Search for persons
X
?
2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) ,
1
Teacher's Perspective for the Implementation of Social Netw..:
, In:
?
2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) ,
2
Guide to Protect Home Routers from Cyber-Attacks and Inform..:
, In:
?
2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) ,
3
Gamification Analysis with Collaborative Methodology for Hi..:
, In:
?
2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) ,
4
Educational Inclusion and its Meaning for the Achievement o..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
5
An Approach of Security Model to Mitigate Risk of Cyberatta..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
6
Appropriate Security Algorithms to Mitigate the Risks in a ..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
7
Security Model for the Integration of the Ministry of Telec..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
8
Prototype of an alignment model of the Ministry of Telecomm..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
9
Definition of a Prototype for Performing Computer Audits in..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
10
Analysis of appropriate standards to solve cybersecurity pr..:
, In:
?
Proceedings of the 2020 the 4th International Conference on Information System and Data Mining ,
11
Parameters to Determine Cyberbullying in Social Networks in..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
12
Cybersecurity Analysis to Determine the Impact on the Socia..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
13
Definition of Parameters to Perform Audit in Cybersecurity ..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
14
A Cyber Environment Approach to Mitigate Vulnerabilities an..:
, In:
?
Proceedings of the 2019 2nd International Conference on Education Technology Management ,
15