Toapanta, Segundo Moisés T.
64  Ergebnisse:
Personensuche X
?
1

An Approach of Security Model to Mitigate Risk of Cyberatta..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
2

Appropriate Security Algorithms to Mitigate the Risks in a ..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
3

Security Model for the Integration of the Ministry of Telec..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
4

Prototype of an alignment model of the Ministry of Telecomm..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
5

Definition of a Prototype for Performing Computer Audits in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
6

Analysis of appropriate standards to solve cybersecurity pr..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
7

Parameters to Determine Cyberbullying in Social Networks in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
8

Cybersecurity Analysis to Determine the Impact on the Socia..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
9

Definition of Parameters to Perform Audit in Cybersecurity ..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
10

A Cyber Environment Approach to Mitigate Vulnerabilities an..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
11

Design of a Prototype for IT Security Architectures in a Pu..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
12

Prototype to Mitigate the Risks of the Integrity of Cyberat..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
13

Analysis of Cybersecurity Models Suitable to Apply in an El..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
14

An Approach of Cyberattacks with the Use of Social Networks..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
15

An Approach of National and International Cybersecurity Law..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
1-15