Jenny Torres

Orcid: 0000-0002-8920-1225

Affiliations:
  • National Polytechnic School, Department of Informatics Computer Science, Quito, Ecuador


According to our database1, Jenny Torres authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the modeling of cyber-attacks associated with social engineering: A parental control prototype.
J. Inf. Secur. Appl., June, 2023

DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS).
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Current Trends in Blockchain Implementations on the Paradigm of Public Key Infrastructure: A Survey.
IEEE Access, 2022

Identifying Difficulties of Software Modeling Through Class Diagrams: A Long-Term Comparative Analysis.
IEEE Access, 2022

Empirical study on the difficulties of software modeling through class diagrams.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Understanding cyberbullying as an information security attack - life cycle modeling.
Ann. des Télécommunications, 2021

An Innovative and Decentralized Identity Framework Based on Blockchain Technology.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
Cross-site scripting (XSS) attacks and mitigation: A survey.
Comput. Networks, 2020

Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach.
IEEE Access, 2019

Visual Analytics for the Reduction of Air Pollution on Real-Time Data Derived from WSN.
Proceedings of the Developments and Advances in Defense and Security, 2019

Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study.
Proceedings of the Developments and Advances in Defense and Security, 2019

Data Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network.
Proceedings of the Information Technology and Systems, 2019

Cognitive Security for Incident Management Process.
Proceedings of the Information Technology and Systems, 2019

A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

Design decisions under object-oriented approach: A thematic analysis from the abstraction point of view.
Proceedings of the CSERC '19: The 8th Computer Science Education Research Conference, 2019

2018
Cookie Scout: An Analytic Model for Prevention of Cross-Site Scripting (XSS) Using a Cookie Classifier.
Proceedings of the International Conference on Information Technology & Systems, 2018

FraudFind: Financial fraud detection by analyzing human behavior.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Management of information security indicators under a cognitive security model.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
BotHook: An option against Cyberpedophilia.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2013
A Survey on Identity Management for the Future Network.
IEEE Commun. Surv. Tutorials, 2013

Secure and revocable node authentication in Vehicular Ad-Hoc Networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2011
Biologically inspired architecture for security management on wireless self-organized networks.
Proceedings of the 7th Latin American Network Operations and Management Symposium, 2011


  Loading...