Mostrando 7 resultados de: 7
Publisher
Advances in Science, Technology and Engineering Systems(2)
CITS 2019 - Proceeding of the 2019 International Conference on Computer, Information and Telecommunication Systems(1)
Frontiers in Artificial Intelligence and Applications(1)
Proceedings - 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, AIAM 2019(1)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(1)
Área temáticas
Programación informática, programas, datos, seguridad(5)
Otros problemas y servicios sociales(2)
Ciencia militar(1)
Ciencias políticas (Política y gobierno)(1)
Criminología(1)
An immutable algorithm approach to improve the information security of a process for a public organization of Ecuador
ArticleAbstract: Currently, information security is among the main characteristics that must be achieved within the sPalabras claves:ALGORITHMS, Cryptography, securityAutores:Andrés Javier Bravo Jácome, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Security Algorithms for a Distributed Database
Conference ObjectAbstract: We analyzed the security of a database considering the environment of distributed systems, there arePalabras claves:algorithm flowcharts, data security, distributed database, security algorithms, security of the informationAutores:Daniel Humberto Plua Moran, Félix Gustavo Mendoza Quimí, Maciel Arellano M.R., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of the software most used by hackers to carry out penetration testing in public organizations
Conference ObjectAbstract: Currently, the software handled by hackers is the main one to tackle a series of empirical knowledgePalabras claves:HACKER, HACKING, Hacking tools, Malicious program, Public OrganizationsAutores:González R.F.P., Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis to pbkp_redict cybercrime using information technology in a globalized environment
Conference ObjectAbstract: Today, IT plays a key role in the information-intensive global economy. The application of computersPalabras claves:Data Mining, Decision trees introduction, Information Technologies, Pbkp_redictAutores:Cisnero Andrade B.E., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusA survey and an IoT cybersecurity recommendation for public and private hospitals in Ecuador
ArticleAbstract: It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluatPalabras claves:HEALTH, Information Assets, IoT Architecture, IoT Cybersecurity, Public Hospital and PrivateAutores:Joseline Roxana Neira Melendrez, Luis Neira Clemente, Máximo Giovani Tandazo EspinozaFuentes:googlescopusModel of shared secret applied to a voting system for the national electoral council of Ecuador
Conference ObjectAbstract: The vote is one of the pillars of Democracy to make the decision to choose different dignities, ICTsPalabras claves:electronic vote, information security, National Electoral Council of Ecuador, Secret sharing, voting systemAutores:Félix Gustavo Mendoza Quimí, Luis Antonio Palomino Romero, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusProposal of a model to apply hyperledger in digital identity solutions in a public organization of Ecuador
Conference ObjectAbstract: The blockchain technology and its platforms applied in different business scenarios and the reasonsPalabras claves:BLOCKCHAIN, Blockchain Network, digital identity, HYPERLEDGER, PUBLIC ORGANIZATIONAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopus