Ingeniería de Sistemas: Envíos recientes
Mostrando ítems 41-56 de 56
-
A comparison of classification models to detect cyberbullying in the Peruvian Spanish language on twitter
(Science and Information Organization, 2020)Acceso abiertoCyberbullying is a social problem in which bullies’ actions are more harmful than in traditional forms of bullying as they have the power to repeatedly humiliate the victim in front of an entire community through social ... -
Association Between Substance Use Behaviors, Developmental Assets and Mental Health: A Glance at Latin American Young College Students
(Frontiers Media, 2021)Acceso abiertoPositive Youth Development (PYD) is an approach that promotes resilience and focuses on youth strengths rather than their weaknesses as done by the traditional deficit-based perspective. Research in Europe and North America ... -
Systematic mapping of the literature on Secure Software Development
(IEEE, 2021)Acceso abiertoThe accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ... -
Coping Responses During the COVID-19 Pandemic: A Cross-Cultural Comparison of Russia, Kyrgyzstan, and Peru
(Russsian Psychological Society, 2020)Acceso abiertoBackground. The COVID-19 pandemic has subjected people around the world to severe stress, evoking a variety of coping responses. Coping responses can be broadly classified into four strategies: 1) problem-focused coping; ... -
Are information systems and computer science overlapping more and more?
(ACM Association for Computing Machinery, 2020)Acceso abiertoIn this research, we posit the importance of including Computer Science topics in undergraduate Information Systems courses. A review of the existing literature has mentioned the importance of learning some Computer Science ... -
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)Acceso abiertoBotnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ... -
Variaciones de los tiempos de reacción frente a cambios de perspectiva y tamaño de los estímulos 2D y 3D en atención selectiva
(Sociedad Mexicana de Ingenieria Biomedica, 2020)Acceso abiertoFrente a un estímulo objetivo, las personas procesan mediante la atención selectiva antes de realizar toma de decisiones. Si ese estímulo sufre algún cambio en su configuración 2D o 3D, ¿en qué casos una persona reacciona ... -
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic Professionals, 2020)Acceso abiertoIn the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ... -
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)Acceso abiertoIn recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ... -
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)Acceso restringidoThe emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ... -
Heuristics Applied to Mutation Testing in an Impure Functional Programming Language
(Science and Information Organization, 2019)Acceso abiertoThe task of elaborating accurate test suites for program testing can be an extensive computational work. Mutation testing is not immune to the problem of being a computational and time-consuming task so that it has found ... -
El Inventario de Estrés Académico SISCO: análisis de sus propiedades psicométricas en una muestra peruana
(Sociedad Española para el Estudio de la Ansiedad y el Estres, 2019)Acceso restringidoObjetivo: El objetivo de este estudio fue evaluar las propiedades psicométricas del Inventario de Estrés Académico SISCO en una muestra peruana. Método Se obtuvo información de 628 estudiantes universitarios pertenecientes ... -
Sci tech-reading and writing the english of science and technology. First edition. Karl Drobnic, Sharon Abrams and Marjorie Morray
(Wiley-Blackwell, 1981)Acceso restringidoReseña del libro SCI TECH: Reading and Writing the English of Science and Technology by Karl Drobnic -
Steganography and Data Loss Prevention: An overlooked risk?
(Science and Engineering Research Support Society, 2017)Acceso abiertoSteganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding ... -
Impacto de la automatización sobre el desempeño: evaluación en sistemas de información
(Universidad del Zulia, 2014)Acceso abiertoInvestigaciones previas (Rai et al, 2002; Seddon y Kiew, 1997), evalúan el sistema de información en su rol de proveedor de información. En ellas se estudia el impacto de la tecnología sobre el desempeño individual (utilidad ... -
Discrete analogue of Fucik spectrum of the Laplacian
(Elsevier BV, 1999)Acceso abiertoThe discrete analog of the Fucik spectrum for elliptic equations, namely M-matrices, is shown to have properties analogous to the continuum. In particular, the Fucik spectrum of a M-matrix contains a continuous and decreasing ...

