Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
Lecture Notes in Networks and Systems(1)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA(1)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(1)
Comparative analysis between different methodologies for performing computer security audits, applying the hierarchical analytical process (Ahp).
ArticleAbstract: Due to the threats and risks to which IT assets are exposed in organizations, it becomes very importPalabras claves:AHP, availability, Confidentiality, Integrity, Methodology, OsstmmAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Leonardo Chancay-García, Lytyet Fernández-Capestany, Marely Del Rosario Cruz-Felipe, Washington Xavier Garcia-QuilachaminFuentes:scopusEvaluation of routing protocols for opportunistic networks in scenarios with high degree of people renewal
Conference ObjectAbstract: The performance of Opportunistic Networks relies mainly on users mobility. It is in fact mobility thPalabras claves:Ad hoc Network, Delay Tolerant Network, DTN, OppNets, Opportunistic Network, Routing protocolsAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Leonardo Chancay-García, Manzoni P.Fuentes:scopusSecurity Mechanisms and Log Correlation Systems
Conference ObjectAbstract: This study proposes several security measures to protect the integrity of the information and avoidPalabras claves:CYBERSECURITY, Cybersecurity strategy, Cyberspace, log, SIEMAutores:Cesar Moreira-Zambrano, Jose Villacreses-Chancay, Josselyn Pita-Valencia, Josselyn Stefania Pita Valencia, Leonardo Chancay-García, Mora-Cruzatty A.Fuentes:googlescopus