Mostrando 10 resultados de: 21
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(4)
IEEE Access(2)
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018(2)
2011 7th Latin American Network Operations and Management Symposium, LANOMS 2011(1)
2018 IEEE Colombian Conference on Communications and Computing, COLCOM 2018 - Proceedings(1)
Área temáticas
Programación informática, programas, datos, seguridad(7)
Métodos informáticos especiales(5)
Ingeniería sanitaria(3)
Física aplicada(2)
Interacción social(2)
Área de conocimiento
Ciencias de la computación(11)
Ciencia ambiental(5)
Red informática(5)
Contaminación del aire(4)
Ingeniería de software(3)
3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusA proposal for an improved distributed architecture for open pgp's web of trust
Conference ObjectAbstract: Security and authenticity issues were never considered when e-mail was originally designed and implePalabras claves:Cyber Security, Distributed arquitecture, Electronic mail, Openpgp, Pgp, QR codes, self-generated certificates, Web of trustAutores:Daniel Maldonado-Ruiz, Edison Loza-Aguirre, Jenny TorresFuentes:googlescopusA survey on identity management for the future network
ArticleAbstract: The Internet as a platform for ubiquitous communication has quickly advanced in the last years. NewPalabras claves:Future network, Identity Management, Network InfrastructureAutores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusBiologically inspired architecture for security management on wireless self-organized networks
Conference ObjectAbstract: This work presents SAMNAR, a survivable architecture for wireless self-organized networks (WSONs). SPalabras claves:Autores:Jenny Torres, Nogueira M., Pujolle G., Santos A.Fuentes:googlescopusCurrent Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey
ArticleAbstract: Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become the new IntePalabras claves:BKI, BLOCKCHAIN, Decentralised, Identity Management, PKI, Smart-contractsAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusData Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network
Conference ObjectAbstract: Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort,Palabras claves:air pollution, Business intelligence, data analytics, Data Mining, pattern recognition, wireless sensor networkAutores:Alyssa Cadena, Diego S. Benitez, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusTechnical mapping of the grooming anatomy using machine learning paradigms: An information security approach
ArticleAbstract: In the field of information security, there are several areas of study that are under development. SPalabras claves:APT, Cyber-pedophile, Grooming, pattern behavior, pedophile, social engineeringAutores:Jenny Torres, Luis Tello-Oquendo, Marco E. Benalcázar, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Roberto Omar Andrade, Rubeen Jacome, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusTowards a real-time air pollution monitoring systems implemented using wireless sensor networks: Preliminary results
Conference ObjectAbstract: This paper describes the preliminary results ob-tained towards the development of a Wireless sensorPalabras claves:air pollution, Co, CO 2, dust particles, H S 2, Methane, Monitoring, NO 2, Ozone, SO 2, WSN, Xbee, ZIGBEEAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusTrusted Phishing: A Model to Teach Computer Security Through the Theft of Cookies
Conference ObjectAbstract: Social engineering is a common practice to obtain information through the manipulation of users’ truPalabras claves:Cookies, JAVASCRIPT, social engineering, Vulnerable blog, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Paola ProañoFuentes:googlescopus