This document provides a full list of publications by Carlos A. Guti辿rrez, organized into the following sections: international conferences, Spanish and Latin American conferences, international journals, Spanish and Latin American journals, international edited books, book chapters, and technical reports. The list includes over 50 publications spanning conferences, journals, books, and technical reports.
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
油
15th International Conference on Network Security & Applications (CNSA 2022) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and counter measures and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Security & its applications.
1. The document discusses data integrity and risk management. It provides submission deadlines and dates for several conferences in 2013 related to data engineering, geoscience and remote sensing, database and expert systems applications, and more. It also lists relevant journal publication deadlines and topics.
2. Risk management topics and experts are listed, including Barry Boehm, Victor Basili, and Donald W. Davies. Conferences in this area mentioned are MASS, HICSS, WiCom, ICEE, and SMC.
3. Software development, security requirements, risk management, quality improvement, and process models are areas of focus. Relevant conferences named are APSEC, ICSE, SEKE, and
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
油
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of security and privacy in IoT edge, cloud and fog environment.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
油
This document presents a systematic mapping study that evaluates current research related to privacy and security in the Internet of Things (IoT). The study involved searching academic databases and selecting 54 relevant papers based on inclusion/exclusion criteria. These papers were classified according to their research type and context. The results showed that most studies addressed public applications and discussed authentication, authorization, and encryption methods. However, privacy issues and solutions in IoT cloud/fog environments require more development. The mapping identified trends, including widespread IoT use in public areas but less in medical/industrial fields, and a focus on distributed environments over privacy in cloud/fog computing.
Web Reputations
(Avoiding Social Media Landmines in PM) by F. Randall Randy Farmer at SVPMA Monthly Event October 2010
Qu辿 tipos de conexiones pueden tener los dispositivosBel辿n Walls
油
El documento describe los diferentes tipos de conectores que pueden tener los dispositivos, incluyendo conectores seriales, paralelos, PS2, de monitor, USB, de audio, SCSI y RJ-45. Cada conector tiene un prop坦sito diferente como la conexi坦n de m坦dems, ratones, teclados, monitores, dispositivos de almacenamiento, tarjetas de red y m叩s.
Kinamik is a software company that provides a solution called Secure Audit Vault to verify the integrity of electronic records. The solution builds tamper-evident registries to detect any changes to records in order to facilitate regulatory compliance, reduce costs of e-discovery and forensics, and deter insider threats. Kinamik's approach focuses on data integrity rather than perimeter security alone. The company was founded in 2005 and has filed several patents on its cryptographic algorithms and intellectual property.
The document lists 57 references related to the Internet of Things (IoT). It covers topics such as the evolution of wireless sensor networks towards IoT, future directions for IoT, clustering techniques in wireless sensor networks, applications of wireless sensors, deployment algorithms for sensor networks, energy efficient routing protocols, performance of sensor network motes, adding value to sensor network simulations, overviews and definitions of IoT, enabling technologies and protocols for IoT, applications of IoT such as smart cities and healthcare, security and privacy issues in IoT, IoT testbeds and experimental platforms, middleware for IoT, and data analytics and management for large-scale IoT systems.
This document provides an overview of using data science techniques for analyzing Internet of Things (IoT) network traffic, using a smart home network as an example. It first discusses IoT systems, including components, communication protocols, and challenges. It then discusses how machine learning approaches like pattern detection, feature selection, and classification can be used to analyze IoT network traffic and behaviors. Specifically, it presents how these techniques could be applied in R and RStudio to a practical smart home network case study to better understand device interactions and identify anomalies.
This document provides a list of 57 references related to the Internet of Things (IoT). The references cover topics such as the evolution of wireless sensor networks towards IoT, future Internet and IoT, clustering techniques in wireless sensor networks for IoT scenarios, civil applications of wireless sensors, deployment algorithms for coverage and connectivity in wireless sensor networks, energy efficient routing techniques for wireless sensor networks, performance analysis of sensor motes used in wireless sensor networks, adding value to wireless sensor network simulations using experimental IoT platforms, overviews of IoT, data fusion and IoT for smart environments, challenges of waste management in IoT-enabled smart cities, enabling IoT technologies and protocols, IoT gateways, semantics for IoT,
Most cited articles in academia - International journal of network security &...IJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document provides an introduction and overview of an IT Forensics course. The course objectives are to understand basic IT Forensics concepts and various forensic methods for file systems, operating systems, web, networks, computers, and mobile devices. The course material will cover topics like digital forensic principles, triage procedures, analyzing file systems, mobile forensics, audio forensics, video forensics, image forensics, and network forensics tools. Students are expected to attend at least 80% of classes and follow Teknokrat rules. Grading will be based on quizzes, assignments, midterms, and a final exam. The course website provides additional resources. Digital forensics is
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
油
4th International Conference on Networks and Security (NSEC 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks and Communications security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and sharecutting-edge development in the field.
