Mostrando ítems 1-20 de 25

    • A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers 

      Talbi, Jamal; Haqiq, Abdelkrim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud ...
    • A New Mail System for Secure Data Transmission in Cyber Physical Systems 

      Piedrahita Castillo, Diego (1); Machio, Francisco (1); Bermejo-Higuera, Javier (1); Bermejo Higuera, Juan Ramón (1); Sicilia, Juan Antonio (1) (International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 12/2020)
      This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ...
    • A Secure Email Solution Based on Blockchain 

      Piedrahita, Diego (1); Bermejo-Higuera, Javier (1); Machío-Regidor, Francisco (1) (Springer Science and Business Media Deutschland GmbH, 2021)
      Email is one of the most important online communication services between individuals and businesses. The large amount of information that passes through this medium is the object of desire for many attackers who use a whole ...
    • Analysis of Security Mechanisms Based on Clusters IoT Environments 

      Montenegro-Marin, Carlos Enrique; Gaona-García, Paulo Alonso; Prieto, Juan David; Nieto Acevedo, Yuri Vanessa (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. ...
    • Analysis of WEB Browsers of HSTS Security Under the MITM Management Environment 

      Bareño-Gutiérrez, Raúl; López Sevillano, Alexandra María; Díaz Piraquive, Flor Nancy (1); González-Crespo, Rubén (1) (Springer Science and Business Media Deutschland GmbH, 2021)
      The transactional websites and services on the cloud, have actually become the most used browsers, thanks to their portability and ease of use, with a significant increase in the development of cloud solutions, implementing ...
    • Biometry, the safe key 

      Fraile Hurtado, María; Herrero Langreo, Miguel; Menéndez de Miguel, Pilar; Delgado Villanueva, Valerio (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)
      Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?
    • Diseño de dispositivo de mejora de visibilidad para ciclistas en días de lluvia 

      Linares-Ribé, Joan (22/09/2021)
      En los últimos años, nuestro país ha experimentado un aumento considerable de personas que usan la bicicleta ya sea, como medio de transporte del día a día o para realizar deporte de manera amateur y/o profesional. Las ...
    • Effective filter for common injection attacks in online web applications 

      Ibarra-Fiallos, Santiago (1); Bermejo-Higuera, Javier (1); Intriago-Pazmino, Monserrate; Bermejo Higuera, Juan Ramón (1); Sicilia, Juan Antonio (1); Cubo Villalba, Javier (1) (IEEE Access, 2021)
      Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community ...
    • Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking 

      Dey, Nilanjan; Amar, Yesmine Ben; Trabelsi, Imen; Bouhlel, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2016)
      The three-dimensional (3D) polygonal meshes are recently widely used in several domains, which necessitate the realistic visualization of the objects. Moreover, there is an urgent need to protect the 3D data properties for ...
    • Genetic Operators Applied to Symmetric Cryptography 

      Rodríguez, Jefferson; Corredor, Brayan; Suárez, César (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)
      In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
    • Implementación de la tecnología Blockchain al sistema sanitario europeo (Blocksse) 

      Soler-Codina, Xavier; Guerra-Zanuy, Víctor (22/09/2021)
      El sector de la sanidad es hoy en día uno de los sectores más importantes y uno de los que requiere estar innovando más constantemente, más aún con la crisis del COVID-19. Tener los datos actualizados y estructurados es ...
    • Improving security of medical big data by using Blockchain technology 

      Sharma, Pratima; Borah, Malaya Dutta; Namasudra, Suyel (1) (Elsevier Ltd, 2021)
      Big data refers to a very large and diverse set of data that grow at exponential rates. In the modern healthcare system, medical big data face many security issues due to the presence of hackers and malicious users. Nowadays, ...
    • Knowledge management as a tool for improving business processes: an action research approach 

      Martínez-Martínez, Aurora; Cerdá Suárez, Luis Manuel (1); Sánchez Montero, Roberto; Asensio del Arco, Eva (1) (Journal of Industrial Engineering and Management, 2018)
      Purpose: The aim of this study is to investigate the importance of Knowledge Management as a tool for improving business processes in a different context from the industrial organizations, as an archaeological museum. ...
    • Local Technology to Enhance Data Privacy and Security in Educational Technology 

      Amo, Daniel; Prinsloo, Paul; Alier, Marc; Fonseca, David; Torres Kompen, Ricardo; Canaleta, Xavier; Herrero-Martín, Javier (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2021)
      In educational environments, technological adoption in the last 10 years has enabled a data-driven and decisionmaking paradigm in organizations. The integration of cloud services in schools and universities is a positive ...
    • Mejora en el cumplimiento del lavado de Manos del Personal de Enfermería en el Servicio de Hospitalización 

      García-Gómez, Myriam (15/09/2019)
      La seguridad del paciente es un elemento fundamental de la calidad asistencial y para garantizarla es esencial que los profesionales de la salud mantengan una adecuada higiene de manos. La adherencia por parte del personal ...
    • Methodology for Computer Security Incident Response Teams into IoT Strategy 

      Enciso Bernal, Alejandro (1); Martinez Monterrubio, Sergio Mauricio (1); Parra Puente, Javier (1); González-Crespo, Rubén (1); Verdú, Elena (1) (KSII transactions on internet and information systems, 2021)
      At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ...
    • PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications 

      Roy, Satyabrata; Gupta, Rohit Kumar; Rawat, Umashankar; Dey, Nilanjan; González-Crespo, Rubén (1) (Journal of Information Security and Applications, 12/2020)
      This paper demonstrates an efficient programmable Cellular Automata (CA) based hybrid encryption technique (PCHET) for chatting applications involving multiple clients who can chat simultaneously with each other. The ...
    • QAM-DWT-SVD Based Watermarking Scheme for Medical Images 

      Ayad, Habib; Khalil, Mohammed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2018)
      This paper presents a new semi-blind image watermarking system for medical applications. The new scheme utilizes Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) to embed a textual data into original ...
    • Review: machine learning techniques applied to cybersecurity 

      Martínez Torres, Javier (1); Iglesias Comesaña, Carla; García-Nieto, Paulino J. (International Journal of Machine Learning and Cybernetics, 10/2019)
      Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ...
    • Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems 

      Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...