Table of contents
-
-
Application of business intelligence for analyzing vulnerabilities to increase the security level in an academic CSIRT
21-29-
Abstract 1327
-
PDF 926
-
XML 14
-
Abstract 1327
-
Thermal transfer analysis of tubes with extended surface with fractal design
31-37-
Abstract 1596
-
PDF 1224
-
XML 17
-
Abstract 1596
-
Rational efficiency in agro-industrial process with cold chain: Thermodynamic and exergoeconomic measurement
39-49-
Abstract 1119
-
PDF 759
-
XML 11
-
Abstract 1119
-
-
Analysis of precipitation and recharge of aquifers in Tota and Ibagué (Colombia) from stable isotopes (18O and 2H)
61-71-
Abstract 1365
-
PDF 862
-
XML 5
-
Abstract 1365
-
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
73-80-
Abstract 1799
-
PDF 1148
-
XML 97
-
Abstract 1799
-
Enterprise file synchronization and sharing services for educational environments in case of disaster
81-91-
Abstract 1398
-
PDF 862
-
XML 5
-
Abstract 1398
-
-
Effect of heat treatment on the tribological properties of Nickel-Boron electroless coating
103-110-
Abstract 952
-
PDF 632
-
XML 11
-
Abstract 952
-
Effect of cutting parameters on surface roughness in turning of annealed AISI-1020 steel
111-118-
Abstract 1243
-
PDF 686
-
XML 39
-
Abstract 1243
-