Mostrando 10 resultados de: 21
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(3)
Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018(2)
2011 7th Latin American Network Operations and Management Symposium, LANOMS 2011(1)
2017 1st Cyber Security in Networking Conference, CSNet 2017(1)
2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018(1)
Área temáticas
Ciencias de la computación(10)
Programación informática, programas, datos, seguridad(7)
Criminología(4)
Funcionamiento de bibliotecas y archivos(3)
Interacción social(3)
Área de conocimiento
Ciencias de la computación(13)
Red informática(3)
Psicología social(2)
Análisis de datos(1)
Aprendizaje automático(1)
3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusA proposal for an improved distributed architecture for open pgp's web of trust
Conference ObjectAbstract: Security and authenticity issues were never considered when e-mail was originally designed and implePalabras claves:Cyber Security, Distributed arquitecture, Electronic mail, Openpgp, Pgp, QR codes, self-generated certificates, Web of trustAutores:Daniel Maldonado-Ruiz, Edison Loza-Aguirre, Jenny TorresFuentes:googlescopusA structured approach to guide the development of incident management capability for security and privacy
Conference ObjectAbstract: The growth and evolution of threats, vulnerabilities, and cyber-attacks increase security incidentsPalabras claves:CSIRT, CYBERSECURITY, Incident Management, information security, privacyAutores:Alyssa Cadena, Jenny Torres, Luis Tello-Oquendo, Nicolay Samaniego Erazo, Roberto Omar Andrade, Tapia Freddy, Walter FuertesFuentes:scopusA survey on identity management for the future network
ArticleAbstract: The Internet as a platform for ubiquitous communication has quickly advanced in the last years. NewPalabras claves:Future network, Identity Management, Network InfrastructureAutores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopusCognitive security tasks using big data tools
Conference ObjectAbstract: The present work focuses on analyzing the opportunities that emerging Big data technologies offer toPalabras claves:Big-data, cognitive security, Incident reponse, Security operations, situation awarenessAutores:Jenny Torres, Luis Tello-Oquendo, Roberto Omar AndradeFuentes:googlescopusBiologically inspired architecture for security management on wireless self-organized networks
Conference ObjectAbstract: This work presents SAMNAR, a survivable architecture for wireless self-organized networks (WSONs). SPalabras claves:Autores:Jenny Torres, Nogueira M., Pujolle G., Santos A.Fuentes:googlescopusBotHook: An option against Cyberpedophilia
Conference ObjectAbstract: This study presents BotHook, a cyber pedophile trend characterization platform and a hook for computPalabras claves:ChatBot, Cyberpedophile, CYBERSECURITYAutores:Jenny Torres, Marco Sánchez, Patricio Xavier Zambrano Rodríguez, Patricio Zambrano, Walter FuertesFuentes:googlescopusCookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier
Conference ObjectAbstract: Cross-Site Scripting (XSS) attack is a vulnerability typical of Web applications, where malicious scPalabras claves:BEEf, Cookies, Hook, JAVASCRIPT, XSSAutores:Eduardo Benavides-Astudillo, Germán Rodríguez-Galán, Jenny Torres, Pamela Flores, Walter FuertesFuentes:googlescopusAn Innovative and Decentralized Identity Framework Based on Blockchain Technology
Conference ObjectAbstract: Network users usually need a third party validation to prove that they are who they claim to be. AutPalabras claves:BLOCKCHAIN, certificate, CYBERSECURITY, ECC, Identities, self-generated identityAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusAnálisis de la planificación curricular anual de unidad didáctica y de lección de los estudios sociales del ciclo básico del colegio técnico Carmen Mora de Encalada y el colegio José Ochoa León de la ciudad de Pasaje provincia de El Oro durante el año lectivo 1997 - 1998
Bachelor ThesisAbstract:Palabras claves:Educacion Secundaria, Estudios Sociales, licenciado en ciencias de la educación Mención pedagogía - Tesis y disertaciones académicas, Planificacion CurricularAutores:Francia Azucena Seminario Andrade, Jenny Torres, Liliam Verónica Aguilar González, Mabel Soledad Batallas BritoFuentes:rraae