Mostrando 8 resultados de: 8
Publisher
Advances in Intelligent Systems and Computing(1)
Communications in Computer and Information Science(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Lecture Notes in Networks and Systems(1)
Área temáticas
Ciencias de la computación(6)
Métodos informáticos especiales(4)
Escuelas y sus actividades; educación especial(1)
Funcionamiento de bibliotecas y archivos(1)
Instrumentos de precisión y otros dispositivos(1)
Auditoría de seguridad informática siguiendo la metodología OSSTMMv3: caso de estudio
OtherAbstract: Este artículo explica la metodología utilizada en una auditoría de seguridad informática, tomando coPalabras claves:Autores:Carlos Pupiales-Yépez, César Moreira-Zambrano, Cristian Bracho-Ortega, Diego Peluffo-Ordóñez, Fabián Cuzme-Rodríguez, I. C. Marrufo-Rodríguez, Luis Suárez-ZambranoFuentes:googlerraaeEl internet de las cosas y las consideraciones de seguridad
OtherAbstract: La presente investigación se centra en el estudio de las consideraciones de seguridad en el InternetPalabras claves:Autores:I. C. Marrufo-RodríguezFuentes:googleOffensive Security: Ethical Hacking Methodology on the Web
Conference ObjectAbstract: The implementation of security measures in IT directorates within Higher Education Institutions (IESPalabras claves:Assurance of information, Crime, Cyber attacks, ETHICAL HACKINGAutores:Hernán Mauricio Domínguez-Limaico, I. C. Marrufo-Rodríguez, Luis Suárez-Zambrano, Marcelo Wladimir León GudiñoFuentes:googlescopusInfraestructura Hiperconvergente definida por software seguridad y evolución del centro de datos
OtherAbstract: En esta publicación se presentan los resultados de la implementación de una Infraestructura definidaPalabras claves:Autores:I. C. Marrufo-RodríguezFuentes:googleIntroducing the Concept of Interaction Model for Interactive Dimensionality Reduction and Data Visualization
Conference ObjectAbstract: This letter formally introduces the concept of interaction model (IM), which has been used either diPalabras claves:data visualization, Dimensionality reduction, Interaction model, Kernel functionsAutores:Ana C. Umaquinga-Criollo, Diego Hernán Peluffo-Ordóñez, Hasperué W., I. C. Marrufo-Rodríguez, M. A. Páez-Jaime, MacArthur Ortega-Bustamante, Martín Vélez-Falconí, Paul D. Rosero-MontalvoFuentes:scopusIntruder Detection System Based Artificial Neural Network for Software Defined Network
Conference ObjectAbstract: This paper shows the implementation of an Intruder Detection System (IDS) integrated into an ArtificPalabras claves:Active type attacks, Artificial Neural Network, Hacker circle, Intrusion detection system, PDCA model, Software Defined Network SDNAutores:Edgar Maya-Olalla, Hernán Mauricio Domínguez-Limaico, I. C. Marrufo-Rodríguez, Marcelo Zambrano-Vizuete, Willams Nicolalde QuilcaFuentes:googlescopusUnderwater Wireless Sensor Networks and Cryptographic Applications
Conference ObjectAbstract: Underwater wireless sensor networks (UWSNs) are a technology that is gaining ground in the field ofPalabras claves:Cryptography, Terrestrial wireless sensor networks (TWSNs), Underwater sensor networks (UWSNs)Autores:Henry Farinango-Endara, Hernán Mauricio Domínguez-Limaico, I. C. Marrufo-Rodríguez, Luque-Nieto M.Á., Otero P.Fuentes:googlescopusSecurity in smart objects, a general view at the physical and logical level
OtherAbstract: In this research we addressed an issue of big importance with regard to information and computer sciPalabras claves:Autores:I. C. Marrufo-Rodríguez, INNOVATION & DEVELOPMENT IN ENGINEERING AND APPLIED SCIENCES (IDEAS)Fuentes:google