Mostrando 10 resultados de: 16
Filtros aplicados
Publisher
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(3)
2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015(1)
Applied Sciences (Switzerland)(1)
Communications in Computer and Information Science(1)
Electronics (Switzerland)(1)
Área temáticas
Ciencias de la computación(12)
Métodos informáticos especiales(4)
Física aplicada(3)
Administración pública y ciencia militar(1)
Ciencias políticas (Política y gobierno)(1)
Comparative analysis between different methodologies for performing computer security audits, applying the hierarchical analytical process (Ahp).
ArticleAbstract: Due to the threats and risks to which IT assets are exposed in organizations, it becomes very importPalabras claves:AHP, availability, Confidentiality, Integrity, Methodology, OsstmmAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Leonardo Chancay-García, Lytyet Fernández-Capestany, Marely Del Rosario Cruz-Felipe, Washington Xavier Garcia-QuilachaminFuentes:scopusA Computational Framework for Cyber Threats in Medical IoT Systems
ArticleAbstract: Smart social systems are ones where a number of individuals share and interact with each other via vPalabras claves:artificial model in social systems, Cyber Security, Intrusion detection system, SOCIAL NETWORKS, social system threatsAutores:Jorge Herrera-Tapia, Kerrache C.A., Rathee G., Saini H.Fuentes:googlescopusAcademic network design with QoS criteria
ArticleAbstract: Universities and higher education centers, due to their functional structure, have become places whePalabras claves:LAN Networks, quality of services, service quality metrics, Service quality techniques, WLAN NetworksAutores:Erick José Alcívar Villamarín, Jorge Herrera-Tapia, Marely Del Rosario Cruz FelipeFuentes:scopusAlgorithm in detection of the image of a person: Case study
ArticleAbstract: The technological revolution of the 21st century has contributed to energy efficiency. Whereas captuPalabras claves:algorithm, Cameras, Energy efficiency, Image detectionAutores:Cano J.E.S., Jorge Herrera-Tapia, Pro-Concepción L., Washington Xavier Garcia-QuilachaminFuentes:scopusFriendly-sharing: Improving the performance of city sensoring through contact-based messaging applications
ArticleAbstract: Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart CitiePalabras claves:Enabling communication technology, Human sensors, opportunistic networks, Smart citiesAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEvaluating the Impact of Data Transfer Time and Mobility Patterns in Opportunistic Networks
Conference ObjectAbstract: The Epidemic protocol is an effective way to achieve information diffusion in opportunistic networksPalabras claves:Evaluating opportunistic networks, Wireless Ad-hoc networks, wireless networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEvaluating the Impact of Data Transfer Time in Contact-Based Messaging Applications
ArticleAbstract: In this letter, we propose an analytical model based on delay differential equations (DDEs) to evaluPalabras claves:Contact-based Messaging, Epidemic diffusion, opportunistic networks, Performance evaluationAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P.Fuentes:googlescopusEvaluation of routing protocols for opportunistic networks in scenarios with high degree of people renewal
Conference ObjectAbstract: The performance of Opportunistic Networks relies mainly on users mobility. It is in fact mobility thPalabras claves:Ad hoc Network, Delay Tolerant Network, DTN, OppNets, Opportunistic Network, Routing protocolsAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Leonardo Chancay-García, Manzoni P.Fuentes:scopusOverview of service and deployment models offered by Cloud Computing, based on International Standard ISO/IEC 17788
ArticleAbstract: Cloud Computing offers services over the Internet to support business processes, based on deploymentPalabras claves:Applications, Cloud computing services models, Deployment models, Infraestructure, IT demand management, PlatformAutores:Alonso I.A., Jorge Herrera-Tapia, Washington Xavier Garcia-QuilachaminFuentes:googlescopusImplementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records
ArticleAbstract: The use of Electronic Health Record (EHR) systems has emerged with the continuous advancement of thePalabras claves:Access Control, biometric, BLOCKCHAIN, EHR, Fingerprint, HealthcareAutores:Al Baqari M., Barka E., Jorge Herrera-Tapia, Kerrache C.A.Fuentes:googlescopus