• Analyzing Web Application Attacks: Understanding the Damages 

      Meléndez Ortega, Javier (Polytechnic University of Puerto Rico, 2014)
      This project will demonstrate the damages that can occur by different web application attacks to aid users with the knowledge of disasters and let them know why security is so important. If you don't know what the ...
    • Applicability of Swarm Intelligence to UAVs 

      Martínez Ojeda, Natalia Sary (Polytechnic University of Puerto Rico, 2021)
      Unmanned Aerial Vehicles (UAVs) are atype of aircraft that can be controlled remotely o r programmed to fly in an autonomous way. This project tested the applicability of strategies found in biological intelligenceto ...
    • Assessing SQL Server User Vulnerability and Data Loss 

      Medina Ríos, Sergio G. (Polytechnic University of Puerto Rico, 2015)
      By using the tools provided by SQL server we are going to verify some parameters on the database user accounts to determine their vulnerabilities. Run scripts to check if the users have their account passwords set to ...
    • At-Risk students prediction using machine learning 

      Ledain Gentillon, Reginald (Polytechnic University of Puerto Rico, 2019)
      This article intends to discover how machine learning can be used to predict at-risk students during the school year. Different algorithms were tested within a common framework to compare their accuracy and their ...
    • At-Risk Students Prediction Using Machine Learning 

      Ledain Gentillon, Reginald (Polytechnic University of Puerto Rico, 2022)
      This article intends to discover how machine learning can be used to predict at-risk students during the school year. Different algorithms were tested within a common framework to compare their accuracy and their ...
    • Audio Fingerprinting with Robustness to Pitch Scaling and Time Stretching 

      Díaz Millet, Yesenia (Polytechnic University of Puerto Rico, 2013)
      Current audio fingerprinting systems are becoming increasingly robust against noise and filter distortions, however songs that have been pitch scaled and time stretched are still likely to pass undetected. This research ...
    • Automated Data Acquisition using Microsoft Excel 

      Martínez González, Luis F. (Polytechnic University of Puerto Rico, 2016)
      The process of Web Scraping allows the automated extraction of data from an entire website and turn it into a tabular dataset that can be used for reporting and analysis. There are numerous techniques and tools for web ...
    • Blockchain for Nuclear Facilities 

      Morales García, John E. (Polytechnic University of Puerto Rico, 2018)
      Nuclear facilities are some of the most highly protected structures in the world. But rapid technological advances, terrorism and the cyberwarfare, has increased the threat of cybernetic attacks on nuclear facilities. ...
    • Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training 

      Santiago Lozada, Reinaldo E. (Polytechnic University of Puerto Rico, 2019)
      Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ...
    • Capture-The-Flag Framework and Virtual Environment for Cyber Security Education 

      Colón Pérez, Jadiel A. (Polytechnic University of Puerto Rico, 2018)
      When studying cybersecurity or other computer-related technical careers, a problem among the students is the lack of hands-on experience. This can be solved by participating in internships, conferences, and ...
    • Computer Forensic Laboratory for the Polytechnic University of Puerto Rico 

      González Acevedo, Carlos J. (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is ...
    • Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS) 

      Rodríguez Justiniano, José M. (Polytechnic University of Puerto Rico, 2011)
      Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...
    • Considerations on SQL Optimization Tools in MS Azure SQL Server Database using SQL language 

      Rodríguez-Ortiz, Arlene (Polytechnic University of Puerto Rico, 2021)
      Databases are essential since are designed to stored and organized data that can be easily managed and accessed. They are crucial to many organizations, companies, and are used in many aspects of our lives. The relational ...
    • Cracking the Monoalphabetic Substitution Cipher 

      Santana, Carlos (Polytechnic University of Puerto Rico, 2022)
      Cryptography is the cornerstone of secure communication. It is the study of techniques by which a message, the plaintext, is transformed into an obfuscated form, the ciphertext. One of the earliest ...
    • Data Mining Techniques for the Integrated Postsecondary Data System 

      Jiménez Vargas, Wilfredo (Polytechnic University of Puerto Rico, 2018)
      The Process of generating the necessary information for the Integrated Postsecondary Data System can be tedious; a standard way to collect the information for the different departments is needed. To process it, we use ...
    • Desarrollo de la Política de Seguridad de la Información: Cabrera Auto 

      Sevilla Maldonado, Jennifer (Polytechnic University of Puerto Rico, 2016)
      Actualmente las empresas de venta y renta de autos enfrentan una serie de cambios que las obliga a generar nuevas estrategias para la protección de la información que custodian. El aumento en casos de fraudes bancarios ...
    • Design of a Framework for the Best Practices in Computer Forensics within the Cybersecurity Infrastructure in the Regulated Industry 

      Vázquez Ruiz, Eduardo (Polytechnic University of Puerto Rico, 2019)
      We cannot ignore the fact that hackers have been evolving and growing to the level that there are more hackers with the attraction to do evil than Ethical Hackers. Cyber-attacks are a growing threat for companies, and ...
    • The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution 

      Marrero Otero, Ludrián J. (Polytechnic University of Puerto Rico, 2015)
      Regulations in banks are changing constantly and becoming stricter. Threats and technologies are improving. Most antivirus software update their virus definition when the malware is released and attacking. Banks need ...
    • Detection of WannaCry using Splunk and Sysmon 

      Motta López, Henry (Polytechnic University of Puerto Rico, 2021)
      Lately, ransomware keeps being an important topic of conversation around the information security communities, as well as politics and economics. It has caused major damage in all these sectors and researchers must keep ...
    • Developing an Accessible Web Journal with WCAG Guidelines, Fitts’s Law, and Capital T Concept 

      Mercado, Carlos (Polytechnic University of Puerto Rico, 2023)
      In the ever-evolving digital landscape, enhancing web accessibility and user experience remains a paramount objective. By expanding the application of Fitts's Law to user interface design, the researcher unlocks the potential ...