Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article)
(Mon, 11 Sep 2017)
>> Read More
Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17)
(Thu, 06 Jul 2017)
>> Read More
Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article)
(Thu, 09 Feb 2017)
>> Read More
An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES)
(Sat, 05 Dec 2015)
>> Read More
Conozca cómo evadir el ataque de los ‘hackers'
(Sat, 25 Jul 2015)
>> Read More
Memories 2014 - Campus Party Quito 4
(Tue, 18 Nov 2014)
>> Read More
An Authentication and Audit Architecture for Enhancing Security on eGovernment Services
(Sat, 22 Mar 2014)
>> Read More
Memories 2013 - Campus Party Quito 3
(Thu, 12 Sep 2013)
>> Read More
A Social Engineering Discussion about Privacy Attacks and Defences in Web Browsers and Social Networks
(Sat, 06 Jul 2013)
>> Read More
An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together
(Wed, 27 Feb 2013)
>> Read More
Detection and Mitigation of MITM Attacks in Storage Cloud Infrastructures
(Sat, 05 Jan 2013)
>> Read More
Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions
(Sat, 01 Sep 2012)
>> Read More
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection
(Wed, 27 Jun 2012)
>> Read More