Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Conference Object(4)
Publisher
Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE(1)
IEEE Global Engineering Education Conference, EDUCON(1)
Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017(1)
Proceedings of the ACM Symposium on Applied Computing(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Programación informática, programas, datos, seguridad(2)
Ciencias de la computación(1)
Física aplicada(1)
Métodos informáticos especiales(1)
A case for open-source surveys (for assessing security literacy)
Conference ObjectAbstract: In this position paper we present the novel idea of using an open-source, community-based approach fPalabras claves:Collaborative survey, Open-source survey, securityAutores:Rafael I. BonillaFuentes:googlescopusA metric for measuring iot devices security levels
Conference ObjectAbstract: As the number of IoT devices continues to increase, so does the number of challenges we need to facePalabras claves:Internet-of-things, Metric, securityAutores:Juan J. Crow, Luigi S. Basantes, Luis G. Cruz, Rafael I. BonillaFuentes:googlescopusTowards an open-source web security survey applicable to university students
Conference ObjectAbstract: This work makes two contributions: (1) we propose the novel idea of using an open-source approach toPalabras claves:Collaborative survey, Open-source survey, securityAutores:Lenín Tenecela, Rafael I. Bonilla, Ruddy Moncayo, Washington VélezFuentes:googlescopusSELS: A secure E-mail List Service
Conference ObjectAbstract: Exchange of private information content among a large number of users via E-mail List Services is bePalabras claves:Electronic mail, Mailing List, securityAutores:Khurana H., Rafael I. Bonilla, Slagell A.Fuentes:googlescopus