Flores Armas Denys Alberto
Departamento de Informática y Ciencias de la Computación
Esta dirección de correo electrónico está siendo protegida contra los robots de spam. Necesita tener JavaScript habilitado para poder verlo.
Oficina: 220
Ext: 4730
iD orcid.org/0000-0002-5068-1559
Estudios
  1. Escuela Politécnica Nacional, Ecuador, Ingeniero en Sistemas Informáticos y de Computación
  2. University of Derby, Reino Unido, MSc. in Forensic Computing and Security
  3. University of Warwick, Reino Unido, PhD in Computer Science
Líneas de investigación
  1. DICC-A2-L1 Computación Aplicada a las Comunicaciones y Seguridades
  2. DICC-A2-L2 Seguridad y Privacidad
  3. DICC-A2-L3 Temas profesionales y sociales
Publicaciones
  1. Flores, D. A., & Jhumka, A. (2019). Hybrid logical clocks for database forensics: Filling the gap between chain of custody and database auditing. Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 224–231. https://doi.org/10.1109/TrustCom/BigDataSE.2019.00038
  2. Flores, D. A., & Jhumka, A. (2017). Implementing chain of custody requirements in database audit records for forensic purposes. Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, 675–682. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299
  3. Montenegro, C. W., & Flores, D. A. (2016). An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES). 2015 International Conference on Computing, Communication and Security, ICCCS 2015. https://doi.org/10.1109/CCCS.2015.7374158
  4. Flores, D. A., Qazi, F., & Jhumka, A. (2016). Bring your own disclosure: Analysing BYOD threats to corporate information. Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 1008–1015. https://doi.org/10.1109/TrustCom.2016.0169

Back to top