Rivera, Vanessa
20  results:
Search for persons X
?
1

Detection of Phishing in Mobile Instant Messaging Using Nat..:

, In: 2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT),
 
?
2

Protecting Users' Identity Against Browser Fingerprinting:

, In: 2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT),
 
?
3

Protecting User Credentials against SQL Injection through C..:

, In: 2022 10th International Conference in Software Engineering Research and Innovation (CONISOFT),
 
?
4

Android-based Smartphone Malware Exploit Prevention Using a..:

, In: 2022 10th International Conference in Software Engineering Research and Innovation (CONISOFT),
 
?
5

Towards an Efficient Log Data Protection in Software System..:

, In: 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT),
 
?
6

Towards an Efficient Performance Testing Through Dynamic Wo..:

, In: Testing Software and Systems; Lecture Notes in Computer Science,
 
?
7

DYNAMOJM: A JMeter Tool for Performance Testing Using Dynam..:

, In: Testing Software and Systems; Lecture Notes in Computer Science,
 
?
8

One Size Does Not Fit All : In-Test Workload Adaptation ..:

, In: Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering,
 
?
9

Environmental Awareness: A Quantitative Analysis in Enginee..:

, In: 2023 International Symposium on Accreditation of Engineering and Computing Education (ICACIT),
 
?
10

Contributors:

, In: Seafloor Geomorphology as Benthic Habitat,
Acosta, Juan ; Allee, Rebecca J. ; Althaus, Franziska... - p. xxxi-xlv , 2012
 
?
11

Cultural Neuropsychology Considerations in the Diagnosis of..:

, In: Neurocognitive Complications of HIV-Infection; Current Topics in Behavioral Neurosciences,
 
?
12

Contributors:

, In: Enzymes in Food Biotechnology,
 
?
13

Contributors:

, In: Sorbents Materials for Controlling Environmental Pollution,
 
?
14

Multi-objective Configuration of a Secured Distributed Clou..:

, In: Communications in Computer and Information Science; High Performance Computing,
 
?
15

Weighted Two-Levels Secret Sharing Scheme for Multi-Clouds ..:

, In: 2019 International Conference on High Performance Computing & Simulation (HPCS),
 
1-15