Sergio Mauricio Martínez Monterrubio
YOU?
Author Swipe
View article: New ESVIT Software for IT Security Policy Verification in Production Systems
New ESVIT Software for IT Security Policy Verification in Production Systems Open
Computer security policies are relatively new to many organisations, particularly regarding their Information Security Management Systems (ISMS). Although their conceptual origins date back to the 1980s, verifying these policies computatio…
View article: THREATMOSAIC: collection, curation and enrichment of indicators of compromise (IOCs)
THREATMOSAIC: collection, curation and enrichment of indicators of compromise (IOCs) Open
In this research an experimental software is developed for the classification, analysis and enrichment of indicators of compromise (IOCs), codenamed THREATMOSAIC. This software can import IOCs in bulk, classifying them according to whether…
View article: Explainable Machine Learning Prediction for COVID-19 Mortality in the Colombian Population
Explainable Machine Learning Prediction for COVID-19 Mortality in the Colombian Population Open
The COVID-19 pandemic, which began in late 2019, has become a global public health problem, resulting in large numbers of infections and deaths. One of the greatest challenges in dealing with the disease is to identify those people who are…
View article: Methodology for Computer Security Incident Response Teams into IoT Strategy
Methodology for Computer Security Incident Response Teams into IoT Strategy Open
At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveilla…
View article: Explainable Machine Learning Prediction for Mortality of COVID-19 in the Colombian Population
Explainable Machine Learning Prediction for Mortality of COVID-19 in the Colombian Population Open
The COVID-19 pandemic, which began in late 2019, has become a global public health problem, resulting in large numbers of people infected and dead. One of the greatest challenges in dealing with the disease is to identify those people who …
View article: Anomaly-Based Intrusion Detection
Anomaly-Based Intrusion Detection Open
Anomaly-based intrusion detection has become an indispensable player on the existing cybersecurity landscape, where it enables the identification of suspicious behaviors that significantly differ from normal activities. In this way, it is …
View article: Explainable Prediction of Chronic Renal Disease in the Colombian Population Using Neural Networks and Case-Based Reasoning
Explainable Prediction of Chronic Renal Disease in the Colombian Population Using Neural Networks and Case-Based Reasoning Open
This paper presents a neural network-based classifier to predict whether a person is at risk of developing chronic kidney disease (CKD). The model is trained with the demographic data and medical care information of two population groups: …