Titulo |
Descripción |
Año |
Security controls for Android |
4th International Conference on Computational Aspects of Social Networks, CASoN 2012 |
2012 |
Measurements and Analysis of a Denial of Service Attack by Resource Flood |
4th International Conference on Computational Aspects of Social Networks, CASoN 2012 |
2012 |
Design and implementation of an electronic voting system for choosing the position of advisor student in a university |
IEEE Electronics, Robotics and Automotive Mechanics Conference, CERMA 2011 |
2011 |
Network forensics with neurofuzzy techniques |
Midwest Symposium on Circuits and Systems; 2009 52nd IEEE International Midwest Symposium on Circuits and Systems, MWSCAS '09 |
2009 |
A novel sound based covert channel on Android |
ENCUENTRO NACIONAL DE CIENCIAS DE LA COMPUTACIÓN SMCC ENC 2014 Nova Universitas |
2014 |
Taxonomy for Denial-of-Service Vulnerabilities in the Linux Kernel
|
ENCUENTRO NACIONAL DE CIENCIAS DE LA COMPUTACIÓN SMCC ENC 2014 Nova Universitas |
2014 |
Providing Privacy through Anonymity in Location Based Services |
IEEE Latin-America Conference on Comunication LATINCOM 2014 |
2014 |
Confidentiality for Hadoop Distributed File System (HDFS)
|
ENCUENTRO NACIONAL DE CIENCIAS DE LA COMPUTACIÓN SMCC ENC 2015 |
2015 |
Security Testing by Attack Injection Survey |
ENCUENTRO NACIONAL DE CIENCIAS DE LA COMPUTACIÓN SMCC ENC 2015 |
2015 |
Image compressive sensing cryptographic analysis |
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Towards a 2-hybrid Android malware detection test framework
|
26th IEEE International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2016 |
Improving Android mobile application development by dissecting malware analysis data |
4th International Conference in Software Engineering Research and Innovation (CONISOFT’16) |
2016 |
GARMDROID: IoT potential security threats analysis through the inference of Android applications hardware feature requirements |
International Summit on Applications for Future Internet, AFI 2016 |
2016 |
Feature selection to detect botnets using machine learning algorithms |
International Conference on Electronics, Communications and Computers (CONIELECOMP) |
2017 |
Possible Keyloggers Without Implementing a Keyboard in Android |
13th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2017 |
2018 |
Security Oriented Methodology for Designing Internet of Things Systems |
1st EAI International Conference on Smart Technology, MTYMEX 2017 |
2017 |
Distributing computing in the internet of things: Cloud, fog and edge computing overview |
Numerical and Evolutionary Optimization Workshop NEO 2016 and the NEO Cities 2016 Workshop |
2016 |
IoT Botnets |
8th International Congress on Telematics and Computing, WITCOM 2019 |
2019 |
Availability vulnerabilities evaluation to lorawan |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Machine learning security assessment method based on adversary and attack methods |
9th International Congress on Telematics and Computing, WITCOM 2020 |
2020 |
Página 1 de 2, Viendo 20 registros de 28 en total, Registro inicial 1, registro final 20.