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
油
This document discusses opportunities for research in Internet of Things (IoT). It begins by defining IoT and describing common communication patterns. It then discusses areas of IoT including applications, device heterogeneity, taxonomy of technologies, healthcare, wellness, challenges, security and privacy issues. Examples are provided on hardware architecture, data collection, sensor placement, and monitoring in healthcare IoT. Drawbacks of existing security approaches are outlined. In closing, the author provides contact information for further discussion.
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)pijans
油
5th International Conference on IOT, Big Data and Security (IOTBS 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of IOT, Big Data and Security. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of IoT, Big Data and Security.
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
油
4th International Conference on NLP & Big Data (NLPD 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Big data.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
油
13th International Conference on Network Security & Applications (CNSA 2020) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and counter measures and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2024 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
How to teach M365 Copilot and M365 Copilot Chat prompting to your colleagues. Presented at the Advanced Learning Institute's "Internal Communications Strategies with M365" event on February 27, 2025. Intended audience: Internal Communicators, User Adoption Specialists, IT.
DealBook of Ukraine: 2025 edition | AVentures CapitalYevgen Sysoyev
油
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2024 and the first deals of 2025.
More Related Content
Similar to Publications of Carlos A. Gutierrez - January 2011 (20)
This document provides an overview of using data science techniques for analyzing Internet of Things (IoT) network traffic, using a smart home network as an example. It first discusses IoT systems, including components, communication protocols, and challenges. It then discusses how machine learning approaches like pattern detection, feature selection, and classification can be used to analyze IoT network traffic and behaviors. Specifically, it presents how these techniques could be applied in R and RStudio to a practical smart home network case study to better understand device interactions and identify anomalies.
This document provides a list of 57 references related to the Internet of Things (IoT). The references cover topics such as the evolution of wireless sensor networks towards IoT, future Internet and IoT, clustering techniques in wireless sensor networks for IoT scenarios, civil applications of wireless sensors, deployment algorithms for coverage and connectivity in wireless sensor networks, energy efficient routing techniques for wireless sensor networks, performance analysis of sensor motes used in wireless sensor networks, adding value to wireless sensor network simulations using experimental IoT platforms, overviews of IoT, data fusion and IoT for smart environments, challenges of waste management in IoT-enabled smart cities, enabling IoT technologies and protocols, IoT gateways, semantics for IoT,
Most cited articles in academia - International journal of network security &...IJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document provides an introduction and overview of an IT Forensics course. The course objectives are to understand basic IT Forensics concepts and various forensic methods for file systems, operating systems, web, networks, computers, and mobile devices. The course material will cover topics like digital forensic principles, triage procedures, analyzing file systems, mobile forensics, audio forensics, video forensics, image forensics, and network forensics tools. Students are expected to attend at least 80% of classes and follow Teknokrat rules. Grading will be based on quizzes, assignments, midterms, and a final exam. The course website provides additional resources. Digital forensics is
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
油
4th International Conference on Networks and Security (NSEC 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks and Communications security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and sharecutting-edge development in the field.
IoT : Peluang Riset di Bidang KesehatanDeris Stiawan
油
This document discusses opportunities for research in Internet of Things (IoT). It begins by defining IoT and describing common communication patterns. It then discusses areas of IoT including applications, device heterogeneity, taxonomy of technologies, healthcare, wellness, challenges, security and privacy issues. Examples are provided on hardware architecture, data collection, sensor placement, and monitoring in healthcare IoT. Drawbacks of existing security approaches are outlined. In closing, the author provides contact information for further discussion.
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
CFP: 5th International Conference on IOT, Big Data and Security (IOTBS 2025)pijans
油
5th International Conference on IOT, Big Data and Security (IOTBS 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of IOT, Big Data and Security. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of IoT, Big Data and Security.
