Mostrando ítems 21-36 de 36

    • La lógica de la política exterior Rusa. Análisis desde la Teoría del Realismo político 

      Fuentes, Carolina (Revista Internacional de Humanidades, 2022)
      Las relaciones entre los Estados Unidos de América y la actual Federación de Rusia, han sido objeto de minuciosos estudios académicos a lo largo de los años. Estas dos grandes potencias han jugado un importante papel en ...
    • Mejora en el cumplimiento del lavado de Manos del Personal de Enfermería en el Servicio de Hospitalización 

      García-Gómez, Myriam (15/09/2019)
      La seguridad del paciente es un elemento fundamental de la calidad asistencial y para garantizarla es esencial que los profesionales de la salud mantengan una adecuada higiene de manos. La adherencia por parte del personal ...
    • Methodology for Computer Security Incident Response Teams into IoT Strategy 

      Enciso Bernal, Alejandro ; Martinez Monterrubio, Sergio Mauricio ; Parra Puente, Javier ; González-Crespo, Rubén ; Verdú, Elena (KSII transactions on internet and information systems, 2021)
      At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ...
    • Metodología de Pentesting para Windows y Linux automatizada con Script 

      Alises-Núñez, Elisa (21/03/2022)
      El Pentesting es una disciplina que pertenece al campo de la ciberseguridad, cuyo objetivo es analizar la seguridad de un sistema o entorno. Para ello, se deben realizar múltiples ataques informáticos al objetivo, para ...
    • PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications 

      Roy, Satyabrata; Gupta, Rohit Kumar; Rawat, Umashankar; Dey, Nilanjan; González-Crespo, Rubén (Journal of Information Security and Applications, 12/2020)
      This paper demonstrates an efficient programmable Cellular Automata (CA) based hybrid encryption technique (PCHET) for chatting applications involving multiple clients who can chat simultaneously with each other. The ...
    • Privacy of Things: La protección de datos en la era de la interconexión digital 

      Morandeira-Galbán, Álvaro Miguel (21/07/2022)
      En este Trabajo de Fin de Máster (TFM), elaborado bajo el ámbito de estudio del Máster Universitario de Protección de Datos de la Universidad Internacional de la Rioja, se realizará un análisis en profundidad de uno de los ...
    • QAM-DWT-SVD Based Watermarking Scheme for Medical Images 

      Ayad, Habib; Khalil, Mohammed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2018)
      This paper presents a new semi-blind image watermarking system for medical applications. The new scheme utilizes Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) to embed a textual data into original ...
    • Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique 

      Lakshmi, H. R.; Borra, Surekha (International Journal of Interactive Multimedia and Artificial Intelligence, 08/2023)
      With increasing copyright violation cases, watermarking of digital images is a very popular solution for securing online media content. Since some sensitive applications require image recovery after watermark extraction, ...
    • Review: machine learning techniques applied to cybersecurity 

      Martínez Torres, Javier ; Iglesias Comesaña, Carla; García-Nieto, Paulino J. (International Journal of Machine Learning and Cybernetics, 10/2019)
      Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ...
    • Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems 

      Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
    • Security Framework for Agent-Based Cloud Computing 

      Venkateshwaran, K.; Malviya, Anu; Dikshit, Utkarsha; Venkatesan, S. (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2015)
      Agent can play a key role in bringing suitable cloud services to the customer based on their requirements. In agent based cloud computing, agent does negotiation, coordination, cooperation and collaboration on behalf of ...
    • Security Threats to Business Information Systems Using NFC Read/Write Mode 

      Rios-Aguilar, Sergio; Beltrán Pardo, Marta; González-Crespo, Rubén (Computers, materials and continua, 2021)
      Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either ...
    • Taxonomía de las garantías jurídicas en el empleo de los sistemas de inteligencia artificial 

      Simón Castellano, Pere (Revista de Derecho Politico, 2023)
      En el presente artículo se estudia el enorme desafío que proyectan los sistemas de inteligencia artificial para los derechos de las personas, planteando los términos del debate con una propuesta que responde a cuestiones ...
    • TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT 

      Dejene, Dawit; Tiwari, Basant; Tiwari, Vivek (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)
      The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ...
    • Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment 

      Toumi, Hicham; Marzak, Bouchra; Talea, Amal; Eddaoui, Ahmed; Talea, Mohamed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming ...
    • WoT model for authenticity contents in virtual learning platforms 

      Gaona-García, Paulo Alonso; Soto-Carrión, Jesús (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2009)
      The following research proposal seeks to bring a model of security software on virtual learning platforms LCMS under all SCORM specifications to ensure the authenticity of content created under concepts of digital signature ...