Table of contents
-
-
Application of business intelligence for analyzing vulnerabilities to increase the security level in an academic CSIRT
21-29-
Abstract 1222
-
PDF 893
-
XML 11
-
Abstract 1222
-
Thermal transfer analysis of tubes with extended surface with fractal design
31-37-
Abstract 1557
-
PDF 1205
-
XML 15
-
Abstract 1557
-
Rational efficiency in agro-industrial process with cold chain: Thermodynamic and exergoeconomic measurement
39-49-
Abstract 1090
-
PDF 740
-
XML 11
-
Abstract 1090
-
-
Analysis of precipitation and recharge of aquifers in Tota and Ibagué (Colombia) from stable isotopes (18O and 2H)
61-71-
Abstract 1314
-
PDF 818
-
XML 5
-
Abstract 1314
-
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
73-80-
Abstract 1753
-
PDF 1124
-
XML 94
-
Abstract 1753
-
Enterprise file synchronization and sharing services for educational environments in case of disaster
81-91-
Abstract 1357
-
PDF 842
-
XML 4
-
Abstract 1357
-
-
Effect of heat treatment on the tribological properties of Nickel-Boron electroless coating
103-110-
Abstract 915
-
PDF 616
-
XML 9
-
Abstract 915
-
Effect of cutting parameters on surface roughness in turning of annealed AISI-1020 steel
111-118-
Abstract 1202
-
PDF 673
-
XML 34
-
Abstract 1202
-