يعرض 1 - 20 نتائج من 53 نتيجة بحث عن '"Etapa temprana"', وقت الاستعلام: 0.71s تنقيح النتائج
  1. 1
    Conference
  2. 2
  3. 3
    Academic Journal
  4. 4
    Academic Journal
  5. 5
    Academic Journal

    المؤلفون: Rodríguez, Clara E.

    المساهمون: Maldonado Rivera, Silvia

    المصدر: 1870-3550.

    جغرافية الموضوع: México

    Time: 4

    وصف الملف: application/pdf; pp. 69-91

    Relation: print; Norteamérica: Revista Académica del CISAN-UNAM; Adobe Acrobat; 1, enero-junio; https://ru.micisan.unam.mx/handle/123456789/19719; N_2011_0006_0001_0069; CONACYT

  6. 6
    Academic Journal
  7. 7
  8. 8
    Dissertation/ Thesis

    المساهمون: Camargo Mendoza, Jorge Eliecer, Unsecurelab Cybersecurity Research Group

    وصف الملف: xiv, 64 páginas; application/pdf

    Relation: [A, 2020] A, A. A. (2020). Towards the Detection of Phishing Attacks Praveen K TIFAC- CORE in Cyber Security Amrita Vishwa Vidyapeetham; [Adil et al., 2020] Adil, M., Khan, R., and Ghani, M. A. N. U. (2020). Preventive Techniques of Phishing Attacks in Networks. In 2020 3rd International Conference on Advancements in Computational Sciences (ICACS), pages 1–8.; [Ali and Ahmed, 2019] Ali, W. and Ahmed, A. A. (2019). Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. IET Information Security, 13(6):659–669.; [Anand et al., 2018] Anand, A., Gorde, K., Moniz, J. R. A., Park, N., Chakraborty, T., and Chu, B. (2018). Phishing URL Detection with Oversampling based on Text Generative Adversarial Networks. In 2018 IEEE International Conference on Big Data (Big Data), pages 1168–1177.; [apwg, 2022] apwg (2022). PHISHING ACTIVITY TRENDS REPORT Q4 2021.; [Aung and Yamana, 2019] Aung, E. S. and Yamana, H. (2019). URL-Based Phishing Detec- tion Using the Entropy of Non-Alphanumeric Characters. In Proceedings of the 21st Inter- national Conference on Information Integration and Web-Based Applications & Services, iiWAS2019, page 385–392, New York, NY, USA. Association for Computing Machinery.; [Baig et al., 2021] Baig, M. S., Ahmed, F., and Memon, A. M. (2021). Spear-phishing campaigns: Link vulnerability leads to phishing attacks, spear-phishing electronic/uav communication-scam targeted. In 2021 4th International Conference on Computing In- formation Sciences (ICCIS), pages 1–6.; [Balim and Gunal, 2019] Balim, C. and Gunal, E. S. (2019). Automatic Detection of Smishing Attacks by Machine Learning Methods. In 2019 1st International Informatics and Software Engineering Conference (UBMYK), pages 1–3.; [Barreiro and Camargo, 2022] Barreiro, D. A. and Camargo, J. E. (2022). A systematic review on phishing detection: A perspective beyond a high accuracy in phishing detection. pages 173–188.; [Baykara and G ̈urel, 2018] Baykara, M. and G ̈urel, Z. Z. (2018). Detection of phishing at- tacks. In 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pages 1–5.; [Buber et al., 2017] Buber, E., Demir, , and Sahingoz, O. K. (2017). Feature selections for the machine learning based detection of phishing websites. In 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), pages 1–5.; Concone et al., 2019] Concone, F., Re, G. L., Morana, M., and Ruocco, C. (2019). Assisted Labeling for Spam Account Detection on Twitter. In 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pages 359–366.; [Dalgic et al., 2018] Dalgic, F. C., Bozkir, A. S., and Aydos, M. (2018). Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors. In 2018 2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pages 1–8.; [Das et al., 2020] Das, A., Baki, S., Aassal, A. E., Verma, R., and Dunbar, A. (2020). SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective. IEEE Communications Surveys & Tutorials, 22(1):671–708.; [DomainWatch, ] DomainWatch. DomainWatch - Domain WHOIS Search, Website Infor- mation.; [Eshmawi and Nair, 2019] Eshmawi, A. and Nair, S. (2019). The Roving Proxy Framewrok for SMS Spam and Phishing Detection. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pages 1–6.; [Ginsberg and Yu, 2018] Ginsberg, A. and Yu, C. (2018). Rapid Homoglyph Prediction and Detection. In 2018 1st International Conference on Data Intelligence and Security (ICDIS), pages 17–23; [Huang et al., 2019] Huang, Y., Qin, J., and Wen, W. (2019). Phishing URL Detection Via Capsule-Based Neural Network. In 2019 IEEE 13th International Conference on Anti- counterfeiting, Security, and Identification (ASID), pages 22–26.; [JAMES, 2005] JAMES, L. (2005). Phishing Exposed.; [Li and Wang, 2017] Li, J. and Wang, S. (2017). PhishBox: An Approach for Phishing Va- lidation and Detection. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Con- gress(DASC/PiCom/DataCom/CyberSciTech), pages 557–564.; [Li et al., 2020] Li, Q., Cheng, M., Wang, J., and Sun, B. (2020). LSTM based Phishing Detection for Big Email Data. IEEE Transactions on Big Data, page 1; [Li et al., 2016] Li, X., Geng, G., Yan, Z., Chen, Y., and Lee, X. (2016). Phishing detection based on newly registered domains. In 2016 IEEE International Conference on Big Data (Big Data), pages 3685–3692; [Lingam et al., 2018] Lingam, G., Rout, R. R., and Somayajulu, D. V. L. N. (2018). Detec- tion of Social Botnet using a Trust Model based on Spam Content in Twitter Network. In 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS), pages 280–285.; [Lingam et al., 2019] Lingam, G., Rout, R. R., and Somayajulu, D. V. L. N. (2019). Deep Q- Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1–6.; McGahagan et al., 2019] McGahagan, J., Bhansali, D., Gratian, M., and Cukier, M. (2019). A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites. In 2019 15th European Dependable Computing Conference (EDCC), pages 75–82; [Megha et al., 2019] Megha, N., Babu, K. R. R., and Sherly, E. (2019). An Intelligent Sys- tem for Phishing Attack Detection and Prevention. In 2019 International Conference on Communication and Electronics Systems (ICCES), pages 1577–1582.; [Mondal et al., 2019] Mondal, S., Maheshwari, D., Pai, N., and Biwalkar, A. (2019). A Review on Detecting Phishing URLs using Clustering Algorithms. In 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), pages 1–6; [Nakamura and Dobashi, 2019] Nakamura, A. and Dobashi, F. (2019). Proactive Phishing Sites Detection. In IEEE/WIC/ACM International Conference on Web Intelligence, WI ’19, page 443–448, New York, NY, USA. Association for Computing Machinery.; [Nathezhtha et al., 2019] Nathezhtha, T., Sangeetha, D., and Vaidehi, V. (2019). WC-PAD: Web Crawling based Phishing Attack Detection. In 2019 International Carnahan Confe- rence on Security Technology (ICCST), pages 1–6; [Pande and Voditel, 2017] Pande, D. N. and Voditel, P. S. (2017). Spear phishing: Diag- nosing attack paradigm. