Mostrando 10 resultados de: 16
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(2)
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(2)
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017(1)
2020 Congreso Internacional de Innovacion y Tendencias en Ingenieria, CONIITI 2020 - Conference Proceedings(1)
Advances in Intelligent Systems and Computing(1)
Área temáticas
Dirección general(4)
Derechos civiles y políticos(2)
Escuelas y sus actividades; educación especial(2)
Física aplicada(2)
Comunidades(1)
Área de conocimiento
Ciencias de la computación(8)
Base de datos(4)
Algoritmo(1)
Ciencias sociales(1)
Gestión(1)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(13)
ODS 16: Paz, justicia e instituciones sólidas(9)
ODS 17: Alianzas para lograr los objetivos(7)
ODS 8: Trabajo decente y crecimiento económico(7)
ODS 11: Ciudades y comunidades sostenibles(1)
Origen
scopus(16)
A hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusBiometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn approach of efficient security algorithms for distribute architectures
Conference ObjectAbstract: We analyzed the security algorithms considered as more efficient to mitigate the vulnerabilities andPalabras claves:ALGORITHMS, Cryptography, Database, Distributed architecture, Security modelsAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach to information security by applying a conceptual model of identities in smart cities projects
ArticleAbstract: It analyzed different projects of intelligent cities related to information security were analyzed tPalabras claves:Identity Models, INFORMATION MANAGEMENT, information security, Integrity of information, SmaJt cities, vulnerabilitiesAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of Artificial Intelligence Applied in Virtual Learning Environments in Higher Education for Ecuador
Conference ObjectAbstract: Artificial intelligence in virtual learning environments in higher education for Ecuador continues tPalabras claves:Artificial Intelligence, higher education, Learning, virtual environmentsAutores:Chávez E.E.O., Díaz E.Z.G., Segundo Moisés Toapanta Toapanta, Vizuete O.M.Z.Fuentes:scopusAnalysis of cybersecurity models suitable to apply in an electoral process in ecuador
Conference ObjectAbstract: Were analyzed different cybersecurity proposals to protect information, such as models, prototypes,Palabras claves:cyberattack, Cybersecurity Models, Electoral Process, Security Information, Threat modelAutores:Luis Enrique Mafla Gallegos, Manuel Agustin Aycart Armijos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of the Appropriate Security Models to Apply in a Distributed Architecture
Conference ObjectAbstract: The availability of information generated on a large scale has allowed sharing without considering tPalabras claves:Autores:Enrique Mafla, Mendoza F., Nazareno J., Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAlgorithms for efficient biometric systems to mitigate the integrity of a distributed database
Conference ObjectAbstract: The problems of information security are persistent in the business environment and public and privaPalabras claves:algorithm, biometric, DTW, HMM, Integrity, ORB, SIFT, SurfAutores:Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn Approach to Cybersecurity, Cyberbullying in Social Networks and Information Security in Public Organizations during a Pandemic: Study case COVID-19 Ecuador
Conference ObjectAbstract: The problems of cybersecurity, cyberbullying in social networks worldwide are persistent and increasPalabras claves:COVID-19 Ecuador, CYBERSECURITY, Ecuadorian Wuhan, information security, Psychological Impact, SOCIAL NETWORKSAutores:Javier Alfredo Espinoza Carpio, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopus