Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Máster Universitario en Seguridad Informática"'
Autor:
Narváez-Albuja, Andrés
Nowadays spam is still a challenging problem for social networks such as Twitter, Facebook and YouTube; this has gained strength with the help of automations that use scripts to generate thousands of misleading comments, on many occasions they impers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::65459174c5871b7537ffe8837a803144
https://reunir.unir.net/handle/123456789/14020
https://reunir.unir.net/handle/123456789/14020
The objective of this Master's thesis is the creation of GIS (Geographical Information System) maps for decision making in acts of violence and terrorism in Peru, for the realization of this we propose to develop a platform that receives information
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::c2e550be9f31f50eac9ae03ba4ad3edb
https://reunir.unir.net/handle/123456789/13916
https://reunir.unir.net/handle/123456789/13916
This master's thesis is designed for the creation of a botnet by the social network Twitter, focused on how people intend to influence the opinion of certain groups through social and public pressure generated by comments, likes and “Retweets” of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::1fea5df885e3c75af1e496351b49058c
https://reunir.unir.net/handle/123456789/13942
https://reunir.unir.net/handle/123456789/13942
Autor:
Vélez-Recio, Ismael
Nowadays there are a multitude of algorithms and mechanisms for cryptography. These are becoming increasingly complex, which makes it difficult for students to learn them. Although there are already several support programs for students (AESphere, Fl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::f51f8fd3454d4296c950859ba329f08f
https://reunir.unir.net/handle/123456789/13791
https://reunir.unir.net/handle/123456789/13791
Autor:
Oteiza-Echeverría, Sergio
The anonymity and privacy characteristics of the Dark Web make it attractive for the commission of crimes. Authorities need tools to locate criminal patterns in this network. There are different developments of crawlers aimed at locating content on t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::9f3e5c7922a0e058a9ae776af9c03bf5
https://reunir.unir.net/handle/123456789/13793
https://reunir.unir.net/handle/123456789/13793
Durante años, el ciberespacio ha sido considerado como el quinto dominio de batalla. No es de extrañar que las tácticas de guerra tradicionales se hayan traducido al Ciberespacio, tales como las tácticas de guerrilla, guerra asimétrica, engaño,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=reunir____es::056b0e1d09be89fed1f2b02b422844a7
https://reunir.unir.net/handle/123456789/14405
https://reunir.unir.net/handle/123456789/14405
Autor:
Gallo-Haddad, Omar
Publikováno v:
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
instname
The interest for the study of elliptic curves has found in the field of cryptography a practical application widely spread in the recent times denominated Elliptic-curve cryptography (ECC). In comparison to other public key cryptography forms, ECC pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::d4c8c18600d85c6e76324586d8cf774e
https://reunir.unir.net/handle/123456789/12792
https://reunir.unir.net/handle/123456789/12792
Publikováno v:
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
instname
It has been performed an In-depth analysis of the methodologies and attack patterns to the OPENID Connect authentication protocols with OAUTH2 in test environments that simulate real implementations, as well as the risk assessment that it represents
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::92913915e52b53fbae638fdb64b9a808
https://reunir.unir.net/handle/123456789/12832
https://reunir.unir.net/handle/123456789/12832
Publikováno v:
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
instname
The number of devices connected to the Internet is increasing rapidly. This may bring many benefits for individuals, but it also entails risks, since it makes us increasingly dependent on services and applications that can be exposed to a wide variet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1e7a248ce237f052a32329b50d4411be
https://reunir.unir.net/handle/123456789/13118
https://reunir.unir.net/handle/123456789/13118
Publikováno v:
Re-Unir. Archivo Institucional de la Universidad Internacional de La Rioja
instname
instname
Worldwide infections and attacks by malicious code are growing exponentially, according to Kaspersky reports that in 2020 an average of 360,000 new malicious files were found per day, which infect devices such as computers, mobile phones and key tech
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f811bde863ebbcfc77d93d2202f0f737
https://reunir.unir.net/handle/123456789/13344
https://reunir.unir.net/handle/123456789/13344