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pages 2720–2724; [Patil et al., 2018] Patil, V., Thakkar, P., Shah, C., Bhat, T., and Godse, S. P. (2018). De- tection and Prevention of Phishing Websites Using Machine Learning Approach. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pages 1–5.; [Sahoo, 2018] Sahoo, P. K. (2018). Data mining a way to solve Phishing Attacks. In 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), pages 1–5.; [Sharma et al., 2017] Sharma, H., Meenakshi, E., and Bhatia, S. K. (2017). A comparative analysis and awareness survey of phishing detection tools. In 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pages 1437–1442; [Spaulding et al., 2016] Spaulding, J., Upadhyaya, S., and Mohaisen, A. (2016). The Lands- cape of Domain Name Typosquatting: Techniques and Countermeasures. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 284–289.; [Starov et al., 2019] Starov, O., Zhou, Y., and Wang, J. (2019). Detecting Malicious Cam- paigns in Obfuscated JavaScript with Scalable Behavioral Analysis. In 2019 IEEE Security and Privacy Workshops (SPW), pages 218–223.; [urlscan, ] urlscan. URL and website scanner.; [Xiang et al., 2011] Xiang, G., Hong, J., Rose, C. P., and Cranor, L. (2011). CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites; [Ya et al., 2019] Ya, J., Liu, T., Zhang, P., Shi, J., Guo, L., and Gu, Z. (2019). NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples. In 2019 International Joint Conference on Neural Networks (IJCNN), pages 1–7; [Yan et al., 2020] Yan, X., Xu, Y., Xing, X., Cui, B., Guo, Z., and Guo, T. (2020). Trust- worthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT. IEEE Transactions on Industrial Informatics, page 1; [Yang et al., 2019] Yang, P., Zhao, G., and Zeng, P. (2019). Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning. IEEE Access, 7:15196– 15209.; [Yao et al., 2018] Yao, W., Ding, Y., and Li, X. (2018). LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method. In 2018 IEEE Intl Conf on Parallel & Distribu- ted Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communi- cations (ISPA/IUCC/BDCloud/SocialCom/SustainCom), pages 231–236; [Yazhmozhi and Janet, 2019] Yazhmozhi, V. M. and Janet, B. (2019). Natural language processing and Machine learning based phishing website detection system. In 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I- SMAC), pages 336–340.; [Yuan et al., 2018] Yuan, H., Chen, X., Li, Y., Yang, Z., and Liu, W. (2018). Detecting Phishing Websites and Targets Based on URLs and Webpage Links. In 2018 24th Inter- national Conference on Pattern Recognition (ICPR), pages 3669–3674.; [Zhu et al., 2018] Zhu, E., Ye, C., Liu, D., Liu, F., Wang, F., and Li, X. (2018). An Effective Neural Network Phishing Detection Model Based on Optimal Featu- re Selection. In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Compu- ting, Social Computing & Networking, Sustainable Computing & Communications (IS- PA/IUCC/BDCloud/SocialCom/SustainCom), pages 781–787.; [Zuraiq and Alkasassbeh, 2019] Zuraiq, A. A. and Alkasassbeh, M. (2019). Review: Phishing Detection Approaches. In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), pages 1–6.; https://repositorio.unal.edu.co/handle/unal/84259; Universidad Nacional de Colombia; Repositorio Institucional Universidad Nacional de Colombia; https://repositorio.unal.edu.co/

