Toapanta T, Segundo Moises
64  results:
Search for persons X
?
1

Teacher's Perspective for the Implementation of Social Netw..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
2

Guide to Protect Home Routers from Cyber-Attacks and Inform..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
3

Gamification Analysis with Collaborative Methodology for Hi..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
4

Educational Inclusion and its Meaning for the Achievement o..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
5

An Approach of Security Model to Mitigate Risk of Cyberatta..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
6

Appropriate Security Algorithms to Mitigate the Risks in a ..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
7

Security Model for the Integration of the Ministry of Telec..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
8

Prototype of an alignment model of the Ministry of Telecomm..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
9

Definition of a Prototype for Performing Computer Audits in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
10

Analysis of appropriate standards to solve cybersecurity pr..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
11

Parameters to Determine Cyberbullying in Social Networks in..:

, In: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining,
 
?
12

Cybersecurity Analysis to Determine the Impact on the Socia..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
13

Definition of Parameters to Perform Audit in Cybersecurity ..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
14

A Cyber Environment Approach to Mitigate Vulnerabilities an..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
?
15

Design of a Prototype for IT Security Architectures in a Pu..:

, In: Proceedings of the 2019 2nd International Conference on Education Technology Management,
 
1-15