• Servilistapr.Com –Grade the Service which You Receive, Web Application 

      Robles, Ricardo A. (Polytechnic University of Puerto Rico, 2015)
      A web application design is as important and the development of a typical Software development Life cycle (SDLC). The ServiListaPR web application comes to birth from the necessity of the users, trying to search a ...
    • Static and Dynamic Analysis of Android Mobile Malware 

      Becerra, Ana Patricia (Polytechnic University of Puerto Rico, 2013)
      In the last years, mobile malware has become a serious threat to thousands of users. The massive increase in the use of smartphones with the Android platform makes the need for malware analysis of this platform a ...
    • Steganography and Steganalysis in Digital Images 

      Cruz Vélez, Marcus D. (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ Steganography (from the Greek for "covered writing") is the secret transmission of a message. Its main distinction from encryption relies on the capacity of making a message altogether invisible. A steganographic ...
    • Study on Blockchain Technologies for Modern Enterprise Applications 

      Rodríguez Pérez, David A. (Polytechnic University of Puerto Rico, 2018)
      We are living on a time where emerging technologies are disrupting the way we work in multiple industries. One of these technologies is distributed ledgers called Blockchains. Within the enterprise, we are analyzing and ...
    • Trigger Files Text Analysis and Processing Time Anomaly Detection 

      Irizarry Rodríguez, Josué (Polytechnic University of Puerto Rico, 2014)
      Today the data processing is a vital part of the system supporting organization processes and transactions. A lot of data is managed, transmitted and stored daily. The format of the data is structured, unstructured or ...
    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Unified Threat Management 

      Christenson Colón, Bernard J. (Polytechnic University of Puerto Rico, 2018)
      Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
    • Using a Supervised Learning Model: Two-Class Boosted Decision Tree Algorithm for Income Prediction 

      Ríos Canales, Victor (Polytechnic University of Puerto Rico, 2016)
      People always try to think or ponder about things in advance regarding the decisions they make, whether if it is a good idea or even if it is not a good idea. If the person has all the correct and necessary information, ...
    • Validation of NMAP’s Network Behavior using Wireshark 

      Cruz Ramírez, Daniel (Polytechnic University of Puerto Rico, 2016)
      NMAP is used to actively scan networks using different ping techniques. There is not much information available on how NMAP works besides its website. Although the program states how it works, there is little validation ...