Buscar
Mostrando ítems 1-10 de 17
Gender gap in IT in Latin America
(26th Americas Conference on Information Systems, AMCIS 2020., 2020)
Acceso abierto
The underrepresentation of women in IT related majors such as computer science, computer engineering, and information systems (IS) has been evident all over the world. As a result, many private and public institutions have ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
SCUT sampling and classification algorithms to identify levels of child malnutrition
(Springer, 2020)
Acceso restringido
Child malnutrition results in millions of deaths every year. This condition is a potential problem in Peruvian society, especially in the rural parts of the country. The consequences of malnutrition range from physical ...
Experiences in using a multiparadigm and multiprogramming approach to teach an information systems course on introduction to programming
(Information Systems and Computing Academic Professionals, 2020)
Acceso abierto
In the current literature, there is limited evidence of the effects of teaching programming languages using two different paradigms concurrently. In this paper, we present our experience in using a multiparadigm and ...
Software Components of an IoT Monitoring Platform in Google Cloud Platform: A Descriptive Research and an Architectural Proposal
(Springer, 2020)
Acceso restringido
As software engineers, it is not an easy task to build a software solution that customers consider easy to use, cost-benefit balanced, secured, high available and prepared for high demand. There are many solutions for ...
Applying pair programming practice in the improvement of software design skills, in an undergraduate course
(Association for Computing Machinery, 2020)
Acceso abierto
Teaching design patterns has proved to be a complicated topic in
software engineering courses. Practitioners require mastering this
technique in order to develop higher-quality programs.
As part of the experiment, we ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...
Proofs of the undecidability of stegananalysis techniques
(Springer, 2020)
Acceso restringido
Steganalysis comprises a set of techniques that strive to find concealed information within diverse types of digital media. On the contrary, Steganography involves a group of methods that, by manipulation of a cover object, ...