Mostrando 4 resultados de: 4
Publisher
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(1)
Lecture Notes in Business Information Processing(1)
Proceedings - 3rd International Conference on Information Systems and Computer Science, INCISCOS 2018(1)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(1)
Área temáticas
Ciencias de la computación(2)
Funcionamiento de bibliotecas y archivos(2)
Criminología(1)
Física aplicada(1)
Organizaciones generales en Norteamérica(1)
Data cleaning technique for security logs based on Fellegi-Sunter theory
Conference ObjectAbstract: Information security is one of the most important aspects an organization should consider. Due to thPalabras claves:BIG DATA, cleaning, DATA, Fellegi-Sunter, securityAutores:Diana Martínez-Mosquera, Gabriel López, Santos L., Sergio Luján-MoraFuentes:scopusSecurity analysis protocol for android-based mobile applications
ArticleAbstract: This document presents a testing protocol to evaluate security of mobile applications based on AndroPalabras claves:android, Data gathering, dynamic analysis, Mobile application, OWASP, security, Static AnalysisAutores:Franklin L. Sánchez, Gabriel López, José PalaciosFuentes:scopusVulnerability analysis toolkit for IEEE 802.11 wireless networks: A practical approach
Conference ObjectAbstract: This paper aims to propose a novel toolkit to assess the 10 main vulnerabilities of WiFi networks, wPalabras claves:OWISAM, security, Toolkit, WiFiAutores:Christian Tipantuña, Franklin L. Sánchez, Gabriel López, Santiago SimbanaFuentes:googlescopusPrivacy vulnerability analysis for Android Applications: A practical approach
Conference ObjectAbstract: This investigation proposes a methodology with a practical approach for privacy vulnerability analysPalabras claves:android, Mobile, OASAM, OWASP, privacy, securityAutores:Alejandro Argudo, Franklin L. Sánchez, Gabriel LópezFuentes:scopus