Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(1)
International Journal of Electronic Business(1)
Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017(1)
Proceedings of the 2015 Science and Information Conference, SAI 2015(1)
Audit analysis models, security frameworks and their relevance for VoIP
Conference ObjectAbstract: Voice over IP (VoIP) is the transmission of voice and multimedia content over Internet Protocol (IP)Palabras claves:Attacks on VoIP, IT security audit, It security frameworks, Social engineering attacks, VoIP securityAutores:Gavilanez F., Oscar Gavilanez, Rodriguez Rafael G.D.Fuentes:scopusBring your own device: A survey of threats and security management models
ReviewAbstract: Bring your own device (BYOD) is used for the benefits offered by allowing the use of mobile devicesPalabras claves:Bring your own device, BYOD, Mobile security, Security management models, Security Policies, Security risk, social engineeringAutores:Fabricio R. Rivadeneira Zambrano, Rodriguez Rafael G.D.Fuentes:scopusDigital preservation and criminal investigation: A pending subject
Conference ObjectAbstract: Digital preservation is considered as a vital process in order to have long-term information; it hasPalabras claves:Criminal investigation, Digital Curation, Digital preservation, OAISAutores:Fernando T. Molina-Granja, Rodriguez Rafael G.D.Fuentes:googlescopusPreservation of digital evidence: Application in criminal investigation
Conference ObjectAbstract: Any digital device generates information that may become valuable evidence in the event of a cybercrPalabras claves:Digital document preservation, Digital evidence, Evidence preservationAutores:Fernando T. Molina-Granja, Rodriguez Rafael G.D.Fuentes:googlescopus