4th International Conference on NLP & Big Data (NLPD 2023)aciijournal
油
4th International Conference on NLP & Big Data (NLPD 2023) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Big data.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
13th International Conference on Network Security & Applications (CNSA 2020)IJNSA Journal
油
13th International Conference on Network Security & Applications (CNSA 2020) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and counter measures and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2024 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
油
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
How to teach M365 Copilot and M365 Copilot Chat prompting to your colleagues. Presented at the Advanced Learning Institute's "Internal Communications Strategies with M365" event on February 27, 2025. Intended audience: Internal Communicators, User Adoption Specialists, IT.
DealBook of Ukraine: 2025 edition | AVentures CapitalYevgen Sysoyev
油
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2024 and the first deals of 2025.
EaseUS Partition Master Crack 2025 + Serial Keykherorpacca127
油
https://ncracked.com/7961-2/
Note: >> Please copy the link and paste it into Google New Tab now Download link
EASEUS Partition Master Crack is a professional hard disk partition management tool and system partition optimization software. It is an all-in-one PC and server disk management toolkit for IT professionals, system administrators, technicians, and consultants to provide technical services to customers with unlimited use.
EASEUS Partition Master 18.0 Technician Edition Crack interface is clean and tidy, so all options are at your fingertips. Whether you want to resize, move, copy, merge, browse, check, convert partitions, or change their labels, you can do everything with a few clicks. The defragmentation tool is also designed to merge fragmented files and folders and store them in contiguous locations on the hard drive.
This is session #3 of the 5-session online study series with Google Cloud, where we take you onto the journey learning generative AI. Youll explore the dynamic landscape of Generative AI, gaining both theoretical insights and practical know-how of Google Cloud GenAI tools such as Gemini, Vertex AI, AI agents and Imagen 3.
Data-Driven Public Safety: Reliable Data When Every Second CountsSafe Software
油
When every second counts, you need access to data you can trust. In this webinar, well explore how FME empowers public safety services to streamline their operations and safeguard communities. This session will showcase workflow examples that public safety teams leverage every day.
Well cover real-world use cases and demo workflows, including:
Automating Police Traffic Stop Compliance: Learn how the City of Fremont meets traffic stop data standards by automating QA/QC processes, generating error reports saving over 2,800 hours annually on manual tasks.
Anonymizing Crime Data: Discover how cities protect citizen privacy while enabling transparent and trustworthy open data sharing.
Next Gen 9-1-1 Integration: Explore how Santa Clara County supports the transition to digital emergency response systems for faster, more accurate dispatching, including automated schema mapping for address standardization.
Extreme Heat Alerts: See how FME supports disaster risk management by automating the delivery of extreme heat alerts for proactive emergency response.
Our goal is to provide practical workflows and actionable steps you can implement right away. Plus, well provide quick steps to find more information about our public safety subscription for Police, Fire Departments, EMS, HAZMAT teams, and more.
Whether youre in a call center, on the ground, or managing operations, this webinar is crafted to help you leverage data to make informed, timely decisions that matter most.
AI Trends and Fun Demos Sothebys Rehoboth PresentationEthan Holland
油
Ethan B. Holland explores the impact of artificial intelligence on real estate and digital transformation. Covering key AI trends such as multimodal AI, agency, co-pilots, and AI-powered computer usage, the document highlights how emerging technologies are reshaping industries. It includes real-world demonstrations of AI in action, from automated real estate insights to AI-generated voice and video applications. With expertise in digital transformation, Ethan shares insights from his work optimizing workflows with AI tools, automation, and large language models. This presentation is essential for professionals seeking to understand AIs role in business, automation, and real estate.
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterDanBrown980551
油
This webinar will introduce the Grid Edge Security and Interoperability Alliance, or GEISA, an effort within LF Energy to address application interoperability at the very edge of the utility network: meters and other distribution automation devices. Over the last decade platform manufacturers have introduced the ability to run applications on electricity meters and other edge devices. Unfortunately, while many of these efforts have been built on Linux, they havent been interoperable. APIs and execution environment have varied from one manufacturer to the next making it impossible for utilities to obtain applications that they can run across a fleet of different devices. For utilities that want to minimize their supply chain risk by obtaining equipment from multiple suppliers, they are forced to run and maintain multiple separate management systems. Applications available for one device may need to be ported to run on another, or they may not be available at all.
