Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing (Article) (Fri, 24 Jan 2020)
>> Read More

PhD Annual Progress Report - Y3 (Sat, 28 Jul 2018)
>> Read More

Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article) (Mon, 11 Sep 2017)
>> Read More

Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17) (Thu, 06 Jul 2017)
>> Read More

Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article) (Thu, 09 Feb 2017)
>> Read More

An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES) (Sat, 05 Dec 2015)
>> Read More

Conozca cómo evadir el ataque de los ‘hackers' (Sat, 25 Jul 2015)
>> Read More

Memories 2014 - Campus Party Quito 4 (Tue, 18 Nov 2014)
>> Read More

An Authentication and Audit Architecture for Enhancing Security on eGovernment Services (Sat, 22 Mar 2014)
>> Read More

Memories 2013 - Campus Party Quito 3 (Thu, 12 Sep 2013)
>> Read More

A Social Engineering Discussion about Privacy Attacks and Defences in Web Browsers and Social Networks (Sat, 06 Jul 2013)
>> Read More

An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together (Wed, 27 Feb 2013)
>> Read More

Detection and Mitigation of MITM Attacks in Storage Cloud Infrastructures (Sat, 05 Jan 2013)
>> Read More

Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions (Sat, 01 Sep 2012)
>> Read More

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection (Wed, 27 Jun 2012)
>> Read More