
handle: 10609/146189
TFC que demuestra cómo mediante la aplicación de buenas prácticas de programación y encriptación sobre estructuras de datos, podemos protegernos de un ciber ataque real del tipo MITM.
TFC que demostra com mitjançant l'aplicació de bones pràctiques de programació i encriptació sobre estructures de dades, podem protegir-nos d'un ciberatac real del tipus MITM.
TFC that demonstrates how by applying good programming and encryption practices on data structures, we can protect ourselves from a real MITM-type cyber attack.
vulnerabilitat, vulnerabilidad, Delictes informàtics -- TFG, vulnerability, security, seguretat, Java Man-In-The-Middle Seguridad, Java Man-In-The-Middle Seguretat, informació sensible, seguridad, información sensible, Computer crimes -- TFG, Delitos informáticos -- TFG, Java Man-In-The-Middle Security, sensitive information
vulnerabilitat, vulnerabilidad, Delictes informàtics -- TFG, vulnerability, security, seguretat, Java Man-In-The-Middle Seguridad, Java Man-In-The-Middle Seguretat, informació sensible, seguridad, información sensible, Computer crimes -- TFG, Delitos informáticos -- TFG, Java Man-In-The-Middle Security, sensitive information
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
