Linked e-resources

Details

Intro
Preface
Contents
Big Data Analytics and Applications
On the Use of Parallel Architectures in DNA Methylation Analysis
1 Introduction
2 Sample Alignment and Methylation Status Inference
3 Detection of Differentially Methylated Regions (DMRs)
4 Artificial Intelligence for Methylation Analysis
5 Conclusions
References
Automation for IBNR Provision Using Power BI and Excel
1 Introduction
1.1 Generalities
2 Methodology
3 Results
4 Conclusions
References
Visualizing the Risks of De-anonymization in High-Dimensional Data
1 Introduction

2 Related Work and Contribution
3 Methods
3.1 k-Anonymity
3.2 l-Diversity
3.3 Spatiotemporal Data Anonymity
3.4 Textual Data Anonymity
3.5 Financial Transactions Data Anonymity
3.6 Aggregation-Based Data Anonymity
4 Application
5 Conclusion and Future Work
References
Computer Networks, Mobility and Pervasive Systems
Wireless Mesh for Schools in the Emberá Comarca
1 Introduction
2 Methodology
3 Internet Connections
4 Why Mesh Networks?
5 Model
6 Conclusions
7 Future Work
References

Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory
1 Introduction
2 Development
3 Results
4 Conclusions
References
TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society
1 Introduction
2 Connectivity Challenges in Indigenous Communities
2.1 The Ella Puru Community, a Case Study
2.2 Potential Project Risks
2.3 Potential Benefits
3 Design Requirements of a Versatile Access Network for Indigenous Communities
3.1 Requirements
3.2 Design Considerations

4 TaguaSpot High-Level Design
5 Conclusions
References
Ethics, Computers and Security
Vulnerability Analysis in the Business Organization
1 Introduction
2 Methodology
2.1 Vulnerability Analysis Tools
2.2 Vulnerability Analysis Process
2.3 Environment Description
3 Results
3.1 Lifetime of Vulnerability in the Information System
4 Conclusions
References
Information Security: Identification of Risk Factors Through Social Engineering
1 Introduction
2 Risk Factors for Social Engineering Attacks
2.1 Computational Techniques for Social Engineering

2.2 Non-computational Techniques for Social Engineering
3 Methodology
3.1 Social Engineering Attack Vectors
4 Results
5 Techniques to Prevent Social Engineering Attacks
6 Conclusion
References
The Information Security Function and the CISO in Colombia: 2010-2020
1 Introduction
2 Literature Review
3 Methodology
3.1 Research Instrument
3.2 Sample
4 Results
4.1 Function of the Information Security Area and Role of the Professional
4.2 Evolution of the Information Security Professional Profile
5 Discussion
5.1 Security Function, Steadily Growing

Browse Subjects

Show more subjects...

Statistics

from
to
Export