Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
2017 4th International Conference on eDemocracy and eGovernment, ICEDEG 2017(2)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(2)
2019 3rd Cyber Security in Networking Conference, CSNet 2019(1)
Lecture Notes in Business Information Processing(1)
Proceedings - 3rd International Conference on Information Systems and Computer Science, INCISCOS 2018(1)
Área temáticas
Programación informática, programas, datos, seguridad(4)
Ciencias de la computación(3)
Funcionamiento de bibliotecas y archivos(3)
Criminología(1)
Física aplicada(1)
Área de conocimiento
Ciencias de la computación(5)
Ingeniería de software(2)
Minería de datos(1)
Red inalámbrica(1)
Red informática(1)
Origen
google(2)
Data cleaning technique for security logs based on Fellegi-Sunter theory
Conference ObjectAbstract: Information security is one of the most important aspects an organization should consider. Due to thPalabras claves:BIG DATA, cleaning, DATA, Fellegi-Sunter, securityAutores:Diana Martínez-Mosquera, Gabriel López, Santos L., Sergio Luján-MoraFuentes:scopusData harvesting from devices that support the snmp protocol: A practical approach
ArticleAbstract: Currently, data networks generate a large amount of information related to their status and operatioPalabras claves:harvest, Network Management, SNMPAutores:Carla Santorum, Díaz H. Marjury, Franklin L. Sánchez, Gabriel LópezFuentes:scopusOffline mobile application for places identification with augmented reality
Conference ObjectAbstract: As it can be seen in a developed society, the cities grow day to day, it gives the idea that in thePalabras claves:Augmented reality, Mobile application, places identification, Smart cities, TOURISM, vuforiaAutores:Barberán C. Karen, Diana Martínez-Mosquera, Díaz H. Marjury, Gabriel LópezFuentes:scopusInformation Security Management Frameworks in Higher Education Institutions: An Overview
Conference ObjectAbstract: An overview of academic articles focused on information security management (ISM) in higher educatioPalabras claves:framework, Higher Education Institution, information security, ISMFAutores:Dorys Quiroz, DORYS SOLEDAD QUIROZ CORRALES, Fabian Astudillo-Salinas, Franklin L. Sánchez, Gabriel López, Jorge Merchan-Lima, Luis Tello-OquendoFuentes:googlescopusSecurity analysis protocol for android-based mobile applications
ArticleAbstract: This document presents a testing protocol to evaluate security of mobile applications based on AndroPalabras claves:android, Data gathering, dynamic analysis, Mobile application, OWASP, security, Static AnalysisAutores:Franklin L. Sánchez, Gabriel López, José PalaciosFuentes:scopusVulnerability analysis toolkit for IEEE 802.11 wireless networks: A practical approach
Conference ObjectAbstract: This paper aims to propose a novel toolkit to assess the 10 main vulnerabilities of WiFi networks, wPalabras claves:OWISAM, security, Toolkit, WiFiAutores:Christian Tipantuña, Franklin L. Sánchez, Gabriel López, Santiago SimbanaFuentes:googlescopusPrivacy vulnerability analysis for Android Applications: A practical approach
Conference ObjectAbstract: This investigation proposes a methodology with a practical approach for privacy vulnerability analysPalabras claves:android, Mobile, OASAM, OWASP, privacy, securityAutores:Alejandro Argudo, Franklin L. Sánchez, Gabriel LópezFuentes:scopus