• Employee Guide to Cybersecurity and Cyber Threats 

      Feliciano Cruz, Emily Y. (Polytechnic University of Puerto Rico, 2023)
      Cybersecurity is a growing concern for companies and workers due to the growing threats posed by technology. The Covid-19 pandemic has highlighted the need for protective shields, with malware being a major threat. WannaCry, ...
    • Food Trucks Puerto Rico App 

      Sánchez Sánchez, Darwin O. (Polytechnic University of Puerto Rico, 2018)
      In Puerto Rico there are many food trucks with food and dishes that are not seen in any restaurant and not many people know them. Over the years, more food trucks have been added to Puerto Rican food with creative dishes ...
    • A Forensic Memory Image Acquisition Protocol Based on Windows Memory Analysis 

      de la Cruz Echeandía, José R. (Polytechnic University of Puerto Rico, 2012)
      Computer Forensics has become an extremely important evidence gathering and analysis field in the modern electronic driven world. Most of the evidence acquired, preserved, processed and analyzed originates from long term ...
    • Hacking Facebook Privacy and Security 

      Galban, Omar (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ When people talk about hacking and social networks, they're not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary ...
    • Hacking Mobile Devices Using WiFi Pineapple Nano 

      Mojica Serrano, Alexis (Polytechnic University of Puerto Rico, 2019)
      Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different ...
    • Honeypots as Computer Forensics Tool 

      Avilés Lugo, Marcos (Polytechnic University of Puerto Rico, 2015)
      Cybercrimes were increase in last years. In a near future majority of crime will be cybercrimes. The new technologies like mobile device and networks permit easy access to electronic devices that have Electronic Stored ...
    • The Impact of Segmentation and Overlapping in Feature Extraction for Biometric Human Authentication Systems 

      Varela Rosa, Carla Andrea (Polytechnic University of Puerto Rico, 2021)
      One of the arduous challenges in Machine Learning is how to extract features withenough information that will simplifythe learning process of classificationmodels;therefore,leading to better predictionsand ...
    • Implementation of a Cost Function to Model Travel Cost for Shortest Path Routing 

      Rivera López, Carlos (Polytechnic University of Puerto Rico, 2019)
      Many times, as we travel in a region from one place to another we start wondering if there’s a better, optimal path to travel from point A to point B. In order to figure this out, normally, we would seek for details ...
    • Implementing DNSSEC under the .pr ccTLD 

      Medina Ramos, Luis Alberto (Polytechnic University of Puerto Rico, 2013)
      When the Internet was developed it was not designed with security in consideration. It currently relies on the Domain Name System protocol for name resolution which is home to many types of exploits. The Internet ...
    • Implementing USB Attacks with Microcontrollers 

      Rodríguez Ocasio, Alejandro (Polytechnic University of Puerto Rico, 2019)
      The USB specification has become one of the most prominent standards for interconnection between devices and peripherals. Its main objective is to provide ease of use and increase compatibility by implementing standard ...
    • Improving Robotics Competition Autonomous Operation by Using Sensors 

      Rivera Cruz, Elvin (Polytechnic University of Puerto Rico, 2013)
      The field of robotics has been growing rapidly in the last few years and is expected to continue rising. Therefore, we need to provide our middle and high school students with the tools and experiences to gain the ...
    • Informative Overview of Rainbow Hashes 

      Hornedo Martínez, Víctor (Polytechnic University of Puerto Rico, 2022)
      This article gives an overview for rainbow tables and the results of testing rainbow tables according to the length of the chosen chain. The article presents a password cracking process that contains its own ...
    • “Inside-Pics” 

      Rivera Valentin, Sheila M. (Polytechnic University of Puerto Rico, 2016)
      The photography industry has grew and evolved through the times. Nowadays, cameras come with many features that allow users to adjust them as their preference with a minimum effort or knowledge. However, in the case ...
    • Introduction to Forensics and the use of the Helix free Forensic Tool 

      Maldonado Rodríguez, Michelle (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
    • IoT Vulnerabilities in SCADA Systems 

      Rivera Barbosa, Jose (Polytechnic University of Puerto Rico, 2016)
      The emerging technologies like Internet of Things (IoT) is an infrastructure of interconnected objects, people, systems and information resources together with intelligent services to allow them to process information ...
    • Is Your Wi-Fi Really Protected? 

      Santiago Laguna, Johnathan R. (Polytechnic University of Puerto Rico, 2021)
      The purpose of thisproject will be testing a tool called ‘aircrack-ng suite’and perfomed a penetration test to a private network. This suite is a collection of tools that allows you to assess the strength ...
    • Jailbreak Vulnerability & Mobile Security Updates 

      Maldonado Burgos, Zedrick A. (Polytechnic University of Puerto Rico, 2018)
      In these modern times mobile devices are part of the everyday life of each individual. These devices contain a major part of each user information in comparison to their personal computers. On a mobile device people ...
    • Journey to becoming a hacker: from zero to cybersecurity ninja 

      Alicea Casillas, Yoshuam A. (Polytechnic University of Puerto Rico, 2018)
      Time to time technology changes and the need for cyber security experts increases. While is true that lots of universities prepare students on this career, somehow students face trouble understanding how to acquire the ...
    • Meteorite Landing Data Visualization with Python 

      Atiles Gil de Lamadrid, Ileana M. (Polytechnic University of Puerto Rico, 2019)
      For billions of years, the Earth has witnessed meteorite falls. Meteorites enter the Earth’s atmosphere and land in more places than others. Recording on meteorites has been based on sighting and recovery. Many meteorites ...
    • Meteorite Landing Data Visualization with Python 

      Atiles Gil de Lamadrid, Ileana M. (Polytechnic University of Puerto Rico, 2022)
      For billions of years, the Earth has witnessed meteorite falls. Meteorites enter the Earth's atmosphere and land in more places than others. Recording on meteorites has been based on sighting and recovery. Many meteorites ...