00f3n de <i>adversarial machine learning<\/i> como enfoque para encontrar los valores que permiten sesgar los resultados de un modelo de aprendizaje de m\u00e1quina.<\/p>\n<p style=\"text-align: justify;\"><strong>C\u00f3mo citar (APA):<\/strong> Urcuqui L\u00f3pez, C.C. y Navarro Cadavid, A. (coords.) (2022). <i>Ciberseguridad: los datos tienen la respuesta<\/i>. Cali: Editorial Universidad Icesi. DOI: <a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.4.2022<\/a><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-1\"><strong>Tabla de contenido:<\/strong><\/p>\n<p>Presentaci\u00f3n<br \/>\n<i>Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>1 \/ Los datos tienen la respuesta<\/strong><br \/>\n<i>Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>2 \/ Marco conceptual<\/strong><br \/>\n<i>Brayan Henao, Juan Sebasti\u00e1n Prada, Andr\u00e9s Felipe P\u00e9rez, Steven Bernal, Julio C\u00e9sar Gaviria, \u00c1nderson Ram\u00edrez, Jhoan Steven Delgado, David Alejandro Huertas, Brayan Vargas, Bayron Campaz, Juan David D\u00edaz, Santiago Guti\u00e9rrez, Cristhian Eduardo Castillo, Kevin Zarama, Christian Camilo Urcuqui, Andr\u00e9s Navarro y Javier D\u00edaz Cely<\/i><\/p>\n<p><strong>3 \/ Sistema para el estudio de ciberataques web<\/strong><br \/>\n<i>Brayan Henao, Juan Sebasti\u00e1n Prada, Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>4 \/ Sistema de an\u00e1lisis de tr\u00e1fico web para la detecci\u00f3n de malware en dispositivos Android<\/strong><br \/>\n<i>Andr\u00e9s Felipe P\u00e9rez, Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>5 \/ Detecci\u00f3n de cryptojacking a trav\u00e9s del tr\u00e1fico de red usando t\u00e9cnicas de machine learning<\/strong><br \/>\n<i>Steven Bernal, Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>6 \/ An\u00e1lisis de ventanas de tiempo para detectar el comportamiento de botnets<\/strong><br \/>\n<i>Julio C\u00e9sar Gaviria, \u00c1nderson Ram\u00edrez, Christian Camilo Urcuqui y Andr\u00e9s Navarro<\/i><\/p>\n<p><strong>7 \/ Secure learning para detecci\u00f3n de Android malware<\/strong><br \/>\n<i>Jhoan Steven Delgado, Christian Camilo Urcuqui, Andr\u00e9s Navarro y Javier D\u00edaz Cely<\/i><\/p>\n<p><strong>8 \/ Secure learning y deep reinforcement learning para la detecci\u00f3n de Android malware<\/strong><br \/>\n<i>David Alejandro Huertas, Brayan Jos\u00e9 Vargas y Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>9 \/ M\u00e9todo de detecci\u00f3n de deepfake mediante t\u00e9cnicas de machine learning<\/strong><br \/>\n<i>Bayron Campaz, Juan David D\u00edaz, Santiago Guti\u00e9rrez y Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>10 \/ Sistema para la detecci\u00f3n de deepfake de sonido<\/strong><br \/>\n<i>Cristhian Eduardo Castillo, Kevin Zarama y Christian Camilo Urcuqui<\/i><\/p>\n<p>Referencias<br \/><\/li><li class=\"tab-pane \" id=\"ert_pane1-2\"><ul>\n<li style=\"text-align: justify;\"><b>Brayan Andr\u00e9s Henao<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Juan Sebasti\u00e1n Prada<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Andr\u00e9s Felipe P\u00e9rez Belalc\u00e1zar<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Steven Bernal Tovar<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Julio C\u00e9sar Gaviria Jaramillo<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>\u00c1nderson Ram\u00edrez<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Jhoan Steven Delgado Villarreal<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>David Alejandro Huertas Trujillo<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Brayan Jos\u00e9 Vargas Plaza<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Bayron Daymiro Campaz Hurtado<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Juan David D\u00edaz Monsalve<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Santiago Guti\u00e9rrez Bola\u00f1os<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Cristhian Eduardo Castillo Meneses<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Kevin Gianmarco Zarama Luna<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Javier D\u00edaz Cely<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4627-1477\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Christian Camilo Urcuqui L\u00f3pez<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4154-2119\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Andr\u00e9s Navarro Cadavid<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-3\"><table>\n<tbody>\n<tr class=\"first odd\">\n<th width=\"150\">\n<p style=\"text-align: left;\">T\u00edtulo (ingl\u00e9s):<\/p>\n<\/th>\n<td class=\"data last\">Cybersecurity: data holds the answer.