يعرض 1 - 10 نتائج من 81 نتيجة بحث عن '"García-Ruiz, Juan Carlos"', وقت الاستعلام: 1.04s تنقيح النتائج
  1. 1
    دورية أكاديمية
  2. 2
    دورية أكاديمية
  3. 3
    دورية أكاديمية
  4. 4
    دورية أكاديمية
  5. 5
    دورية أكاديمية
  6. 6
    دورية أكاديمية
  7. 7
    دورية أكاديمية
  8. 8
    كتاب

    المساهمون: Gonzalez Lopez, Édgar, Herrera Zapata, Luz Monica, Murgueitio Cabrera, Jorge, Ortiz Laverde, Sandra Milena

    وصف الملف: 47 páginas; application/pdf

    العلاقة: 868; 825; Las TIC y la sociedad digital : doce años después de la ley. Tomo II, ecosistema digital en sus distintos desarrollos y las tecnologías disruptivas; https://bdigital.uexternado.edu.co/handle/001/4629Test; https://doi.org/10.57998/bdigital.handle.001.4629Test

  9. 9
    دورية أكاديمية
  10. 10
    دورية أكاديمية

    المساهمون: CTG-Informática

    وصف الملف: 20 páginas; application/pdf

    العلاقة: 214; 195; 15; N/A; Vinculos; M. Glassman and M. J. Kang, “Intelligence in the internet age: The emergence and evolu-tion of Open Source Intelligence (OSINT)”, Computers in Human Behavior, vol. 28, no. 2, pp. 673–682, 2012, https://doi.org/10.1016/j.chb.2011.11.014Test; L. brotherston and A. berlin, “Defensive se-curity handbook: best practices for securing infrastructure”. O’Reilly Media, 2017; W. Alcorn, C. Frichot, and M. Orrù, “The brow-ser hacker’s handbook”,New Jersey: John Wiley and Sons, 2014.; M. Gregg, “Certified Ethical Hacker (CEH) Ver-sion 9 Cert Guide” London: Pearson Education, 2017.; P. Engebretson, “The basics of hacking and pe-netration testing” Syngressr Publishing, 2013.; D. bradbury, “In plain view: open source inte-lligence”, Computers in Human Behavior, no. 4, pp. 5–9, 2011.; b. de S. G. Rodrigues, “Open-source intelligen-ce em sistemas SIEM” Lisboa: Universidade de Lisboa, 2015.; C. Pérez, “Minería de datos: técnicas y herra-mientas” Paraninfo Cengage Learning, 2007.; G. Subramanian, “R Data analysis projects: build end to end analytics systems to get deeper insights from your data”, birmingham: Packt Publishing, 2017.; L. Zhang and b. Liu, “Sentiment Analysis and Opinion Mining”. in Encyclopedia of Ma-chine Learning and Data Mining, boston: Springer, 2017, pp. 1152–1161, https://doi.org/10.1007/978-1-4899-7687-1_907Test; E. Cambria, b. Schuller, Y. Xia, and C. Havasi, “New Avenues in Opinion Mining and Senti-ment Analysis”, IEEE Intelligent Systems, vol. 28, no. 2, pp. 15–21, 2013, https://doi.org/10.1109/MIS.2013.30Test; A. Ortony, G. L. Clore, and A. Collins, “The cognitive structure of emotions” Cambridge: Cambridge University Press, 1988, https://doi.org/10.1017/CbO9780511571299Test; R. A. Stevenson, J. A. Mikels, and T. W. Ja-mes, “Characterization of the Affective Nor-ms for English Words by discrete emotional categories”, Behavior Research Methods, vol. 39, no. 4, pp. 1020–1024, 2007, https://doi.org/10.3758/bF03192999Test; P. D. Turney, “Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews”, In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, july 2002, pp. 417-424.; S. M. Kim and E. Hovy, “Identifying and Analyzing Judgment Opinions”, Association for Computatio-nal Linguistics Stroudsburg, pp. 200–207, 2006, https://doi.org/10.3115/1220835.1220861Test; Liangxiao Jiang, H. Zhang, and Zhihua Cai, “A Novel bayes Model: Hidden Naive bayes”, IEEE Transactions on Knowledge and Data Enginee-ring, vol. 21, no. 10, pp. 1361–1371, 2009, https://doi.org/10.1109/TKDE.2008.234Test; Y. Yang and G. I. Webb, “A Comparative Study of Discretization Methods for Naive-bayes Clas-sifiers”, J. Res., vol. 2, p. 267-324, 2007.; M. A. Hearst, S. T. Dumais, E. Osuna, J. Platt, and b. Scholkopf, “Support vector machines”, IEEE Intelligent Systems and their Applications, vol. 13, no. 4, pp. 18–28, 1998, https://doi.org/10.1109/5254.708428Test; F. Sebastiani, “Machine Learning in Automated Text Categorization”, ACM Computing Sur-veys, vol. 34, no. 1, pp. 1–47, 1999, https://doi.org/10.1145/505282.505283Test; b. Pang and L. Lee, “A Sentimental Education: Sentiment Analysis Using Subjectivity Sum-marization based on Minimum Cuts”, Proce-edings of ACL, pp. 271-278, 2004, https://doi.org/10.3115/1218955.1218990Test; T. Wilson, J. Wiebe, and P. Hoffmann, “Recogni-zing contextual polarity in phrase-level sentiment analysis”, Proceedings of the conference on Hu-man Language Technology and Empirical Methods in Natural Language Processing, pp. 347–354, 2005, https://doi.org/10.3115/1220575.1220619Test; H. Wang, D. Can, A. Kazemzadeh, F. bar and S. Narayanan, “A System for Real-time Twitter Sentiment Analysis of 2012 U.S. Presidential Election Cycl,”. In 50th Annual Meeting of the Association for Computational Linguistics, Jeju Island, july, 2012.; C-SPAN, “Robert Mueller on Cyberse-curity” [En línea] Disponible en: ht-tps://www.c-span.org/video/?319726-3/robert-mueller-cybersecurity&start=1876; Departamento Nacional de Planeación, “CONPES 3701 - Lineamientos de Política para Ciberseguridad y Ciberdefensa. Colombia”. Consejo Nacional de Política Económica y So-cial, 2011.; R. Rodríguez, “Guerra Asimétrica”. [En línea]. Disponible en: https://dialnet.unirioja.es/des-carga/articulo/4602435.pdfTest; J. Nye, “bound to Lead: The Changing Nature of American Power” Hachette U. basic books, 2016.; G. S. Medero, “Ciberespacio y el crimen or-ganizado. Los nuevos desafíos del siglo XXI”, Revista Enfoques, vol.10, no. 16, pp. 71–87, 2012.; R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon”, IEEE Security and Privacy, vol. 9, no. 3, pp. 49–51, 2011, https://doi.org/10.1109/MSP.2011.67Test; G. Friedman, “The next 100 years: a forecast for the 21st century”, Knopf Doubleday Publishing Group, 2009, pp. 193–212.; R. Steele, “Handbook of Intelligence Studies” London: Routledge, 2007.; https://repositorio.escuelaing.edu.co/handle/001/1459Test; https://doi.org/10.14483/2322939X.13504Test; https://revistas.udistrital.edu.co/index.php/vinculos/article/view/13504Test