Mostrando 10 resultados de: 16
Filtros aplicados
Publisher
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(3)
2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015(1)
Applied Sciences (Switzerland)(1)
Communications in Computer and Information Science(1)
Electronics (Switzerland)(1)
Área temáticas
Ciencias de la computación(12)
Métodos informáticos especiales(4)
Física aplicada(3)
Administración pública y ciencia militar(1)
Ciencias políticas (Política y gobierno)(1)
Área de conocimiento
Red informática(7)
Comunicación(2)
Simulación por computadora(2)
Visión por computadora(2)
Auditoría(1)
A Computational Framework for Cyber Threats in Medical IoT Systems
ArticleAbstract: Smart social systems are ones where a number of individuals share and interact with each other via vPalabras claves:artificial model in social systems, Cyber Security, Intrusion detection system, SOCIAL NETWORKS, social system threatsAutores:Jorge Herrera-Tapia, Kerrache C.A., Rathee G., Saini H.Fuentes:googlescopusComparative analysis between different methodologies for performing computer security audits, applying the hierarchical analytical process (Ahp).
ArticleAbstract: Due to the threats and risks to which IT assets are exposed in organizations, it becomes very importPalabras claves:AHP, availability, Confidentiality, Integrity, Methodology, OsstmmAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Leonardo Chancay-García, Lytyet Fernández-Capestany, Marely Del Rosario Cruz-Felipe, Washington Xavier Garcia-QuilachaminFuentes:scopusAcademic network design with QoS criteria
ArticleAbstract: Universities and higher education centers, due to their functional structure, have become places whePalabras claves:LAN Networks, quality of services, service quality metrics, Service quality techniques, WLAN NetworksAutores:Erick José Alcívar Villamarín, Jorge Herrera-Tapia, Marely Del Rosario Cruz FelipeFuentes:scopusAlgorithm in detection of the image of a person: Case study
ArticleAbstract: The technological revolution of the 21st century has contributed to energy efficiency. Whereas captuPalabras claves:algorithm, Cameras, Energy efficiency, Image detectionAutores:Cano J.E.S., Jorge Herrera-Tapia, Pro-Concepción L., Washington Xavier Garcia-QuilachaminFuentes:scopusFriendly-sharing: Improving the performance of city sensoring through contact-based messaging applications
ArticleAbstract: Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart CitiePalabras claves:Enabling communication technology, Human sensors, opportunistic networks, Smart citiesAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusImplementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records
ArticleAbstract: The use of Electronic Health Record (EHR) systems has emerged with the continuous advancement of thePalabras claves:Access Control, biometric, BLOCKCHAIN, EHR, Fingerprint, HealthcareAutores:Al Baqari M., Barka E., Jorge Herrera-Tapia, Kerrache C.A.Fuentes:googlescopusImproving message delivery performance in opportunistic networks using a forced-stop diffusion scheme
Conference ObjectAbstract: The performance of mobile opportunistic networks strongly depends on contact duration. If the contacPalabras claves:Adhoc opportunistic networks, Data transfer, DTN, Epidemic protocol, Wireless adhoc networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEvaluating the Impact of Data Transfer Time and Mobility Patterns in Opportunistic Networks
Conference ObjectAbstract: The Epidemic protocol is an effective way to achieve information diffusion in opportunistic networksPalabras claves:Evaluating opportunistic networks, Wireless Ad-hoc networks, wireless networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEvaluating the Impact of Data Transfer Time in Contact-Based Messaging Applications
ArticleAbstract: In this letter, we propose an analytical model based on delay differential equations (DDEs) to evaluPalabras claves:Contact-based Messaging, Epidemic diffusion, opportunistic networks, Performance evaluationAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P.Fuentes:googlescopusEvaluation of routing protocols for opportunistic networks in scenarios with high degree of people renewal
Conference ObjectAbstract: The performance of Opportunistic Networks relies mainly on users mobility. It is in fact mobility thPalabras claves:Ad hoc Network, Delay Tolerant Network, DTN, OppNets, Opportunistic Network, Routing protocolsAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Leonardo Chancay-García, Manzoni P.Fuentes:scopus