An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador … CW Montenegro, DA Flores Computing, Communication and Security (ICCCS), 2015 International Conference …, 2015 | 44 | 2015 |
Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information DA Flores, F Qazi, A Jhumka Trustcom/BigDataSE/I SPA, 2016 IEEE, 1008-1015, 2016 | 22 | 2016 |
Combining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions DA Flores, O Angelopoulou, RJ Self 2012 Third International Conference on Emerging Intelligent Data and Web …, 2012 | 21 | 2012 |
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022 | 17 | 2022 |
Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes DA Flores, A Jhumka 2017 IEEE Trustcom/BigDataSE/ICESS, 675-682, 2017 | 16 | 2017 |
CONDOR: A hybrid ids to offer improved intrusion detection DJ Day, DA Flores, HS Lallie Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 11 | 2012 |
An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together DA Flores, O Angelopoulou, RJ Self Journal of Internet Services and Information Security (JISIS) 3 (1/2), 101-114, 2013 | 7 | 2013 |
An authentication and auditing architecture for enhancing security on egovernment services DA Flores 2014 First International Conference on eDemocracy & eGovernment (ICEDEG), 73-76, 2014 | 6 | 2014 |
A Usability-focused Method to Design a Cybersecurity MOOC for Children J Galindo, DA Flores, SL Cannon, R Andrade, S Jiménez, D Zambrano, ... 2022 Third International Conference on Information Systems and Software …, 2022 | 3 | 2022 |
Cloud-GMR: A Qualitative Framework for Governance and Risk Management of Cloud-hosted Public Services DA Flores, G Morocho 2020 XLVI Latin American Computing Conference (CLEI), 294-303, 2020 | 2 | 2020 |
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing DA Flores, A Jhumka 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 2 | 2019 |
A social engineering discussion about privacy attacks and defences considering web browsers and social networks DA Flores 8th Congress of Science and Technology-ESPE, Sangolquí, EC, 2013 | 2 | 2013 |
Evaluating Social and Ecological Sustainability Initiatives in Global Companies Using Text Analysis Techniques G Moreta, E Loza-Aguirre, CM Armas, DA Flores 2021 Fifth World Conference on Smart Trends in Systems Security and …, 2021 | 1 | 2021 |
Implementing chain of custody requirements in database audit records for forensic purposes D Flores Armas, A Jhumka Trustcom/BigDataSE/ICESS, 2017 IEEE, 2017 | 1 | 2017 |
Diseño de un plan de gestión de seguridades de la información para Instituciones Públicas Ecuatorianas PE Chicaiza Jami, AV Díaz Villafuerte Quito, 2014., 2014 | 1 | 2014 |
Guidelines for Collecting Forensic Computing Evidence in order to reinforce the Detection of Money Laundering Activities in the Central Bank of Ecuador. DA Flores Armas University of Derby/2012, 2012 | 1 | 2012 |
A SCRUM-based Methodology for Implementing an Interactive Virtual Learning Environment to Teach Cybersecurity to Children DA Flores, D Cruz, SL Cannon, H Moncayo, P Del Hierro, ... 2023 XLIX Latin American Computer Conference (CLEI), 1-10, 2023 | | 2023 |
A GDPR-compliant Risk Management Approach based on Threat Modelling and ISO 27005 DA Flores, R Perugachi arXiv preprint arXiv:2306.04783, 2023 | | 2023 |
Propuesta de un ciclo de gestión de riesgos utilizando modelos de amenazas y controles de seguridad ISO/EC 27002/EGSI/RGPD RA Perugachi Cartagena Quito, 2021., 2021 | | 2021 |
Evaluación de la eficiencia de ataques de tipo clickjacking y touchjacking en entornos controlados EF Cajías Borja Quito, 2020., 2020 | | 2020 |