Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Authors = Iván Ortiz-Garcés

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
1 pages, 124 KiB  
Retraction
RETRACTED: Ortiz-Garces et al. Development of a Platform for Learning Cybersecurity Using Capturing the Flag Competitions. Electronics 2023, 12, 1753
by Iván Ortiz-Garces, Rommel Gutierrez, David Guerra, Santiago Sanchez-Viteri and William Villegas-Ch.
Electronics 2025, 14(4), 678; https://doi.org/10.3390/electronics14040678 - 10 Feb 2025
Viewed by 561
Abstract
The journal retracts the article, Development of a Platform for Learning Cybersecurity Using Capturing the Flag Competitions [...] Full article
17 pages, 3245 KiB  
Article
Enhancing Security in Software Design Patterns and Antipatterns: A Framework for LLM-Based Detection
by Roberto Andrade, Jenny Torres and Iván Ortiz-Garcés
Electronics 2025, 14(3), 586; https://doi.org/10.3390/electronics14030586 - 1 Feb 2025
Cited by 2 | Viewed by 2089
Abstract
The detection of security vulnerabilities in software design patterns and antipatterns is crucial for maintaining robust and maintainable systems, particularly in dynamic Continuous Integration/Continuous Deployment (CI/CD) environments. Traditional static analysis tools, while effective for identifying isolated issues, often lack contextual awareness, leading to [...] Read more.
The detection of security vulnerabilities in software design patterns and antipatterns is crucial for maintaining robust and maintainable systems, particularly in dynamic Continuous Integration/Continuous Deployment (CI/CD) environments. Traditional static analysis tools, while effective for identifying isolated issues, often lack contextual awareness, leading to missed vulnerabilities and high rates of false positives. This paper introduces a novel framework leveraging Large Language Models (LLMs) to detect and mitigate security risks in design patterns and antipatterns. By analyzing relationships and behavioral dynamics in code, LLMs provide a nuanced, context-aware approach to identifying issues such as unauthorized state changes, insecure communication, and improper data handling. The proposed framework integrates key security heuristics—such as the principles of least privilege and input validation—to enhance LLM performance. An evaluation of the framework demonstrates its potential to outperform traditional tools in terms of accuracy and efficiency, enabling the proactive detection and remediation of vulnerabilities in real time. This study contributes to the field of software engineering by offering an innovative methodology for securing software systems using LLMs, promoting both academic research and practical application in industry settings. Full article
(This article belongs to the Special Issue Recent Advances of Software Engineering)
Show Figures

Figure 1

24 pages, 930 KiB  
Article
Optimizing Chatbot Effectiveness through Advanced Syntactic Analysis: A Comprehensive Study in Natural Language Processing
by Iván Ortiz-Garces, Jaime Govea, Roberto O. Andrade and William Villegas-Ch
Appl. Sci. 2024, 14(5), 1737; https://doi.org/10.3390/app14051737 - 21 Feb 2024
Cited by 12 | Viewed by 7627
Abstract
In the era of digitalization, the interaction between humans and machines, particularly in Natural Language Processing, has gained crucial importance. This study focuses on improving the effectiveness and accuracy of chatbots based on Natural Language Processing. Challenges such as the variability of human [...] Read more.
In the era of digitalization, the interaction between humans and machines, particularly in Natural Language Processing, has gained crucial importance. This study focuses on improving the effectiveness and accuracy of chatbots based on Natural Language Processing. Challenges such as the variability of human language and high user expectations are addressed, analyzing critical aspects such as grammatical structure, keywords, and contextual factors, with a particular emphasis on syntactic structure. An optimized chatbot model that considers explicit content and the user’s underlying context and intentions is proposed using machine learning techniques. This approach reveals that specific features, such as syntactic structure and keywords, are critical to the accuracy of chatbots. The results show that the proposed model adapts to different linguistic contexts and offers coherent and relevant answers in real-world situations. Furthermore, user satisfaction with this advanced model exceeds traditional models, aligning with expectations of more natural and humanized interactions. This study demonstrates the feasibility of improving chatbot–user interaction through advanced syntactic analysis. It highlights the need for continued research and development in this field to achieve significant advances in human–computer interaction. Full article
(This article belongs to the Special Issue Cross-Applications of Natural Language Processing and Text Mining)
Show Figures

Figure 1

24 pages, 1896 KiB  
Article
Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS
by William Villegas-Ch, Jaime Govea and Iván Ortiz-Garces
Appl. Sci. 2024, 14(2), 679; https://doi.org/10.3390/app14020679 - 13 Jan 2024
Cited by 4 | Viewed by 5145
Abstract
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity practices. Combining the capabilities of OpenAI’s GPT-3 and DALL-E models [...] Read more.
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity practices. Combining the capabilities of OpenAI’s GPT-3 and DALL-E models with Amazon Web Services infrastructure aims to improve threat detection, generate high-quality synthetic training data, and optimize resource utilization. This work begins by demonstrating the ability of artificial intelligence to create synthetic cybersecurity data that simulates real-world threats. These data are essential for training threat detection systems and strengthening an organization’s resilience against cyberattacks. While our research shows the promising potential of artificial intelligence and Amazon Web Services in cybersecurity, it is essential to recognize the limitations. Continued research and refinement of AI models are needed to address increasingly sophisticated threats. Additionally, ethical and privacy considerations must be addressed when employing AI in cybersecurity practices. The results support the notion that this collaboration can revolutionize how organizations address cyber challenges, delivering greater efficiency, speed, and accuracy in threat detection and mitigation. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

20 pages, 1868 KiB  
Article
Protective Factors for Developing Cognitive Skills against Cyberattacks
by María Cazares, Walter Fuertes, Roberto Andrade, Iván Ortiz-Garcés and Manuel Sánchez Rubio
Electronics 2023, 12(19), 4007; https://doi.org/10.3390/electronics12194007 - 23 Sep 2023
Cited by 5 | Viewed by 2311
Abstract
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online platforms and shifts in their psychological dynamics due to the pandemic’s context. The enhancement of human factors becomes imperative in [...] Read more.
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online platforms and shifts in their psychological dynamics due to the pandemic’s context. The enhancement of human factors becomes imperative in formulating a robust cybersecurity strategy against social engineering in the post-COVID-19 era and in anticipation of analogous pandemics. This study aims to propose a model for delineating strategies across various phases of cyberattacks, grounded in the cyber kill chain model, while also encompassing cognitive mechanisms for adaptive responses. This approach aims to cultivate defensive cognitive factors like resilience and self-efficacy. To achieve this objective, we conducted an exploratory study adhering to Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Subsequently, we pursued a descriptive and correlational study based on prevalent attacks during the pandemic. The intention was to pinpoint proactive factors conducive to the development of cognitive capabilities to counter cyberattacks. These insights could pave the way for the creation of training programs and technological solutions aimed at mitigating the impact of such cyberattacks. Full article
Show Figures

Figure 1

18 pages, 1879 KiB  
Article
An Exploratory Study Gathering Security Requirements for the Software Development Process
by Roberto Andrade, Jenny Torres, Iván Ortiz-Garcés, Jorge Miño and Luis Almeida
Electronics 2023, 12(17), 3594; https://doi.org/10.3390/electronics12173594 - 25 Aug 2023
Viewed by 2802
Abstract
Software development stands out as one of the most rapidly expanding markets due to its pivotal role in crafting applications across diverse sectors like healthcare, transportation, and finance. Nevertheless, the sphere of cybersecurity has also undergone substantial growth, underscoring the escalating significance of [...] Read more.
Software development stands out as one of the most rapidly expanding markets due to its pivotal role in crafting applications across diverse sectors like healthcare, transportation, and finance. Nevertheless, the sphere of cybersecurity has also undergone substantial growth, underscoring the escalating significance of software security. Despite the existence of different secure development frameworks, the persistence of vulnerabilities or software errors remains, providing potential exploitation opportunities for malicious actors. One pivotal contributor to subpar security quality within software lies in the neglect of cybersecurity requirements during the initial phases of software development. In this context, the focal aim of this study is to analyze the importance of integrating security modeling by software developers into the elicitation processes facilitated through the utilization of abuse stories. To this end, the study endeavors to introduce a comprehensive and generic model for a secure software development process. This model inherently encompasses critical elements such as new technologies, human factors, and the management of security for the formulation of abuse stories and their integration within Agile methodological processes. Full article
(This article belongs to the Special Issue Software Analysis, Quality, and Security)
Show Figures

Figure 1

26 pages, 13704 KiB  
Article
Prototype of an Emergency Response System Using IoT in a Fog Computing Environment
by Iván Ortiz-Garcés, Roberto O. Andrade, Santiago Sanchez-Viteri and William Villegas-Ch.
Computers 2023, 12(4), 81; https://doi.org/10.3390/computers12040081 - 16 Apr 2023
Cited by 8 | Viewed by 3583
Abstract
Currently, the internet of things (IoT) is a technology entering various areas of society, such as transportation, agriculture, homes, smart buildings, power grids, etc. The internet of things has a wide variety of devices connected to the network, which can saturate the central [...] Read more.
Currently, the internet of things (IoT) is a technology entering various areas of society, such as transportation, agriculture, homes, smart buildings, power grids, etc. The internet of things has a wide variety of devices connected to the network, which can saturate the central links to cloud computing servers. IoT applications that are sensitive to response time are affected by the distance that data is sent to be processed for actions and results. This work aims to create a prototype application focused on emergency vehicles through a fog computing infrastructure. This technology makes it possible to reduce response times and send only the necessary data to cloud computing. The emergency vehicle contains a wireless device that sends periodic alert messages, known as an in-vehicle beacon. Beacon messages can be used to enable green traffic lights toward the destination. The prototype contains fog computing nodes interconnected as close to the vehicle as using the low-power whole area network protocol called a long-range wide area network. In the same way, fog computing nodes run a graphical user interface (GUI) application to manage the nodes. In addition, a comparison is made between fog computing and cloud computing, considering the response time of these technologies. Full article
(This article belongs to the Special Issue Edge and Fog Computing for Internet of Things Systems 2023)
Show Figures

Figure 1

15 pages, 3277 KiB  
Article
RETRACTED: Development of a Platform for Learning Cybersecurity Using Capturing the Flag Competitions
by Iván Ortiz-Garces, Rommel Gutierrez, David Guerra, Santiago Sanchez-Viteri and William Villegas-Ch.
Electronics 2023, 12(7), 1753; https://doi.org/10.3390/electronics12071753 - 6 Apr 2023
Cited by 7 | Viewed by 4763 | Retraction
Abstract
Currently, cybersecurity is a topic of great importance for society. With the increase in the use of technology and the digitization of many activities, the number of cyber threats to which individuals and organizations are exposed has increased. In addition, the COVID-19 pandemic [...] Read more.
Currently, cybersecurity is a topic of great importance for society. With the increase in the use of technology and the digitization of many activities, the number of cyber threats to which individuals and organizations are exposed has increased. In addition, the COVID-19 pandemic has accelerated the digitization of many processes, further increasing the risk of cyberattacks. One of the main causes of these problems is the lack of cyber security awareness, as many people and organizations do not have a proper understanding of cyber threats and the measures, they must take to protect themselves. As a solution to the lack of cybersecurity knowledge, this work proposes the development of a Capture the Flag platform for learning about cybersecurity. The objective is to provide a tool that allows the education of future professionals in this field and covers the existing demand for this type of specialist. The platform is made up of two sections, one for learning and the other for CTF. The first section allows teachers to contribute to the teaching of their students using challenges. The second section allows one to carry out competitions with effective results when acquiring knowledge and experience. The platform is evaluated using questionnaires and surveys to measure whether the platform fulfills its purpose. Full article
(This article belongs to the Special Issue Emerging Topics in Cybersecurity: Challenges and Solutions)
Show Figures

Figure 1

16 pages, 2386 KiB  
Article
Artificial Intelligence Model for the Identification of the Personality of Twitter Users through the Analysis of Their Behavior in the Social Network
by William Villegas-Ch., Daniel Mauricio Erazo, Iván Ortiz-Garces, Walter Gaibor-Naranjo and Xavier Palacios-Pacheco
Electronics 2022, 11(22), 3811; https://doi.org/10.3390/electronics11223811 - 19 Nov 2022
Cited by 5 | Viewed by 6719
Abstract
Currently, social networks have become one of the most used channels by society to share their ideas, their status, generate trends, etc. By applying artificial intelligence techniques and sentiment analysis to the large volume of data found in social networks, it is possible [...] Read more.
Currently, social networks have become one of the most used channels by society to share their ideas, their status, generate trends, etc. By applying artificial intelligence techniques and sentiment analysis to the large volume of data found in social networks, it is possible to predict the personality of people. In this work, the development of a data analysis model with machine learning algorithms with the ability to predict the personality of a user based on their activity on Twitter is proposed. To do this, a data collection and transformation process is carried out to be analyzed with sentiment analysis techniques and the linguistic analysis of tweets. Very successful results were obtained by developing a training process for the machine learning algorithm. By generating comparisons of this model, with the related literature, it is shown that social networks today house a large volume of data that contains significant value if your approach is appropriate. Through the analysis of tweets, retweets, and other factors, there is the possibility of creating a virtual profile on the Internet for each person; the uses can vary, from creating marketing campaigns to optimizing recruitment processes. Full article
(This article belongs to the Special Issue Artificial Intelligence Technologies and Applications)
Show Figures

Figure 1

21 pages, 3704 KiB  
Article
Factors of Risk Analysis for IoT Systems
by Roberto Andrade, Iván Ortiz-Garcés, Xavier Tintin and Gabriel Llumiquinga
Risks 2022, 10(8), 162; https://doi.org/10.3390/risks10080162 - 10 Aug 2022
Cited by 9 | Viewed by 3653
Abstract
The increasing rate at which IoT technologies are being developed has enabled smarter and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately, some inherent characteristics of these technologies are compromised to attack. Naturally, risk analysis emerges, as it is one [...] Read more.
The increasing rate at which IoT technologies are being developed has enabled smarter and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately, some inherent characteristics of these technologies are compromised to attack. Naturally, risk analysis emerges, as it is one of many steps to provide a reliable security strategy. However, the methodologies of any risk analysis must first adapt to the dynamics of the IoT system. This article seeks to shed light on whatever factors are part of an IoT system and thus contribute to security risks, IoT device vulnerabilities, susceptibility due to the application domain, attack surfaces, and interdependence as a product of the interconnection between IoT devices. Consequently, the importance of these factors in any risk evaluation is highlighted, especially the interdependence generated by IoT systems, which can cause the generation of an uncontrollable cascade of effects that can occur under certain conditions of any systematic risk event. Full article
Show Figures

Figure 1

22 pages, 1042 KiB  
Article
Identification of the Consequences of COVID-19 through the Analysis of Data Obtained in Surveys of a Specific Population
by William Villegas-Ch., Joselin García-Ortiz, Ivan Ortiz-Garces and Santiago Sánchez-Viteri
Informatics 2022, 9(2), 46; https://doi.org/10.3390/informatics9020046 - 7 Jun 2022
Cited by 1 | Viewed by 2830
Abstract
The pandemic caused by the 2019 coronavirus disease has marked a total change in the development of society. Since then, its effects have been visible in people, both in work, education and psychological areas. There are many jobs and organizations that have set [...] Read more.
The pandemic caused by the 2019 coronavirus disease has marked a total change in the development of society. Since then, its effects have been visible in people, both in work, education and psychological areas. There are many jobs and organizations that have set out to identify the reality of people after the pandemic and how the pandemic has affected their daily lives. To do this, countries have organized data and statistics collection campaigns that allow investigating the new needs of people. With this, instruments such as surveys have become more relevant and valid to know what these needs are. However, the analysis processes must guarantee answers that are able to determine the direct impact that each question has on people’s feelings. This work proposes a framework to determine the incidence values of surveys based on their categories and questions and how they capture the reality of people in areas such as education, the impact of work, family and the stress generated by the pandemic. With the results obtained, each element and category that the population considers a consequence of COVID-19 that affects the normal development of life has been identified. Full article
Show Figures

Figure 1

25 pages, 5385 KiB  
Article
An Exploratory Study of Cognitive Sciences Applied to Cybersecurity
by Roberto O. Andrade, Walter Fuertes, María Cazares, Iván Ortiz-Garcés and Gustavo Navas
Electronics 2022, 11(11), 1692; https://doi.org/10.3390/electronics11111692 - 26 May 2022
Cited by 9 | Viewed by 4611
Abstract
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. However, this field has not been addressed deeply in research. This study aims to define a Cognitive Cybersecurity Model by exploring fundamental concepts for applying [...] Read more.
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. However, this field has not been addressed deeply in research. This study aims to define a Cognitive Cybersecurity Model by exploring fundamental concepts for applying cognitive sciences in cybersecurity. For achieving this, we developed exploratory research based on two steps: (1) a text mining process to identify main interest areas of research in the cybersecurity field and (2) a valuable review of the papers chosen in a systematic literature review that was carried out using PRISMA methodology. The model we propose tries to fill the gap in automatizing cognitive science without taking into account the users’ learning processes. Its definition is supported by the main findings of the literature review, as it leads to more in-depth future studies in this area. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science)
Show Figures

Figure 1

32 pages, 4505 KiB  
Article
Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
by Roberto Omar Andrade, Sang Guun Yoo, Iván Ortiz-Garces and Jhonattan Barriga
Appl. Sci. 2022, 12(6), 2976; https://doi.org/10.3390/app12062976 - 15 Mar 2022
Cited by 10 | Viewed by 4762
Abstract
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is [...] Read more.
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be considered within risk assessment methodologies? We have addressed our study with a 4-phase design-research methodology (DRM) that allows us, based on systematic literature review, to experiment and draw upon expert judgment; as a final product, we obtain a risk assessment methodology based on the characteristics of IoT devices. At the end of this study, we establish seven main constructs—Organization, Risk Behaviors, Dependency, Attack Surface, Susceptibility, Severity and Uncertainty—over which security risk in IoT systems can be evaluated. Full article
(This article belongs to the Special Issue IoT Security)
Show Figures

Figure 1

23 pages, 3603 KiB  
Article
Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus
by William Villegas-Ch., Ivan Ortiz-Garces and Santiago Sánchez-Viteri
Computers 2021, 10(8), 102; https://doi.org/10.3390/computers10080102 - 19 Aug 2021
Cited by 12 | Viewed by 6240
Abstract
Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of [...] Read more.
Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard is with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide that allows for the implementation of a computer incident response team on a university campus. Universities are optimal environments for the generation of new technologies; they also serve as the ideal test bed for the generation of security policies and new treatments for incidents in an organization. In addition, with the implementation of the computer incident response team in a university, it is proposed to be part of a response group to any security incident at the national level. Full article
(This article belongs to the Special Issue Integration of Cloud Computing and IoT)
Show Figures

Figure 1

10 pages, 2012 KiB  
Systematic Review
Opioid Antagonist in the Treatment of Ischemic Stroke
by Juan Fernando Ortiz, Claudio Cruz, Amrapali Patel, Mahika Khurana, Ahmed Eissa-Garcés, Ivan Mateo Alzamora, Taras Halan, Abbas Altamimi, Samir Ruxmohan and Urvish K. Patel
Brain Sci. 2021, 11(6), 805; https://doi.org/10.3390/brainsci11060805 - 18 Jun 2021
Cited by 3 | Viewed by 4026
Abstract
Stroke is a leading cause of death and disability, and novel treatments need to be found, particularly drugs with neuroprotective and restorative effects. Lately, there has been an increased interest in the relationship between opioids and ischemic stroke. To further appreciate this association [...] Read more.
Stroke is a leading cause of death and disability, and novel treatments need to be found, particularly drugs with neuroprotective and restorative effects. Lately, there has been an increased interest in the relationship between opioids and ischemic stroke. To further appreciate this association between opioids and stroke, we conducted a systematic review to investigate anti-opioid medication’s effectiveness in treating ischemic stroke. We used PubMed advanced-strategy and Google Scholar searches and only included full-text clinical trials on humans and written in the English language. After applying the inclusion/exclusion criteria, seven clinical trials were reviewed. Only one of the naloxone and nalmefene clinical trials showed statistically favorable results. Overall, the nalmefene clinical trials used more updated measures (NIHSS, GOS) to evaluate recovery and functional status in ischemic stroke patients than the naloxone clinical trials. There was less bias in the nalmefene clinical trials. Animal and in vitro studies have showed promising results. Additional research should be conducted with new clinical trials of both drugs with larger samples in patients less than 70 years old and moderate to severe infarcts. Full article
(This article belongs to the Section Neurorehabilitation)
Show Figures

Figure 1

Back to TopTop