{"id":"https://openalex.org/W3041564930","doi":"https://doi.org/10.1145/3404663.3404675","title":"An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador","display_name":"An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador","publication_year":2020,"publication_date":"2020-05-15","ids":{"openalex":"https://openalex.org/W3041564930","doi":"https://doi.org/10.1145/3404663.3404675","mag":"3041564930"},"language":"en","primary_location":{"id":"doi:10.1145/3404663.3404675","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3404675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016709650","display_name":"Segundo Mois\u00e9s Toapanta Toapanta","orcid":"https://orcid.org/0000-0002-9041-0518"},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":true,"raw_author_name":"Segundo Mois\u00e9s T. Toapanta","raw_affiliation_strings":["Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047585282","display_name":"Peter S. Mu\u00f1oz Campuzano","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Peter S. Mu\u00f1oz Campuzano","raw_affiliation_strings":["Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103915408","display_name":"Dario Fernando Huilcapi S.","orcid":null},"institutions":[{"id":"https://openalex.org/I3132940433","display_name":"Politecnica Salesiana University","ror":"https://ror.org/00f11af73","country_code":"EC","type":"education","lineage":["https://openalex.org/I3132940433"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Dario Fernando Huilcapi S.","raw_affiliation_strings":["Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"],"affiliations":[{"raw_affiliation_string":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador","institution_ids":["https://openalex.org/I3132940433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082456719","display_name":"Luis Enrique Mafla Gallegos","orcid":"https://orcid.org/0000-0002-7808-7738"},"institutions":[{"id":"https://openalex.org/I70764802","display_name":"National Polytechnic School","ror":"https://ror.org/01gb99w41","country_code":"EC","type":"education","lineage":["https://openalex.org/I70764802"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Luis Enrique Mafla Gallegos","raw_affiliation_strings":["National Polytechnic School, Quito Ecuador"],"affiliations":[{"raw_affiliation_string":"National Polytechnic School, Quito Ecuador","institution_ids":["https://openalex.org/I70764802"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016709650"],"corresponding_institution_ids":["https://openalex.org/I3132940433"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10866035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7016156315803528},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6468641757965088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6123952269554138},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5479379892349243},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5473324656486511},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5126411318778992},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.50136399269104},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.49017199873924255},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.48803845047950745},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.48404330015182495},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4759371280670166},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4679293632507324},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4476821720600128},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4144909977912903},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4084852933883667},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.32852858304977417},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.32397300004959106}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7016156315803528},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6468641757965088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6123952269554138},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5479379892349243},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5473324656486511},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5126411318778992},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.50136399269104},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.49017199873924255},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.48803845047950745},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.48404330015182495},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4759371280670166},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4679293632507324},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4476821720600128},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4144909977912903},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4084852933883667},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.32852858304977417},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32397300004959106},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3404663.3404675","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3404675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2240141506","https://openalex.org/W2783137774","https://openalex.org/W2786978094","https://openalex.org/W2793211271","https://openalex.org/W2802515083","https://openalex.org/W2853755454","https://openalex.org/W2886730679","https://openalex.org/W2892662636","https://openalex.org/W2907351869","https://openalex.org/W2907851756","https://openalex.org/W2909415445","https://openalex.org/W2914360507","https://openalex.org/W2914964955","https://openalex.org/W2919398753","https://openalex.org/W2922087317","https://openalex.org/W2922171705","https://openalex.org/W2946893466","https://openalex.org/W2947054660","https://openalex.org/W2947928516","https://openalex.org/W2961349505","https://openalex.org/W3208984514","https://openalex.org/W4254086973","https://openalex.org/W6690408170","https://openalex.org/W6753074994"],"related_works":["https://openalex.org/W2379320583","https://openalex.org/W4282564355","https://openalex.org/W2165898552","https://openalex.org/W2366790065","https://openalex.org/W2392870687","https://openalex.org/W2033357182","https://openalex.org/W2183741450","https://openalex.org/W2345270111","https://openalex.org/W1493864661","https://openalex.org/W833563683"],"abstract_inverted_index":{"Security":[0],"problems":[1],"due":[2],"to":[3,11,38,47,57,84,93,110,151],"cyberattacks":[4,43],"were":[5],"analyzed,":[6],"checked":[7],"security":[8,36,53,59,62,90,106,121],"models":[9,91],"designed":[10],"protect":[12,94],"and":[13,52,66,92,130,148],"preserve":[14],"databases":[15],"of":[16,25,34,42,89,104,114,139,143,154,167],"information":[17,26,96],"from":[18],"these":[19],"institutions,":[20],"using":[21],"all":[22,152],"the":[23,40,49,74,82,86,95,99,112,155],"parameters":[24],"security.":[27],"It":[28,116],"is":[29,117],"planted":[30],"propose":[31],"a":[32,35,67,105,120,127,136],"prototype":[33,103],"model":[37,63,107],"mitigate":[39,111],"risks":[41,113],"on":[44,98],"public":[45,156],"institutions":[46],"define":[48],"organizational":[50],"structure":[51],"levels":[54],"in":[55,81,164],"order":[56],"adopt":[58],"protocols.":[60],"A":[61],"was":[64,79,108,146],"proposed,":[65],"general":[68],"network":[69],"topology":[70],"that":[71,119,134],"helped":[72],"meet":[73],"objective.":[75],"The":[76,102,141],"deductive":[77],"method":[78],"used":[80],"investigation":[83],"verify":[85],"current":[87],"trends":[88],"available":[97,132,150],"ministerial":[100],"entity.":[101],"established":[109],"cyberattacks.":[115],"concluded":[118],"strategy":[122],"are":[123,161],"necessary":[124],"data":[125],"through":[126],"correct,":[128],"reliable":[129],"highly":[131],"route":[133],"offers":[135],"higher":[137],"level":[138],"reliability.":[140],"content":[142],"this":[144],"plan":[145],"presented":[147],"made":[149],"members":[153],"institution,":[157],"especially":[158],"those":[159],"who":[160],"actively":[162],"involved":[163],"safety":[165],"procedures":[166],"information.":[168]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
