Torres Olmedo Jenny Gabriela
Departamento de Informática y Ciencias de la Computación
Esta dirección de correo electrónico está siendo protegida contra los robots de spam. Necesita tener JavaScript habilitado para poder verlo.
Oficina: 221
Ext: 4735
iD orcid.org/0000-0002-8920-1225
Estudios
  1. Ingeniera en sistemas informáticos y de computación, Escuela Politécnica Nacional. Quito-Ecuador
  2. Magister en gerencia de redes y telecomunicaciones, Universidad de las Fuerzas Armadas (ESPE). Quito-Ecuador
  3. Master sciences, technologie, sante, a finalite recherche, mention informatique, specialite securite des systemes, Universidad de Paris XII. Paris-Francia
  4. Docteur de l’universite paris 6 informatique, telecomunications et electronique, Universidad de Paris VI. Paris-Francia
Líneas de investigación
  1. DICC-A2-L2 Seguridad y Privacidad
  2. DICC-A2-L3 Temas profesionales y sociales
Publicaciones
  1. Andrade, R., Torres, J., Ortiz-Garcés, I., Miño, J., & Almeida, L. (2023). An Exploratory Study Gathering Security Requirements for the Software Development Process. Electronics2023, 12. doi:https://doi.org/10.3390/electronics12173594
  2. Zambrano, P., Torres, J., Oquendo, L., Yánez , Á., & Velásquez, L. (1 de Junio de 2023). On the modeling of cyber-attacks associated with social engineering: A parental control prototype. Journal of Information Security and Applications, 75, 103501. doi:https://doi.org/10.1016/j.jisa.2023.103501
  3. Zambrano, P., Torres, J., Yánez, Á., Macas, A., & Tello-Oquendo, L. (2020). Understanding cyberbullying as an information security attack—life cycle modeling. Annales Des Telecommunications/Annals of Telecommunications. https://doi.org/10.1007/s12243-020-00785-0
  4. Rodríguez, G., Torres, J., Flores, P., Benavides, E., & Proaño, P. (2020). Trusted Phishing: A Model to Teach Computer Security Through the Theft of Cookies. Advances in Intelligent Systems and Computing, 1067, 390–401. https://doi.org/10.1007/978-3-030-32033-1_36
  5. Velepucha, V., Flores, P., & Torres, J. (2020). Migration of Monolithic Applications Towards Microservices Under the Vision of the Information Hiding Principle: A Systematic Mapping Study. Advances in Intelligent Systems and Computing, 1066, 90–100. https://doi.org/10.1007/978-3-030-32022-5_9
  6. Maldonado-Ruiz, D., Torres, J., & El Madhoun, N. (2020). 3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography. 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020, 45–46. https://doi.org/10.1109/BRAINS49436.2020.9223300
  7. Velepucha, V., Flores, P., & Torres, J. (2019). MOMMIV: Model for the decomposition of a monolithic architecture towards a microservices architecture under the principle of information hiding [MOMMIV: Modelo para descomposición de una arquitectura monolítica hacia una arquitectura de microservicios bajo el principio de ocultación de información]. RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao, E17, 1000–1009. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061189842&partnerID=40&md5=401aaf9e14d3998e580b21618d38ec96
  8. Zambrano, P., Torres, J., Tello-Oquendo, L., Jacome, R., Benalcazar, M. E., Andrade, R., & Fuertes, W. (2019). Technical mapping of the grooming anatomy using machine learning paradigms: An information security approach. IEEE Access, 7, 142129–142146. https://doi.org/10.1109/ACCESS.2019.2942805
  9. Zambrano, P., Torres, J., & Flores, P. (2019). How Does Grooming Fit into Social Engineering? Advances in Intelligent Systems and Computing, 924, 629–639. https://doi.org/10.1007/978-981-13-6861-5_53
  10. Fuertes, W., Cadena, A., Torres, J., Benítez, D., Tapia, F., & Toulkeridis, T. (2019). Data Analytics on Real-Time Air Pollution Monitoring System Derived from a Wireless Sensor Network. Advances in Intelligent Systems and Computing, 918, 57–67. https://doi.org/10.1007/978-3-030-11890-7_6
  11. Andrade, R., Torres, J., & Cadena, S. (2019). Cognitive Security for Incident Management Process. Advances in Intelligent Systems and Computing, 918, 612–621. https://doi.org/10.1007/978-3-030-11890-7_59
  12. Andrade, R., & Torres, J. (2019). Self-Awareness as an enabler of Cognitive Security. 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, 701–708. https://doi.org/10.1109/IEMCON.2018.8614798
  13. Andrade, R., & Torres, J. (2019). Enhancing intelligence SOC with big data tools. 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018, 1076–1080. https://doi.org/10.1109/IEMCON.2018.8614779
  14. Rodriguez, G., Torres, J., Flores, P., Benavides, E., & Nunez-Agurto, D. (2019). XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities. 2019 3rd Cyber Security in Networking Conference, CSNet 2019, 142–149. https://doi.org/10.1109/CSNet47905.2019.9108965
  15. Flores, P., Torres, J., & Fonseca-Delgado, R. (2019). Design decisions under object-oriented approach: A thematic analysis from the abstraction point of view. ACM International Conference Proceeding Series, 89–97. https://doi.org/10.1145/3375258.3375269
  16. Sánchez, M., Torres, J., Zambrano, P., & Flores, P. (2018). FraudFind: Financial fraud detection by analyzing human behavior. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, 2018-January, 281–286. https://doi.org/10.1109/CCWC.2018.8301739
  17. Terán, C., Torres, J., & Flores, P. (2018). Productivity Model for Software Development Factories under an Agile Methodological Approach. Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017, 1039–1042. https://doi.org/10.1109/CSCI.2017.180
  18. Arboleda, C., Flores, P., & Torres, J. (2018). SMMicro: A methodological proposal for migrating from monolithic architecture to microservices. JIISIC 2018 - Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria Del Conocimiento, 137–150. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050128758&partnerID=40&md5=de07f65d2d19cf1fbc67c8dafdcd0662
  19. Rodríguez, G. E., Benavides, D. E., Torres, J., Flores, P., & Fuertes, W. (2018). Cookie scout: An analytic model for prevention of cross-site scripting (XSS) using a cookie classifier. Advances in Intelligent Systems and Computing, 721, 497–507. https://doi.org/10.1007/978-3-319-73450-7_47
  20. Andrade, R., Torres, J., & Flores, P. (2018). Management of information security indicators under a cognitive security model. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, 2018-January, 478–483. https://doi.org/10.1109/CCWC.2018.8301745
  21. Maldonado-Ruiz, D., Loza-Aguirre, E., & Torres, J. (2018). A proposal for an improved distributed architecture for open pgp’s web of trust. Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018, 77–81. https://doi.org/10.1109/CSCI46756.2018.00022
  22. Zambrano, P., Sanchez, M., Torres, J., & Fuertes, W. (2017). BotHook: An option against Cyberpedophilia. 2017 1st Cyber Security in Networking Conference, CSNet 2017, 2017-January, 1–3. https://doi.org/10.1109/CSNET.2017.8241994

Back to top