Mostrando 6 resultados de: 6
Filtros aplicados
Subtipo de publicación
Conference Object(6)
Área temáticas
Ciencias de la computación(2)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Administración pública y ciencia militar(1)
Ciencia militar(1)
A BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCritical Factors of Business Adaptability During Resilience in Baños de Agua Santa, Ecuador, Due to Volcanic Hazards
Conference ObjectAbstract: Resilience is understood as dynamic learning ability, self-organization, and adaptability of a systePalabras claves:Adaptability, Disaster management, Female entrepreneurship, resilienceAutores:Eddy Castillo Montesdeoca, Giovanni Herrera-Enríquez, Rodríguez-Rodríguez G., Theofilos ToulkeridisFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusData Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network
Conference ObjectAbstract: Air pollution is a problem that causes adverse effects, which tends to interfere with human comfort,Palabras claves:air pollution, Business intelligence, data analytics, Data Mining, pattern recognition, wireless sensor networkAutores:Alyssa Cadena, Diego S. Benitez, Jenny Torres, Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:googlescopusMalware Security Evasion Techniques: An Original Keylogger Implementation
Conference ObjectAbstract: The current study evaluates the malware life cycle and develops a keylogger that can avoid Windows 1Palabras claves:Evasion techniques, Keylogger, MalwareAutores:CARLOS ANDRES ESTRADA VASQUEZ, Cuervo M.C., Royo Á.A., Sánchez-Rubio M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusReal-time air pollution monitoring systems using wireless sensor networks connected in a cloud-computing, wrapped up web services
Conference ObjectAbstract: Air pollution continues to grow at an alarming rate, decreasing the quality of life around the worldPalabras claves:air pollution, IAAS, IOT, WEB SERVICES, WSNAutores:Byron Guanochanga, CÉSAR VILLACÍS, Diego S. Benitez, Fausto Meneses, Jenny Torres, Rolando Cachipuendo, Santiago Salvador, Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus