Personensuche
X
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
1
An Approach of Security Model to Mitigate Risk of Cyberatta..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
2
Appropriate Security Algorithms to Mitigate the Risks in a ..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
3
Security Model for the Integration of the Ministry of Telec..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
4
Prototype of an alignment model of the Ministry of Telecomm..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
5
Definition of a Prototype for Performing Computer Audits in..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
6
Analysis of appropriate standards to solve cybersecurity pr..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
7
Parameters to Determine Cyberbullying in Social Networks in..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
8
Cybersecurity Analysis to Determine the Impact on the Socia..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
9
Definition of Parameters to Perform Audit in Cybersecurity ..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
10
A Cyber Environment Approach to Mitigate Vulnerabilities an..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
11
Design of a Prototype for IT Security Architectures in a Pu..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
12
Prototype to Mitigate the Risks of the Integrity of Cyberat..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
13
Analysis of Cybersecurity Models Suitable to Apply in an El..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
14
An Approach of Cyberattacks with the Use of Social Networks..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
15