• Ataques al protocolo de autenticación OPENID CONNECT + OAUTH2 

      Quiñonez-Murillo, Carlos Andres (07/02/2022)
      El trabajo ha realizado un análisis en profundidad de las metodologías y patrones de ataque a los protocolos de autenticación OPENID Connect con OAUTH2 en entornos de prueba que simulan implementaciones reales, así como ...
    • Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises 

      Lopez, Miguel Angel; Lombardo, Juan Manuel; López, Mabel; Alba, Carmen María; Velasco, Susana; Braojos, Manuel Alonso; Fuentes-García, Marta (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2020)
      Cyberattacks threaten continuously computer security in companies. These attacks evolve everyday, being more and more sophisticated and robust. In addition, they take advantage of security breaches in organizations and ...
    • Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems 

      Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
    • Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing 

      Saidi, Abdelali; Bendriss, Elmehdi; Kartit, Ali; El Marraki, Mohamed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer ...