- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Biomedical and Engineering Education
- Social Media and Politics
- Anomaly Detection Techniques and Applications
- Engineering Education and Pedagogy
- Educational Leadership and Innovation
- Wikis in Education and Collaboration
- Impact of Technology on Adolescents
- Privacy, Security, and Data Protection
- Information and Cyber Security
- Network Packet Processing and Optimization
- Blockchain Technology Applications and Security
- Education Systems and Policy
- Mechatronics Education and Applications
- IoT and Edge/Fog Computing
- Diverse Education and Engineering Focus
- AI in Service Interactions
- Ethics and Social Impacts of AI
- Educational Games and Gamification
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
Escuela Superior Politecnica del Litoral
2007-2023
The address resolution protocol (ARP) is used by computers to map network addresses (IP) physical (MAC). has proved work well under regular circumstances, but it was not designed cope with malicious hosts. By performing ARP cache poisoning or spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access sensitive information. Several schemes mitigate, detect prevent these attacks have been proposed, each its limitations. In this paper we analyze of...
In this paper, we present our approach for developing a hackathon as an educational tool motivating and encouraging non-CS students engaging them in real coding tasks beyond the classroom. We define gender discipline diverse inclusive event. also report experience organizing such event two consecutive semesters at large public polytechnic University, with total attendance of 252 (38% female, 62% male) from 36 different disciplines. Finally, on perception these towards after participating...
Many educational institutions have modified their curricula to include computational thinking and coding courses for all students. However, it is not always easy engage non-CS students in coding. Hackathons are often suggested as tools exposing people fun real challenges, promoting alternative ways of learning increasing interest coding, CS general. Thus we ask, could a hackathon be used specifically within CS1 class motivate boost performance (measured grades)? In this article, analyze data...
As the number of IoT devices continues to increase, so does challenges we need face. Security is a big concern since attacks keeps rising. We show that currently available metrics do not correctly apply devices, and propose an appropriate metric. proof-of-concept, our metric three it reacts presence vulnerabilities as well actual exploits.
As the Internet of Things (IoT) grows, attacks to these devices continue increase, both in number and impact. We identify requirements for a real-time data processing framework that can be used detect while they occur, propose an architecture would implement requirements. The proposed by vendors, third-party organizations, end-users provide on-line monitoring attack mitigation. Finally, we research challenges will face when implementing this architecture.
This work makes two contributions: (1) we propose the novel idea of using an open-source approach to writing surveys, and (2) give a first step towards applying this in context surveying students about their web security literacy. Questions that interest us include: Does taking course help be more aware risks vulnerabilities browsing practices? When presented with warning, do they make right decision? We present our results designing survey on at large university. have released instrument...
This research explores and analyzes different API Calls sequence transformation methods into images to train deep learning models determine which combination of these performs better. We generated from sequences using Simhash FreqSeq. The results were compared by training two well-known Convolutional Network architectures (ResNet50v2 MobileNetv2). work presents our experience running experiments highlighting the obtained challenges we faced.
In this position paper we present the novel idea of using an open-source, community-based approach for creating survey instruments. We frame survey-writing problem in context designing instruments to assess university students about their attitudes, literacy, readiness, etc., on Information Assurance and Security, but is applicable any type collaborative writing. The main contributions work are: (1) open-source surveys, (2) analysis benefits requirements idea, (3) proposal a process use...
The common adoption of Intelligent Virtual Assistants (IVAs) raises the question about privacy protection they offer to sensitive data. This work focuses on determining if users are aware access and options that third-parties have over their data shared with IVAs. We conducted a survey 43 IVA found out more than 50% don't know third-party less 25% never managed interaction stored in accounts. Additionally, we reviewed 14 participants learn effects accidental triggering (for instance,...