• Centralized Device Independent Software Architecture for the Internet of Things 

      Ruiz Linares, Luis (Polytechnic University of Puerto Rico, 2015)
      The Internet of Things (IoT) is growing stronger every year, as developers we need to get ready for the challenges ahead of us. It is getting hard for software developers to have a starting point for implementing new ...
    • Computer Forensic Laboratory for the Polytechnic University of Puerto Rico 

      González Acevedo, Carlos J. (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is ...
    • Implementing DNSSEC under the .pr ccTLD 

      Medina Ramos, Luis Alberto (Polytechnic University of Puerto Rico, 2013)
      When the Internet was developed it was not designed with security in consideration. It currently relies on the Domain Name System protocol for name resolution which is home to many types of exploits. The Internet ...
    • Introduction to Forensics and the use of the Helix free Forensic Tool 

      Maldonado Rodríguez, Michelle (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Unified Threat Management 

      Christenson Colón, Bernard J. (Polytechnic University of Puerto Rico, 2018)
      Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
    • Web Attacks Analytics 

      Sanchez Pardella, Luis O. (Polytechnic University of Puerto Rico, 2020)
      Cyber-attacks are on the rise. Information systems are constantly being attacked, generating economic loss. Computer networks and web technologies are the preferred places for hackers to commit cybercrimes. Most computers ...