Mostrando 5 resultados de: 5
Filtros aplicados
Subtipo de publicación
Conference Object(5)
Área temáticas
Ciencias de la computación(2)
Programación informática, programas, datos, seguridad(2)
Administración pública y ciencia militar(1)
Ciencias políticas (Política y gobierno)(1)
Comercio, comunicaciones, transporte(1)
Cookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusDrivers and Barriers for Open Government Data Adoption: An Isomorphic Neo-Institutional Perspective
Conference ObjectAbstract: By making government data available to all, Open Government Data (OGD) initiatives promote transparePalabras claves:adoption, Information Systems, Isomorphic pressures, Neo-Institutional theory, Open government dataAutores:Edison Loza-Aguirre, Henry N. Roa, Pamela FloresFuentes:googlescopusHow Does Grooming Fit into Social Engineering?
Conference ObjectAbstract: In this research, we propose to formally include the technique of grooming within the processes ofPalabras claves:Autores:Jenny Torres, Pamela Flores, Patricio ZambranoFuentes:googlescopusMigration of Monolithic Applications Towards Microservices Under the Vision of the Information Hiding Principle: A Systematic Mapping Study
Conference ObjectAbstract: Organizations throughout time accumulate applications, which, given their old age, are generally desPalabras claves:decomposition, microservice, Migrate, MIGRATION, modernization, MonolithicAutores:Jenny Torres, Pamela Flores, Victor VelepuchaFuentes:googlescopusTrusted Phishing: A Model to Teach Computer Security Through the Theft of Cookies
Conference ObjectAbstract: Social engineering is a common practice to obtain information through the manipulation of users’ truPalabras claves:Cookies, JAVASCRIPT, social engineering, Vulnerable blog, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Paola ProañoFuentes:googlescopus