Information security management frameworks and strategies in higher education institutions: a systematic review J Merchan-Lima, F Astudillo-Salinas, L Tello-Oquendo, F Sanchez, ... Annals of Telecommunications, 1-16, 2020 | 56 | 2020 |
Offline mobile application for places identification with augmented reality DH Marjury, BC Karen, MM Diana, LF Gabriel eDemocracy & eGovernment (ICEDEG), 2017 Fourth International Conference on …, 2017 | 14 | 2017 |
Methodology for Data Loss Prevention Technology Evaluation for Protecting Sensitive Information G Lopez, N Richardson, J Carvajal Revista Politécnica 36 (3), 69, 2015 | 14 | 2015 |
Diseño e Implementación de un Sistema de Monitoreo Remoto del Motor de un Vehículo basado en Obd-II y la plataforma Arduino W Simbaña, J Caiza, D Chávez, G Lopez Revista Politécnica 37 (1), 25, 2016 | 13 | 2016 |
Data Cleaning Technique for Security Logs Based on Fellegi-Sunter Theory D Martinez-Mosquera, S Luján-Mora, G López, L Santos EuroSymposium on Systems Analysis and Design, 3-12, 2017 | 11 | 2017 |
Privacy vulnerability analysis for Android Applications: A practical approach A Argudo, G López, F Sánchez eDemocracy & eGovernment (ICEDEG), 2017 Fourth International Conference on …, 2017 | 9 | 2017 |
Herramientas de desarrollo con soporte colaborativo en Ingeniería de Software JC Caiza, DS Guamán, GR López Enfoque UTE 6 (2), 102-116, 2015 | 6 | 2015 |
Vulnerability Analysis Toolkit for IEEE 802.11 Wireless Networks: A Practical Approach S Simbana, G Lopez, C Tipantuna, F Sanchez 2018 International Conference on Information Systems and Computer Science …, 2018 | 4 | 2018 |
Security Analysis Protocol for Android-Based Mobile Applications J Palacios, G López, F Sánchez Revista Ibérica de Sistemas e Tecnologias de Informação, 366-378, 2019 | 3 | 2019 |
Análisis del Algoritmo Esteganográfico F5 para Imágenes JPEG a Color EM Checa, JAZ Miranda, JEC Rodríguez, GRL Fonseca Revista Politécnica 36 (3), 79, 2015 | 3 | 2015 |
Information Security Management Frameworks in Higher Education Institutions: An Overview J Merchan-Lima, F Astudillo-Salinas, L Tello-Oquendo, F Sanchez, ... 2019 3rd Cyber Security in Networking Conference (CSNet), 63-65, 2019 | 1 | 2019 |
Windows Server 2012 vulnerabilities and security GR López, DS Guamán, JC Caiza | 1 | 2015 |
Data Harvesting from devices that support the SNMP Protocol: a practical approach M Díaz, C Santorum, F Sánchez, G López Revista Ibérica de Sistemas e Tecnologias de Informação, 379-390, 2019 | | 2019 |
Vulnerabilidades y Seguridad de Windows Server 2012 GR López, DS Guamán, JC Caiza Enfoque UTE 6 (3), 36-51, 2015 | | 2015 |
Development tools to provide collaboration in Software Engineering JC Caiza, DS Guamán, GR López Enfoque UTE 6 (2), 102-116, 2015 | | 2015 |
Herramientas de desarrollo con soporte colaborativo en Ingeniería de Software (Development tools to provide collaboration in Software Engineering) JC Caiza, DS Guamán, GR López Comité Editorial, 102, 0 | | |
Windows Server 2012 vulnerabilities and security (Vulnerabilidades y Seguridad de Windows Server 2012) GR López, DS Guamán, JC Caiza | | |