GEISA addresses this by creating a vendor neutral specification for utility edge computing environments. This webinar will discuss why GEISA is important to utilities, the specific issues GEISA will solve and the new opportunities it creates for utilities, platform vendors, and application vendors.
Caching for Performance Masterclass: The In-Memory DatastoreScyllaDB
油
Understanding where in-memory data stores help most and where teams get into trouble.
- Where in the stack to cache
- Memcached as a tool
- Modern cache primitives
UiPath Agentic Automation Capabilities and OpportunitiesDianaGray10
油
Learn what UiPath Agentic Automation capabilities are and how you can empower your agents with dynamic decision making. In this session we will cover these topics:
What do we mean by Agents
Components of Agents
Agentic Automation capabilities
What Agentic automation delivers and AI Tools
Identifying Agent opportunities
If you have any questions or feedback, please refer to the "Women in Automation 2025" dedicated Forum thread. You can find there extra details and updates.
DevNexus - Building 10x Development Organizations.pdfJustin Reock
油
Developer Experience is Dead! Long Live Developer Experience!
In this keynote-style session, well take a detailed, granular look at the barriers to productivity developers face today and modern approaches for removing them. 10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, The Coding War Games.
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method, we invent to deliver products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches works? DORA? SPACE? DevEx? What should we invest in and create urgency behind today so we dont have the same discussion again in a decade?
Caching for Performance Masterclass: Caching at ScaleScyllaDB
油
Weighing caching considerations for use cases with different technical requirements and growth expectations.
- Request coalescing
- Negative sharding
- Rate limiting
- Sharding and scaling
Blockchain is revolutionizing industries by enhancing security, transparency, and automation. From supply chain management and finance to healthcare and real estate, blockchain eliminates inefficiencies, prevents fraud, and streamlines operations.
What You'll Learn in This Presentation:
1. How blockchain enables real-time tracking & fraud prevention
2. The impact of smart contracts & decentralized finance (DeFi)
3. Why businesses should adopt secure and automated blockchain solutions
4. Real-world blockchain applications across multiple industries
Explore the future of blockchain and its practical benefits for businesses!
Understanding Traditional AI with Custom Vision & MuleSoft.pptxshyamraj55
油
Understanding Traditional AI with Custom Vision & MuleSoft.pptx | ### 際際滷 Deck Description:
This presentation features Atul, a Senior Solution Architect at NTT DATA, sharing his journey into traditional AI using Azure's Custom Vision tool. He discusses how AI mimics human thinking and reasoning, differentiates between predictive and generative AI, and demonstrates a real-world use case. The session covers the step-by-step process of creating and training an AI model for image classification and object detectionspecifically, an ad display that adapts based on the viewer's gender. Atulavan highlights the ease of implementation without deep software or programming expertise. The presentation concludes with a Q&A session addressing technical and privacy concerns.
UiPath Automation Developer Associate Training Series 2025 - Session 2DianaGray10
油
In session 2, we will introduce you to Data manipulation in UiPath Studio.
Topics covered:
Data Manipulation
What is Data Manipulation
Strings
Lists
Dictionaries
RegEx Builder
Date and Time
Required Self-Paced Learning for this session:
Data Manipulation with Strings in UiPath Studio (v2022.10) 2 modules - 1h 30m - https://academy.uipath.com/courses/data-manipulation-with-strings-in-studio
Data Manipulation with Lists and Dictionaries in UiPath Studio (v2022.10) 2 modules - 1h - https:/academy.uipath.com/courses/data-manipulation-with-lists-and-dictionaries-in-studio
Data Manipulation with Data Tables in UiPath Studio (v2022.10) 2 modules - 1h 30m - https:/academy.uipath.com/courses/data-manipulation-with-data-tables-in-studio
鏝 For any questions you may have, please use the dedicated Forum thread. You can tag the hosts and mentors directly and they will reply as soon as possible.
FinTech is reshaping the way businesses handle payments, risk management, and financial operations. From AI-driven fraud detection to blockchain-powered security, the right FinTech solutions can streamline processes, reduce costs, and improve decision-making. This guide explores 10 essential FinTech tools that help businesses stay ahead in an increasingly digital economy.
