Rafael I. Bonilla

ORCID: 0000-0003-1205-3583
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Biomedical and Engineering Education
  • Social Media and Politics
  • Anomaly Detection Techniques and Applications
  • Engineering Education and Pedagogy
  • Educational Leadership and Innovation
  • Wikis in Education and Collaboration
  • Impact of Technology on Adolescents
  • Privacy, Security, and Data Protection
  • Information and Cyber Security
  • Network Packet Processing and Optimization
  • Blockchain Technology Applications and Security
  • Education Systems and Policy
  • Mechatronics Education and Applications
  • IoT and Edge/Fog Computing
  • Diverse Education and Engineering Focus
  • AI in Service Interactions
  • Ethics and Social Impacts of AI
  • Educational Games and Gamification
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security

Escuela Superior Politecnica del Litoral
2007-2023

The address resolution protocol (ARP) is used by computers to map network addresses (IP) physical (MAC). has proved work well under regular circumstances, but it was not designed cope with malicious hosts. By performing ARP cache poisoning or spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access sensitive information. Several schemes mitigate, detect prevent these attacks have been proposed, each its limitations. In this paper we analyze of...

10.1109/icdcsw.2007.19 article EN 2007-01-01

In this paper, we present our approach for developing a hackathon as an educational tool motivating and encouraging non-CS students engaging them in real coding tasks beyond the classroom. We define gender discipline diverse inclusive event. also report experience organizing such event two consecutive semesters at large public polytechnic University, with total attendance of 252 (38% female, 62% male) from 36 different disciplines. Finally, on perception these towards after participating...

10.1109/educon.2019.8725221 article EN 2022 IEEE Global Engineering Education Conference (EDUCON) 2019-04-01

Many educational institutions have modified their curricula to include computational thinking and coding courses for all students. However, it is not always easy engage non-CS students in coding. Hackathons are often suggested as tools exposing people fun real challenges, promoting alternative ways of learning increasing interest coding, CS general. Thus we ask, could a hackathon be used specifically within CS1 class motivate boost performance (measured grades)? In this article, analyze data...

10.1109/educon45650.2020.9125187 article EN 2022 IEEE Global Engineering Education Conference (EDUCON) 2020-04-01

As the number of IoT devices continues to increase, so does challenges we need face. Security is a big concern since attacks keeps rising. We show that currently available metrics do not correctly apply devices, and propose an appropriate metric. proof-of-concept, our metric three it reacts presence vulnerabilities as well actual exploits.

10.1109/dasc-picom-datacom-cyberscitec.2017.123 article EN 2017-11-01

As the Internet of Things (IoT) grows, attacks to these devices continue increase, both in number and impact. We identify requirements for a real-time data processing framework that can be used detect while they occur, propose an architecture would implement requirements. The proposed by vendors, third-party organizations, end-users provide on-line monitoring attack mitigation. Finally, we research challenges will face when implementing this architecture.

10.1109/dasc-picom-datacom-cyberscitec.2017.122 article EN 2017-11-01

This work makes two contributions: (1) we propose the novel idea of using an open-source approach to writing surveys, and (2) give a first step towards applying this in context surveying students about their web security literacy. Questions that interest us include: Does taking course help be more aware risks vulnerabilities browsing practices? When presented with warning, do they make right decision? We present our results designing survey on at large university. have released instrument...

10.1145/2899415.2959087 article EN 2016-07-08

This research explores and analyzes different API Calls sequence transformation methods into images to train deep learning models determine which combination of these performs better. We generated from sequences using Simhash FreqSeq. The results were compared by training two well-known Convolutional Network architectures (ResNet50v2 MobileNetv2). work presents our experience running experiments highlighting the obtained challenges we faced.

10.1109/ccgridw59191.2023.00037 article EN 2023-05-01

In this position paper we present the novel idea of using an open-source, community-based approach for creating survey instruments. We frame survey-writing problem in context designing instruments to assess university students about their attitudes, literacy, readiness, etc., on Information Assurance and Security, but is applicable any type collaborative writing. The main contributions work are: (1) open-source surveys, (2) analysis benefits requirements idea, (3) proposal a process use...

10.1109/educon.2017.7943100 article EN 2022 IEEE Global Engineering Education Conference (EDUCON) 2017-04-01

The common adoption of Intelligent Virtual Assistants (IVAs) raises the question about privacy protection they offer to sensitive data. This work focuses on determining if users are aware access and options that third-parties have over their data shared with IVAs. We conducted a survey 43 IVA found out more than 50% don't know third-party less 25% never managed interaction stored in accounts. Additionally, we reviewed 14 participants learn effects accidental triggering (for instance,...

10.1109/andescon56260.2022.9989615 article EN IEEE ANDESCON 2022-11-16
Coming Soon ...