  9. 9
    Academic Journal

    المصدر: Criterio Libre; Vol. 15 Núm. 26 (2017): Revista Criterio Libre No. 26; 131-155 ; 2323-0886 ; 1900-0642 ; 10.18041/1900-0642/criteriolibre.v15i26

    وصف الملف: application/pdf

    Relation: https://revistas.unilibre.edu.co/index.php/criteriolibre/article/view/1044/809; Ahumada, Omar (2011). Récord de inversión en el sector minero. El Tiempo, Colombia, 11 de agosto de 2011. http://goo.gl/tWGpYM, 13 de octubre de 2014.; Álvarez, Claudia Patricia; Cano, Jose Alejandro; Yepes, Mónica; Apareicio, Sebastián; Cortes, Alejandro; Holguin, Ana María; Velez, Gloria Stella; Pereira, Fernando; Molina, Tomas; Cano, Carlos Andrés; Olaya, Alejandro (2013). GEM Antioquia 2012 -2013. Medellín: Ediciones Sello Javeriano.; Arboleda, Eliana; Palacio, Marlon; Álvarez, Sandra, y Ruiz, Yuri (2009). Sí hay dinero para emprender en Colombia, ¿pero existen mecanismos? Emprendedor, prepárate para los Ángeles Inversionistas. El Cuaderno, Vol. 3, No. 5.; Banco de la República (2013). Tasa de intervención de política monetaria del Banco de la República. Banco de la República, Colombia. http://goo.gl/1J2vQi, 12 de octubre de 2014.; Banco de la República y DANE (2012). Informe de Coyuntura Económica Regional 2011 - Antioquia, DANE – Banco de la República, Colombia, noviembre de 2012. Disponible en: http://goo.gl/aISiFO, noviembre de 2012, 14 de agosto de 2015.; Banco de la República y DANE (2013). Informe de Coyuntura Económica Regional 2012 – Antioquia, DANE – Banco de la República, Colombia, agosto de 2013. http://goo.gl/ a4uStC, 16 de agosto de 2015.; Banco de la República y DANE (2014). Informe de Coyuntura Económica Regional 2013 – Antioquia, DANE – Banco de la República, Colombia, diciembre de 2014. http://goo.gl/tZ1Y1j, 15 de agosto de 2015.; Bolsa de Valores de Colombia (2015). Informe Mensual de Renta Fija BVC, Bolsa de Valores de Colombia. http://goo.gl/JOkAc, 14 de enero de 2015.; Brigham, Eugene F., y Houston, Joel F. (2013). Fundamentals of Financial Management. Concise Eighth Edition. USA: Cengage Learning.; Cámara de Comercio de Medellín para Antioquia (2011). Análisis de las principales características de las empresas en Antioquia. Revista Antioqueña de Economía y Desarrollo, No. 2, diciembre de 2011. http://goo.gl/ ldHqM5, 13 de octubre de 2014.; Cámara de Comercio de Medellín para Antioquia (2013). Análisis de la supervivencia para las empresas constituidas en el período 2000- 2012. Revista Antioqueña de Economía y Desarrollo, No. 6, junio. http://goo.gl/ unFUaH, 13 de octubre de 2014.; Cámara de Comercio de Medellín para Antioquia (2014). Sociedad por Acciones Simplificadas –SAS-: Cinco años de vigencia de la Ley 1258 de 2008. Revista Antioqueña de Economía y Desarrollo, No. 9, julio. http://goo.gl/ fGUJwt, 18 de octubre de 2014.; Castaño, Carlos Eduardo, y Arias, José Enrique (2013). Análisis financiero integral de empresas colombianas 2009 - 2010: Perspectivas de Competitividad Regional, Entramado, Vol. 9, N° 1, enero - junio.; Congreso de la República de Colombia (2006). Ley 1014 de 2006: De fomento a la cultura del emprendimiento, Congreso de Colombia, Bogotá, enero 26 de 2006. http://goo.gl/CtCYwF, 18 de noviembre de 2013.; Correa, Jaime Andrés; Castaño, Carlos Eduardo, y Mesa, Ramón Javier (2010). Desempeño financiero empresarial en Colombia en 2009: un análisis por sectores. Perfil de Coyuntura Económica, No. 15, agosto.; Cultura E., (s.f.) Hacer empresa, qué buen negocio. http://goo.gl/0mOiB, 19 de octubre de 2014.; Curbelo, José Luis, y Peña, Iñaki (2012). Emprendimiento y Competitividad Regional.; Boletín de Estudios Económicos, Vol. LXVII, N° 205, abril.; Enekwe, Innocent; Okwo, Mar y, & Ordu, Matthew (2013). Financial Ratio Analysis as a Determinant of Profitability in Nigerian Pharmaceutical Industry. International Journal of Business and Management, Vol. 8, No. 8.; Erdogan, Aysa Ipek (2013). Applying Factor Analysis on the Financial Ratios of Turkey’s Top 500 Industrial Enterprises. International Journal of Business and Management, Vol. 8, No. 9.; Estupiñán, Rodrigo, y Estupiñán, Orlando (2006). Análisis financiero y de gestión. Bogotá: Ecoe ediciones.; Farrel, Larry (1998). Entrepreneurial Leadership. Journal of Profesional Human Resource Management, No. 