Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
2021 IEEE URUCON, URUCON 2021(1)
2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings(1)
ETCM 2021 - 5th Ecuador Technical Chapters Meeting(1)
Pontificia Universidad Católica del Ecuador(1)
Proceedings of the 2021 IEEE Engineering International Research Conference, EIRCON 2021(1)
Comparative analysis of Cybersecurity mechanisms in SD-WAN architectures: A preliminary results
Conference ObjectAbstract: Software-defined network in a wide area network (SD-WAN) has become a trend applied by large companiPalabras claves:CYBERSECURITY, Flexiwan, Fortigate, Software-Defined Wide Area Network (SD-WAN)Autores:Diego Fernando Avila-Pesantez, Jorge Rodriguez BustamanteFuentes:googlescopusBlockchain and IoT-Challenges and Its Role in Security: A Brief Overview
Conference ObjectAbstract: Versatility is the main intrinsic characteristic of Blockchain, making this technology applicable toPalabras claves:BLOCKCHAIN, Challenges, ENVIRONMENTS, IOT, securityAutores:Diego Fernando Avila-Pesantez, Jefferson Yallico TapiaFuentes:googlescopusCybersecurity Study in 5G Network Slicing Technology: A Systematic Mapping Review
Conference ObjectAbstract: Fifth-generation (5G) wireless technologies are characterized by high-speed transmission and greaterPalabras claves:5G network, CYBERSECURITY, Network Slicing technology, Systematic ReviewAutores:Diego Fernando Avila-Pesantez, Javier Cáceres-HidalgoFuentes:scopusEvaluation of 6PE and 6VPE techniques in MPLS-VPN networks for video streaming
Conference ObjectAbstract: The work aims to evaluate the performance of the 6PE and 6VPE techniques for infrastructure VPNs MPLPalabras claves:6PE, 6VPE, MPLS-VPN core, Video streamingAutores:Alberto Arellano-Aucancela, Diego Fernando Avila-Pesantez, Yautibug Coro A.L.Fuentes:scopusPropuesta de mejores prácticas de ciberseguridad para la comunicación en redes de clientes corporativos
Master ThesisAbstract: El incremento del uso del servicio de internet y conectividad entre agencias mediante una red de datPalabras claves:CIBERSEGURIDAD. VULNERABILIDAD. POLÍTICAS.Autores:Diego Fernando Avila-Pesantez, Elías Fernando Allauca CarrilloFuentes:rraaeSmart Home IoT Cybersecurity Survey: A Systematic Mapping
Conference ObjectAbstract: Integrating Internet of Things (IoT) technology in smart homes has brought about significant automatPalabras claves:Cyber attacks, CYBERSECURITY, Smart Home Internet of Things (SHIoT), Systematic mappingAutores:Diego Fernando Avila-Pesantez, Leonardo Ayavaca-VallejoFuentes:scopus