• Analyzing Web Application Attacks: Understanding the Damages 

      Meléndez Ortega, Javier (Polytechnic University of Puerto Rico, 2014)
      This project will demonstrate the damages that can occur by different web application attacks to aid users with the knowledge of disasters and let them know why security is so important. If you don't know what the ...
    • Applicability of Swarm Intelligence to UAVs 

      Martínez Ojeda, Natalia Sary (Polytechnic University of Puerto Rico, 2021)
      Unmanned Aerial Vehicles (UAVs) are atype of aircraft that can be controlled remotely o r programmed to fly in an autonomous way. This project tested the applicability of strategies found in biological intelligenceto ...
    • Assessing SQL Server User Vulnerability and Data Loss 

      Medina Ríos, Sergio G. (Polytechnic University of Puerto Rico, 2015)
      By using the tools provided by SQL server we are going to verify some parameters on the database user accounts to determine their vulnerabilities. Run scripts to check if the users have their account passwords set to ...
    • At-Risk students prediction using machine learning 

      Ledain Gentillon, Reginald (Polytechnic University of Puerto Rico, 2019)
      This article intends to discover how machine learning can be used to predict at-risk students during the school year. Different algorithms were tested within a common framework to compare their accuracy and their ...
    • Automated Data Acquisition using Microsoft Excel 

      Martínez González, Luis F. (Polytechnic University of Puerto Rico, 2016)
      The process of Web Scraping allows the automated extraction of data from an entire website and turn it into a tabular dataset that can be used for reporting and analysis. There are numerous techniques and tools for web ...
    • Blockchain for Nuclear Facilities 

      Morales García, John E. (Polytechnic University of Puerto Rico, 2018)
      Nuclear facilities are some of the most highly protected structures in the world. But rapid technological advances, terrorism and the cyberwarfare, has increased the threat of cybernetic attacks on nuclear facilities. ...
    • Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training 

      Santiago Lozada, Reinaldo E. (Polytechnic University of Puerto Rico, 2019)
      Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ...
    • Capture-The-Flag Framework and Virtual Environment for Cyber Security Education 

      Colón Pérez, Jadiel A. (Polytechnic University of Puerto Rico, 2018)
      When studying cybersecurity or other computer-related technical careers, a problem among the students is the lack of hands-on experience. This can be solved by participating in internships, conferences, and ...
    • Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS) 

      Rodríguez Justiniano, José M. (Polytechnic University of Puerto Rico, 2011)
      Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...
    • Cracking the Monoalphabetic Substitution Cipher 

      Santana, Carlos (Polytechnic University of Puerto Rico, 2022)
      Cryptography is the cornerstone of secure communication. It is the study of techniques by which a message, the plaintext, is transformed into an obfuscated form, the ciphertext. One of the earliest ...
    • Data Mining Techniques for the Integrated Postsecondary Data System 

      Jiménez Vargas, Wilfredo (Polytechnic University of Puerto Rico, 2018)
      The Process of generating the necessary information for the Integrated Postsecondary Data System can be tedious; a standard way to collect the information for the different departments is needed. To process it, we use ...
    • Desarrollo de la Política de Seguridad de la Información: Cabrera Auto 

      Sevilla Maldonado, Jennifer (Polytechnic University of Puerto Rico, 2016)
      Actualmente las empresas de venta y renta de autos enfrentan una serie de cambios que las obliga a generar nuevas estrategias para la protección de la información que custodian. El aumento en casos de fraudes bancarios ...
    • Design of a Framework for the Best Practices in Computer Forensics within the Cybersecurity Infrastructure in the Regulated Industry 

      Vázquez Ruiz, Eduardo (Polytechnic University of Puerto Rico, 2019)
      We cannot ignore the fact that hackers have been evolving and growing to the level that there are more hackers with the attraction to do evil than Ethical Hackers. Cyber-attacks are a growing threat for companies, and ...
    • The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution 

      Marrero Otero, Ludrián J. (Polytechnic University of Puerto Rico, 2015)
      Regulations in banks are changing constantly and becoming stricter. Threats and technologies are improving. Most antivirus software update their virus definition when the malware is released and attacking. Banks need ...
    • Detection of WannaCry using Splunk and Sysmon 

      Motta López, Henry (Polytechnic University of Puerto Rico, 2021)
      Lately, ransomware keeps being an important topic of conversation around the information security communities, as well as politics and economics. It has caused major damage in all these sectors and researchers must keep ...
    • Employee Guide to Cybersecurity and Cyber Threats 

      Feliciano Cruz, Emily Y. (Polytechnic University of Puerto Rico, 2023)
      Cybersecurity is a growing concern for companies and workers due to the growing threats posed by technology. The Covid-19 pandemic has highlighted the need for protective shields, with malware being a major threat. WannaCry, ...
    • Hacking Mobile Devices Using WiFi Pineapple Nano 

      Mojica Serrano, Alexis (Polytechnic University of Puerto Rico, 2019)
      Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different ...
    • Honeypots as Computer Forensics Tool 

      Avilés Lugo, Marcos (Polytechnic University of Puerto Rico, 2015)
      Cybercrimes were increase in last years. In a near future majority of crime will be cybercrimes. The new technologies like mobile device and networks permit easy access to electronic devices that have Electronic Stored ...
    • The Impact of Segmentation and Overlapping in Feature Extraction for Biometric Human Authentication Systems 

      Varela Rosa, Carla Andrea (Polytechnic University of Puerto Rico, 2021)
      One of the arduous challenges in Machine Learning is how to extract features withenough information that will simplifythe learning process of classificationmodels;therefore,leading to better predictionsand ...
    • Implementation of a Cost Function to Model Travel Cost for Shortest Path Routing 

      Rivera López, Carlos (Polytechnic University of Puerto Rico, 2019)
      Many times, as we travel in a region from one place to another we start wondering if there’s a better, optimal path to travel from point A to point B. In order to figure this out, normally, we would seek for details ...