11, abril.; Faruk, Mohammad Omar, & Alam, Rokshana (2014). A Comparative Financial Performance Analysis of Bangladeshi Private Commercial Banks. International Journal of Information, Business and Managenment, Vol. 6, No. 1.; Forero, Sandra; Chiviri, Edwin; Ortega, Karen; Quiroz, Oscar; Sarmiento, Viviana, y Torres, Jorge (2012). Lo que se avecina para la actividad edificadora. Estudios Económicos Camacol. Bogotá, diciembre. http://goo. gl/qkAbGB, 18 de octubre de 2014.; Forero, Sandra; Chiviri, Edwin; Salcedo, María Paula; Ortega, Karen; Rueda, Carlos Fernando; Sarmiento, Viviana, y Silva, Germán (2013). Hacia la consolidación del sector edificador en Colombia. Estudios Económicos Camacol. Bogotá, diciembre de 2013. http://goo. gl/dx4agr, 18 de octubre de 2014.; Francés, Antonio (2006). Estrategia y planes para la empresa: con el cuadro de mando integral. México: Pearson Educación.; Fraser, Lyn, & Or miston, Aileen (2004). Understanding Financial Statements. New Jersey: Pearson - Prentice Hall.; García, Oscar León (2009). Introducción al diagnóstico financiero. 18 de agosto de 2009. http://goo.gl/LT50d2, agosto de 2013.; Gitman, Laurence Jeffrey (2003). Principios de administración financiera. México: Pearson Educación.; Metrick, Andrew, & Yasuda, Ayako (2011). Venture Capital & the Finance of Innovation. United States of America.; Moscoso, Jenny (2015). Valoración de Empresas en Etapa Temprana de Financiación. Aplicación a Empresas Incubadas en Antioquia. Universidad Nacional de Colombia - Sede Medellín. Tomado de: http://www.bdigital.unal.edu. co/48742/1/43839488.2015.pdf; Municipio de Medellín (2004). Plan de Desarrollo 2004-2007: Medellín, Compromiso de Toda la Ciudadanía. Mayo. https://goo. gl/V5zVRf, 23 de mayo de 2015.; Municipio de Medellín (2012). Plan de Desarrollo 2012-2015: Medellín, un hogar para la vida. J julio. https://goo.gl/S3yhhH, 19 de octubre de 2014.; Ochoa, Salvador Aníbal, y Toscano, Juan Alfonso (2012). Revisión crítica de la literatura sobre el análisis financiero de las empresas. Noésis – Revista de Ciencias Sociales y Humanidades, Vol. 24, N° 41, enero - junio.; Ortiz, Héctor (2011). Análisis financiero aplicado y principios de administración financiera. Bogotá: Universidad Externado de Colombia.; Pandey, Indra Mohan (2010). Financial management. New Delhi: Vikas Publishing House PVT Ltd.; Portafolio.co (2012). Electrodomésticos sacan la cara por industria manufacturera. 12 de diciembre. http://goo.gl/WeufW5, 10 de octubre de 2014.; Portafolio.co (2013). Solo el 12 por ciento de las pymes tienen acceso al crédito. 05 de abril. http://goo.gl/L2oZvj, 11 de octubre de 2014.; Porter, Michael (1990). The Competitive Advantage of Nations. Harvard Bussines Review, marzo – abril.; Por ter, Michael (2008). Las cinco fuerzas competitivas que le dan forma a la estrategia. Harvard Bussines Review, Vol. 86, No. 1.; Potter, Kristin (2006). Methods for Presenting Statistical Information: The Box Plot a b c. Salt Lake City, Vis. Large Unstructured Data Sets, vol. 4.; Reynolds, Paul Davidson (1999). Creative Destruction: Source or Symptom of Economic Grouth? Acs, Zoltan; Carlsson, Bo; Karlsson, Charlie. Entrepreneurship, Small and Medium-Sized Enterprises and the Macroeconomy. Universidad de Cambridge.; Superintendencia de Industria y Comercio (2014). Comportamiento de las 1000 empresas más grandes del sector real. Mayo. http://goo. gl/mj559m, 12 de agosto de 2014.; Tailor, R.K. (2013). Financial Analysis: An Effective Tool of Performance Appraisal - A Case Study of Shree Cement Limited. Journal of Commerce & Management. Vol. IV-3; Tehrani, Reza; Mehragan, Mohammad Reza, & Golkani, Mohammad Reza (2012). Model for Evaluating Financial Performance of Companies by Data Envelopment Analysis: A Case Study of 36 Corporations Affiliated with a Private Organization. International Business Research, Vol. 5, No. 18.; Revistas - Ciencias Económicas, Administrativas y Contables; https://revistas.unilibre.edu.co/index.php/criteriolibre/article/view/1044

  10. 10
    Academic Journal
  11. 11
    Academic Journal
  12. 12
    Academic Journal
  13. 13
    Academic Journal
  14. 14
    Academic Journal
  15. 15
    Academic Journal
  16. 16
    Academic Journal
  17. 17
    Academic Journal
  18. 18
  19. 19
  20. 20