• Testing, Simulating, and Profiling Designated Problems for CASL 

      Camacho Bonaparte, Yael M. (Polytechnic University of Puerto Rico, 2013)
      Simulation is an essential step for future implementations of more efficient and safer reactor components. In nuclear Technology, this translates to cost, fuel, and waste reduction, and enhanced safety. The software ...
    • Timesheet Management System Project 

      Alicea Dominguez, Pedro L. (Polytechnic University of Puerto Rico, 2014)
      The Timesheet Management System (TMS) is a web application composed of an n-tier architectural design that use ASP.NET framework and best practices in software engineering. Its purpose it’s to maintain track of clients, ...
    • Trigger Files Text Analysis and Processing Time Anomaly Detection 

      Irizarry Rodríguez, Josué (Polytechnic University of Puerto Rico, 2014)
      Today the data processing is a vital part of the system supporting organization processes and transactions. A lot of data is managed, transmitted and stored daily. The format of the data is structured, unstructured or ...
    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Unified Risk List for Electronically Stored Information Subject to eDiscovery in Cloud Computing 

      Vargas Rodríguez, Jonathan (Polytechnic University of Puerto Rico, 2015)
      Electronic discovery is the process of production of electronically stored information (ESI) for use in legal court or corporate investigations. When eDiscovery is performed over a cloud service, the amount of risks ...
    • Unified Threat Management 

      Christenson Colón, Bernard J. (Polytechnic University of Puerto Rico, 2018)
      Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
    • Using a Supervised Learning Model: Two-Class Boosted Decision Tree Algorithm for Income Prediction 

      Ríos Canales, Victor (Polytechnic University of Puerto Rico, 2016)
      People always try to think or ponder about things in advance regarding the decisions they make, whether if it is a good idea or even if it is not a good idea. If the person has all the correct and necessary information, ...
    • Uso de las Técnicas Del Hacking Ético para la Reducción de Amenazas de Ciberseguridad 

      González González, José M. (Polytechnic University of Puerto Rico, 2023)
      A medida que las empresas tanto públicas como privadas comienzan a acomodar gran parte de sus capacidades de sistemas de información en la Internet, se hacen más propensas a que hackers de índole criminal puedan utilizar ...
    • Validation of NMAP’s Network Behavior using Wireshark 

      Cruz Ramírez, Daniel (Polytechnic University of Puerto Rico, 2016)
      NMAP is used to actively scan networks using different ping techniques. There is not much information available on how NMAP works besides its website. Although the program states how it works, there is little validation ...
    • Web Attacks Analytics 

      Sanchez Pardella, Luis O. (Polytechnic University of Puerto Rico, 2020)
      Cyber-attacks are on the rise. Information systems are constantly being attacked, generating economic loss. Computer networks and web technologies are the preferred places for hackers to commit cybercrimes. Most computers ...