Discover how digital payments, credit risk management, treasury solutions, AI, blockchain, and RegTech can enhance efficiency, security, and profitability.
Read now to learn how businesses are leveraging FinTech for smarter financial management!
2. Full list of publications
International Conferences
Spanish and Latin American Conferences
International Journals
Spanish and Latin American Journals
International Edited Books
Book Chapters
Technical Reports
3. Full list of publications
International Conferences (1/2)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is
the problem solved? Proceedings of the 2nd. International Workshop on
Security In Information Systems, WOSlS 2004 joined with ICEIS 2004,
INSTICC Press, Oporto (Portugal), April 2004, pp. 293-304.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Survey of Web Services
Security. Proceedings of the Workshop on Internet Communications
Security 2004 (WICS 2004), joined with 2004 International Conference on Computational
Science and lts Appllcations (ICCSA 2004), May 14-17, Assisi (PG) Italy, Springer-Verlag,
LNCS 3043, ISBN 3-540-22054-2, pp. 969-977.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Considerations in Web Services
Security. Proceedings of the International Symposium on Web Services
& Applications (ISWS04), Las Vegas, Nevada (US), CSREA Press,
ISBN 1-932415- 45-9, pp. 99-105.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Proceedings of fhe 2nd. International Workshop on Security In
Information Systems, WOSlS 2005 joined with ICEIS 2005, INSTICC Press,
ISBN 972-8865-25-2, May 2005, Miami (US).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Requirements for Web
Services based on SIREN, Symposium on Requirements Engineering for Information
Security (SREIS) joined with RE 05 - l3th IEEE International Requirements Engineering Conference,
August 2005, Paris (France).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web services-based Security requirement
elicitation, lst. International Workshop on Service-Oriented Computing: Consequences for Engineering
Requirements (SOCCEROS) joined with RE 05 - l3th IEEE International Requirements Engineer
4. Full list of publications
International Conferences (2/2)
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., A Study of
Security Architectural Patterns, The First International Conference on Availability, Reliability
and Security (ARES06), pp.3S8-36S, IEEE Computer Society, ISBN 0-7695-2567-9,
20-22 April 2006, Vienna (Austria).
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security
Patterns related to Security Requirements, 3rd International Workshop on Security in
Information Systems (WOSIS 2006) joined with ICEIS 2005, INSTICC Press.,
May 2006, Paphos (Cyprus).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Security Risk Analysis in
Web Services Systems, International Conference on Security and Cryptography
(SECRYPT 2006), Set炭bal (Portugal), August 2006, INSTICC Press.,
pp. 425-430, ISBN-972-8865-63-5.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Defining Viewpoints for Security Architectural Patterns, International
Conference on Security and Cryptography (SECRYPT 2006), Set炭bal (Portugal),
August 2006, INSTICC Press, pp. 419-424, ISBN-972-8865-63-5.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Defining Security Architectural
Patterns based on Viewpoints, 2007 International Conference on Computational Science and Its Applications
(ICCSA 2007), Kuala Lumpur, Malaysia, August 2007, LNCS 4707/2007, pp. 262-272.
5. Full list of publications
Spanish and Latin American Conferences (I/2)
Lecture on the State of the Art on Web Services Security,
October 2004, Zaragoza (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Estado del Arte en
Federaci坦n mediante Servicios Web, Primer Taller de Seguridad en
Ingenier鱈a del Software y Bases de Datos (SISBD04), pp. 21-32, 9 de
November, M叩laga (Spain)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., PWSSEC: Proceso
de Desarrollo para Seguridad de Servicios Web, X Jornadas de Ingenier鱈a
del Software y Bases de Datos (JISBD 2005) joined with the I Congreso
Espa単ol de Inform叩tica 2005. (CEDI2005), pp. 203-210,
13-14 September, Granada (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Desarrollo de
sistemas basados en servicios web seguros, Jornadas Cient鱈fico-T辿cnicas
en Servicios Web (JSWEB 2005) joined with the I Congreso Espa単ol de
Inform叩tica 2005 (CEDI2005), pp. 141- 149, 13-14 September, Granada (Spain).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Patrones de Seguridad
conforme a los Requisitos de Seguridad para Servicios Web, IX
Reuni坦n Espa単ola sobre Criptolog鱈a y Seguridad de la Informaci坦n (RECSI 2006),
pp. 501-514, 7-9 September, Barcelona (Spain).