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">DOI\/URL:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.4.2022<\/a><\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Editorial(es):<\/p>\n<\/th>\n<td class=\"data last\">Universidad Icesi.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Autor(es):<\/p>\n<\/th>\n<td class=\"data last\">Brayan Andr\u00e9s Henao, Juan Sebasti\u00e1n Prada, Andr\u00e9s Felipe P\u00e9rez Belalc\u00e1zar, Steven Bernal Tovar, Julio C\u00e9sar Gaviria Jaramillo, \u00c1nderson Ram\u00edrez, Jhoan Steven Delgado Villarreal, David Alejandro Huertas Trujillo, Brayan Jos\u00e9 Vargas Plaza, Bayron Daymiro Campaz Hurtado, Juan David D\u00edaz Monsalve, Santiago Guti\u00e9rrez Bola\u00f1os, Cristhian Eduardo Castillo Meneses, Kevin Gianmarco Zarama Luna, Javier D\u00edaz Cely, Christian Camilo Urcuqui L\u00f3pez y Andr\u00e9s Navarro Cadavid.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Palabras clave:<\/p>\n<\/th>\n<td class=\"data last\">Machine learning, Intelligent systems, Cyber security.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">ISBN:<\/p>\n<\/th>\n<td class=\"data last\">978-628-7538-78-8.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Fecha de edici\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Agosto de 2022.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">No. de p\u00e1ginas:<\/p>\n<\/th>\n<td class=\"data last\">270.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Idioma(s):<\/p>\n<\/th>\n<td class=\"data last\">Espa\u00f1ol.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Formato(s):<\/p>\n<\/th>\n<td class=\"data last\">Libro electr\u00f3nico.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Alto x ancho:<\/p>\n<\/th>\n<td class=\"data last\">24 x 19 cm<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Colecci\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Edici\u00f3n especial.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Producto:<\/p>\n<\/th>\n<td class=\"data last\">Libro de divulgaci\u00f3n.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Observaciones:<\/p>\n<\/th>\n<td class=\"data last\">Incluye referencias bibliogr\u00e1ficas.<\/td>\n<\/tr>\n<tr class=\"last odd\">\n<th>\n<p style=\"text-align: left;\">Registro DSpace:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.4.2022\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2016\/04\/downloadIcon-e1460499009176.png\" alt=\"Icono de Repositorio - Contenido en la Nube\" width=\"25\" height=\"25\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo completo: Ciberseguridad: los datos tienen la respuesta. Coordinadores: Christian Camilo Urcuqui L\u00f3pez y Andr\u00e9s Navarro Cadavid. Autores: Brayan Andr\u00e9s Henao, Juan Sebasti\u00e1n Prada, Andr\u00e9s Felipe P\u00e9rez Belalc\u00e1zar, Steven Bernal Tovar, Julio C\u00e9sar Gaviria Jaramillo, \u00c1nderson Ram\u00edrez, Jhoan Steven Delgado Villarreal, David Alejandro Huertas Trujillo, Brayan Jos\u00e9 Vargas Plaza, Bayron Daymiro Campaz Hurtado, Juan David [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6739,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[166],"tags":[263,465,529,530,531,532,534,727,737,795,822,870,903],"class_list":["post-6732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ediciones-especiales","tag-fi","tag-descarga-gratuita","tag-android","tag-ciberseguridad","tag-malware","tag-seguridad-informatica","tag-andres-navarro-cadavid","tag-libro-de-divulgacion","tag-machine-learning","tag-795","tag-filcali-2022","tag-christian-urcuqui","tag-fidca"],"_links":{"self":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/6732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/comments?post=6732"}],"version-history":[{"count":10,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/6732\/revisions"}],"predecessor-version":[{"id":8309,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/6732\/revisions\/8309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media\/6739"}],"wp:attachment":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media?parent=6732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/categories?post=6732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/tags?post=6732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}