Toapanta T, Segundo Moises
64  Ergebnisse:
Personensuche X
?
1

Guide to Protect Home Routers from Cyber-Attacks and Inform..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
2

Educational Inclusion and its Meaning for the Achievement o..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
3

Gamification Analysis with Collaborative Methodology for Hi..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
4

Teacher's Perspective for the Implementation of Social Netw..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
5

Definition of a Prototype for Performing Computer Audits in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
6

Analysis of appropriate standards to solve cybersecurity pr..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
7

Parameters to Determine Cyberbullying in Social Networks in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
8

Appropriate Security Algorithms to Mitigate the Risks in a ..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
9

Prototype of an alignment model of the Ministry of Telecomm..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
10

An Approach of Security Model to Mitigate Risk of Cyberatta..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
11

Security Model for the Integration of the Ministry of Telec..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
12

A Cyber Environment Approach to Mitigate Vulnerabilities an..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
13

Prototype to Mitigate the Risks of the Integrity of Cyberat..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
14

Design of a Prototype for IT Security Architectures in a Pu..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
15

An Approach of Cyberattacks with the Use of Social Networks..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
1-15