6. Full list of publications
Spanish and Latin American Conferences (2/2)
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Elicitaci坦n
de Requisitos de Seguridad para Servicios Web en PWSSec,
3er. Congreso Iberoamericano de Seguridad Inform叩tica
CIBSI 2005, pp. 385-400, 21-25 November 2005, Valpara鱈so (Chile).
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Comparaci坦n
de Patrones de Seguridad para el desarrollo de Sistemas
Seguros, IV Congreso Internacional de Auditor鱈a y Seguridad
de la Informaci坦n CIASI 2005, 14-16 December 2005, Madrid (Spain).
Rosado, G. D., Guti辿rrez, C., & Fern叩ndez-Medina, E., The practical
application of a process for eliciting and designing security in
web service systems XV Jornadas de Ingenier鱈a del Software
y Bases de Datos (JISBD 2010), pp. 143, 7-10 September, Valencia(Spain).
7. Full list of publications
International Journals
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security: is the
problem solved?, Information Systems Security, 13 (3), pp. 23-31, July/August 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Towards a Process for
Web Services Security, Journal of Research and Practice in Information
Technology, Australian Computer Society, 38(1), pp. 57-67, 2006.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Comparison of Security Patterns, IJCSNS International Journal of Computer
Science and Network Security, 6(2B), pp. 139-146, February 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Development of
Web Services Security Systems, International Journal of Web
Engineering and Technology (IJWET), 2(4), pp. 292-306, lnderscience
Publishers, 2006.
Rosado, G., Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Security Patterns
and Security Requirements for Web Services, Internet Research, 16 (5), pp. 519-536,
November/December 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Web Services Security Requirement
Elicitation, IEICE Transactions on Information and Systems, September 2007.
8. Full list of publications
Spanish and Latin American Journals
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini M., PWSSEC: Proceso de Desarrollo
para Seguridad de Servicios Web, IEEE Am辿rica Latina (Special Edition JISBD 2005),
Vol. 4, April 2006.
Rosado, David G., Guti辿rrez, C., Fern叩ndez-Medina, E.,
& Piattini, M., Una Visi坦n General sobre Patrones de
Seguridad, Revista del C鱈rculo de Usuarios de Oracle,
pp.3-I5, February 2006.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Federaci坦n de
dominios de confianza mediante servicios web, eSecurity European Security,
N属2, pp. 70-75, November 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Applying Security
Standards in Web Services, e.Security European Security (european edition)
N属1, pp. 54-57, October 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M.,
Aplicaci坦n de Est叩ndares de Seguridad en Servicios Web,
e.Security European Security, N属1, pp. 62-65, September 2004.
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, M., Seguridad en servicios
Web. Revista del C鱈rculo de Usuarios de Oracle, May 2004.
9. Full list of publications
International Edited Books
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2010): Web Services
Security: theoretical and practical issues, IGI Global (USA). January 2010.
10. Full list of publications
Chapter books
C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez,
D.G. Rosado, E. Fern叩ndez-Medina, M. Piattini (2011):
Security over the Information Systems Development
Cycle. In Software Engineering for Secure Systems:
Industrial and Research Perspectives. Haralambos
Mouratidis (Eds.). IGI Global (United States).
C. Blanco, D. Mellado, C. Guti辿rrez, A. Rodr鱈guez,
D.G. Rosado, J. Lasheras, A. Toval, J. Trujillo,
E. Fern叩ndez-Medina, M. Piattini (2009):
Seguridad en Ingenier鱈a del Software.
Editorial Ra-Ma (Spain).
Gutierrez, C., Fernandez-Medina, E., Piattini, M.
(2005): Web Services Security. Chapter 2 in the
book Information and Web Security, Bhavani
M. Thuraisingham, Elena Ferrari (Eds.), Idea Group
Publishing (United States) (FIRST CHAPTER OF
THIS BOOK WAS AUTHORED BY SIR. TIM
BERNERS-LEE)
11. Full list of publications
Technical Report
Guti辿rrez, C., Fern叩ndez-Medina, E., & Piattini, Seguridad en Servicios
Web. Informe T辿cnico UCLM DIAB-05-01-2. Departamento de
Inform叩tica, Universidad de Castilla-La Mancha. January 2005. 386 pages.