Mostrando 6 resultados de: 6
Publisher
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(3)
Iberian Conference on Information Systems and Technologies, CISTI(2)
2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018(1)
Área temáticas
Ciencias de la computación(3)
Física aplicada(2)
Administración pública(1)
Criminología(1)
Dirección general(1)
How to obtaining keys in WLAN/WPS networks using wifislax and denial of services with kali linux
ArticleAbstract: The objective of this paper is to know what type of problem situations in terms of security can be fPalabras claves:attacks, ETHICAL HACKING, network, vulnerabilitiesAutores:Christian Muyón, Gabriela Vargas, Geovanni Ninahualpa Quiña, Teresa GuardaFuentes:scopusMitigation techniques for security vulnerabilities in web applications
ArticleAbstract: The security information has become an essential element of great consideration for the companies, sPalabras claves:mitigation, Software security, vulnerabilities, WEB APPLICATIONSAutores:Alex Zambrano, Edward Vladimir Haro Valenzuela, Geovanni Ninahualpa Quiña, Teresa GuardaFuentes:scopusWSN security applied to smart metering systems based on cryptography techniques
ArticleAbstract: The information security in WSN (Wireless Sensor Network) is essential to guarantee the integrity anPalabras claves:encryption, security, Topology, WSNAutores:Gabriel Patricio Luna Arias, Geovanni Ninahualpa Quiña, Liliana Patricia Marlés Valencia, Teresa GuardaFuentes:scopusRansomware - WannaCry Security is everyone's
Conference ObjectAbstract: Computer crimes are growing with the advancement of technology to a greater number of machines thatPalabras claves:Computer Viruses, Cybernetic, Malware, ransomware, Threats, WannaCryAutores:Alejandro Chuquilla, Geovanni Ninahualpa Quiña, Teresa GuardaFuentes:scopusProtocol of information recovery in solid hard drives - SSD using file carving techniques
Conference ObjectAbstract: This paper proposes protocol of information recovery in solid hard disks - SSD by means of the use oPalabras claves:Affectation scenario, Carver, File Carving, Methodology, ProtocolAutores:Geovanni Ninahualpa Quiña, Javier F. Díaz, Piccirilli D., Sang Guun Yoo, Teresa GuardaFuentes:scopusSoftware Quality Assessment Applied for the Governmental Organizations using ISO/IEC 25000
Conference ObjectAbstract: The objective of this paper is to share our experience in applying the ISO/IEC 25000 standard for thPalabras claves:alectronic mail, ISO/IEC 25000, software assessment, Software qualityAutores:Geovanni Ninahualpa Quiña, Nancy Velasquez Villagran, Roberto Carlos Bautista Ramos, Sang Guun YooFuentes:googlescopus