Mostrando 6 resultados de: 6
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(3)
Advances in Science, Technology and Engineering Systems(1)
Frontiers in Artificial Intelligence and Applications(1)
Information (Switzerland)(1)
Área temáticas
Ciencias de la computación(2)
Economía financiera(2)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Administración pública(1)
Analysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of security mechanisms to mitigate hacker attacks to improve e-commerce management in Ecuador
Conference ObjectAbstract: The problem that was chosen for the elaboration of this scientific article, is the distrust on the pPalabras claves:Cyber attacks, electronic commerce, ETHICAL HACKING, Multi-factor authentication, vulnerabilityAutores:Bertha Alice Naranjo Sanchez, Bertha Naranjo Sanchez, Mafla Gallegos L.E., Mera Caicedo H.A., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusModel to Optimize the Management of Strategic Projects Using Genetic Algorithms in a Public Organization
ArticleAbstract: Public organizations lack adequate models and methods to efficiently support and manage processes rePalabras claves:BPNN, Genetic Algorithm, information security, mathematical model, multi-objective optimization, NSGA-IIAutores:Gómez Díaz E.Z., Hifóng M.M.B., Maciel Arellano M.R., Mafla Gallegos L.E., Morales L.J.C., Orizaga Trejo J.A., Romero Izurieta R., Segundo Moisés Toapanta ToapantaFuentes:scopusSecurity and privacy in information management in a distributed environment for public organizations
Conference ObjectAbstract: Security and privacy problems in information management are evident in public organizations. The objPalabras claves:Distributed Environment, management, Privacy and Security, Public OrganizationsAutores:Bertha Alice Naranjo Sanchez, Mafla Gallegos L.E., Segundo Moisés Toapanta Toapanta, Terán Terranova Y.J.Fuentes:scopusPrototype for the management of engineering companies and the ICT to improve the quality of services
ArticleAbstract: Information on alternative technologies or new prototypes was analyzed to help improve the quality oPalabras claves:business management, Engineering, ICT Companies, Information Technologies, Prototype, quality of servicesAutores:Emmanuel Alejandro Narváez Picon, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopus