Listar Polytechnic University of Puerto Rico por autor "Duffany, Jeffrey"
Mostrando ítems 1-20 de 90
-
Analyzing Web Application Attacks: Understanding the Damages
Meléndez Ortega, Javier (Polytechnic University of Puerto Rico, 2014)This project will demonstrate the damages that can occur by different web application attacks to aid users with the knowledge of disasters and let them know why security is so important. If you don't know what the ... -
Applicability of Swarm Intelligence to UAVs
Martínez Ojeda, Natalia Sary (Polytechnic University of Puerto Rico, 2021)Unmanned Aerial Vehicles (UAVs) are atype of aircraft that can be controlled remotely o r programmed to fly in an autonomous way. This project tested the applicability of strategies found in biological intelligenceto ... -
Assessing SQL Server User Vulnerability and Data Loss
Medina Ríos, Sergio G. (Polytechnic University of Puerto Rico, 2015)By using the tools provided by SQL server we are going to verify some parameters on the database user accounts to determine their vulnerabilities. Run scripts to check if the users have their account passwords set to ... -
At-Risk students prediction using machine learning
Ledain Gentillon, Reginald (Polytechnic University of Puerto Rico, 2019)This article intends to discover how machine learning can be used to predict at-risk students during the school year. Different algorithms were tested within a common framework to compare their accuracy and their ... -
At-Risk Students Prediction Using Machine Learning
Ledain Gentillon, Reginald (Polytechnic University of Puerto Rico, 2022)This article intends to discover how machine learning can be used to predict at-risk students during the school year. Different algorithms were tested within a common framework to compare their accuracy and their ... -
Audio Fingerprinting with Robustness to Pitch Scaling and Time Stretching
Díaz Millet, Yesenia (Polytechnic University of Puerto Rico, 2013)Current audio fingerprinting systems are becoming increasingly robust against noise and filter distortions, however songs that have been pitch scaled and time stretched are still likely to pass undetected. This research ... -
Automated Data Acquisition using Microsoft Excel
Martínez González, Luis F. (Polytechnic University of Puerto Rico, 2016)The process of Web Scraping allows the automated extraction of data from an entire website and turn it into a tabular dataset that can be used for reporting and analysis. There are numerous techniques and tools for web ... -
Blockchain for Nuclear Facilities
Morales García, John E. (Polytechnic University of Puerto Rico, 2018)Nuclear facilities are some of the most highly protected structures in the world. But rapid technological advances, terrorism and the cyberwarfare, has increased the threat of cybernetic attacks on nuclear facilities. ... -
Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training
Santiago Lozada, Reinaldo E. (Polytechnic University of Puerto Rico, 2019)Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ... -
Capture-The-Flag Framework and Virtual Environment for Cyber Security Education
Colón Pérez, Jadiel A. (Polytechnic University of Puerto Rico, 2018)When studying cybersecurity or other computer-related technical careers, a problem among the students is the lack of hands-on experience. This can be solved by participating in internships, conferences, and ... -
Computer Forensic Laboratory for the Polytechnic University of Puerto Rico
González Acevedo, Carlos J. (Polytechnic University of Puerto Rico, 2011)Abstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is ... -
Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
Rodríguez Justiniano, José M. (Polytechnic University of Puerto Rico, 2011)Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ... -
Considerations on SQL Optimization Tools in MS Azure SQL Server Database using SQL language
Rodríguez-Ortiz, Arlene (Polytechnic University of Puerto Rico, 2021)Databases are essential since are designed to stored and organized data that can be easily managed and accessed. They are crucial to many organizations, companies, and are used in many aspects of our lives. The relational ... -
Cracking the Monoalphabetic Substitution Cipher
Santana, Carlos (Polytechnic University of Puerto Rico, 2022)Cryptography is the cornerstone of secure communication. It is the study of techniques by which a message, the plaintext, is transformed into an obfuscated form, the ciphertext. One of the earliest ... -
Data Mining Techniques for the Integrated Postsecondary Data System
Jiménez Vargas, Wilfredo (Polytechnic University of Puerto Rico, 2018)The Process of generating the necessary information for the Integrated Postsecondary Data System can be tedious; a standard way to collect the information for the different departments is needed. To process it, we use ... -
Desarrollo de la Política de Seguridad de la Información: Cabrera Auto
Sevilla Maldonado, Jennifer (Polytechnic University of Puerto Rico, 2016)Actualmente las empresas de venta y renta de autos enfrentan una serie de cambios que las obliga a generar nuevas estrategias para la protección de la información que custodian. El aumento en casos de fraudes bancarios ... -
Design of a Framework for the Best Practices in Computer Forensics within the Cybersecurity Infrastructure in the Regulated Industry
Vázquez Ruiz, Eduardo (Polytechnic University of Puerto Rico, 2019)We cannot ignore the fact that hackers have been evolving and growing to the level that there are more hackers with the attraction to do evil than Ethical Hackers. Cyber-attacks are a growing threat for companies, and ... -
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
Marrero Otero, Ludrián J. (Polytechnic University of Puerto Rico, 2015)Regulations in banks are changing constantly and becoming stricter. Threats and technologies are improving. Most antivirus software update their virus definition when the malware is released and attacking. Banks need ... -
Detection of WannaCry using Splunk and Sysmon
Motta López, Henry (Polytechnic University of Puerto Rico, 2021)Lately, ransomware keeps being an important topic of conversation around the information security communities, as well as politics and economics. It has caused major damage in all these sectors and researchers must keep ... -
Developing an Accessible Web Journal with WCAG Guidelines, Fitts’s Law, and Capital T Concept
Mercado, Carlos (Polytechnic University of Puerto Rico, 2023)In the ever-evolving digital landscape, enhancing web accessibility and user experience remains a paramount objective. By expanding the application of Fitts's Law to user interface design, the researcher unlocks the potential ...