Publicaciones

  • Herrera, J., Andrade, R., Flores, M., & Cadena, S. (2020). Anomaly Detection Under a Cognitive Security Model. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Heredia, A. E., Lucero, P. F., Astudillo, F., & Vázquez , A. (2020). Design and implementation of a wireless sensor network with LoRa technology for industrial monitoring. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Haro Mendoza, D., Tello Oquendo, L., & Marrone, L. A. (2020). A comparative evaluation of the performance of open-source SDN controllers. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Estrada, C. A., Fuertes, W., & Sánchez, A. R. (2020). An implementation of a Virus Focuses on Mobile Devices with Android. An Ethical Hacking Event. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Piedra Orellana, K., Astudillo Salinas, F., Lupercio Novillo, G., Vázquez Rodas, A., & Minchala Ávila, I. (2020). Rain gauge data logger based on ATMEL microcontroller and LoRa transceiver. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Ganán, A., Ganán , C., & Enríquez , R. (2020). Use of Technology in Industry 4.0 to support the fight against the COVID-19 epidemic through a hand hygiene dispenser using locally built devices. Latín-American Journal of Computing, 7(2). https://lajc.epn.edu.ec/index.php/LAJC/issue/view/23
  • Zambrano, P., Torres, J., Yánez, Á., Macas, A., & Tello-Oquendo, L. (2020). Understanding cyberbullying as an information security attack—life cycle modeling. Annals of Telecommunications, 1-19.
  • Merchan-Lima, J., Astudillo-Salinas, F., Tello-Oquendo, L., Sánchez, F., López-Fonseca, G., & Quiroz, D. (2020). Information security management frameworks and strategies in higher education institutions: a systematic review. Annals of Telecommunications, 1-16.
  • D. Oña, L. Zapata, W. Fuertes, G. Rodríguez, E. Benavides and T. Toulkeridis, "Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods," 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 2019, pp. 161-163, doi: 10.1109/CSNet47905.2019.9108961.
  • J. Merchan-Lima, F. Astudillo-Salinas, L. Tello-Oquendo, F. Sanchez, G. Lopez and D. Quiroz, "Information Security Management Frameworks in Higher Education Institutions: An Overview," 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 2019, pp. 63-65, doi: 10.1109/CSNet47905.2019.9108845.
  • B. Espinoza, J. Simba, W. Fuertes, E. Benavides, R. Andrade and T. Toulkeridis, "Phishing Attack Detection: A Solution Based on the Typical Machine Learning Modeling Cycle," 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, pp. 202-207, doi: 10.1109/CSCI49370.2019.00041.
  • Cadena, A., Gualoto, F., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F., & Torres, J. (2020). Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. In Developments and Advances in Defense and Security (pp. 507-519). Springer, Singapore.
  • Andrade, R., Torres, J., Cadena, S. Cognitive Security for Incident Management Process. 2019. Advances in Intelligent Systems and Computing. (https://link.springer.com/chapter/10.1007/978-3-030-11890-7_59)
  • Tello-Oquendo, L., Tapia, F., Fuertes, W., Andrade, R., Samaniego, N., Torres, J., Cadena, A. A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy. 2019. Proceedings of the 21st International Conference on Enterprise Information Systems (ICEIS 2019).
  • Cadena, A., Fuertes, W., Tello-Oquendo, L., Andrade, R., Tapia, F. Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study. 2019. SIST Series.
  • Orellana, V., Cevallos, Y., Tello-Oquendo, L., Inca, D., Palacios, C., Rentería, L. Quality Evaluation Processes and its Impulse to Digital Transformation in Ecuadorian Universities. 2019. Proceedings of 2019 International Conference on eDemocracy & eGovernment (ICEDEG’19).
  • Andrade, R., Torres, J., Tello-Oquendo, L. Cognitive Security Task Using Big Data Tools. 2019. Proceedings of 2019 International Conference on eDemocracy & eGovernment.
  • Édgar Salguero Dorokhin, Walter Fuertes, and Edison Lascano, “On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key”. Security and Communication Networks, vol. 2019, Article ID 8214681, 10 pages, 2019. https://doi.org/10.1155/2019/8214681.
    (https://gtciberseguridad.cedia.edu.ec/es/publicaciones-gtciberseguridad)
  • Tello-Oquendo, L.; Tapia, F.; Fuertes, W.; Andrade, R.; Erazo, N.; Torres, J. and Cadena, A. (2019). A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy. In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-372-8, pages 328-336. DOI: 10.5220/0007753503280336