Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nicolás Macia is active.

Publication


Featured researches published by Nicolás Macia.


networked computing and advanced information management | 2008

QoS -Traffic Classification in the Internet

Paula Venosa; Nicolás Macia; Luis Armando Marrone

In UNLPpsilas network, like in most of the present networks, a great percentage of the traffic network demand is that of HTTP protocol. At the moment it is around 60%. To be more precise, we would have to claim that most of the traffic is transported by TCP port 80. Although port 80 TCP is used by default by protocol HTTP, any other application can use it, taking advantage of the fact that usually this port is not filtered and that it is even assigned a greater priority over the others. This work proposes a way to classify traffic at the top level of the application. The objective consists of applying effective techniques of QoS, that distinguish HTTP from other protocols as well as different uses which the users generally give,like being navigation, streaming and downloading.


Emerging Trends in ICT Security | 2014

Chapter 29 – Improving Security in Web Sessions: Special Management of Cookies

Nicolás Macia; Fernando Gustavo Tinetti

The current mechanism implemented for Web session management implies exchanging session cookies between a Web application client (usually a browser) and a Web application server. Besides having privacy issues, the security of Web sessions can be affected by various reasons related to cookies. There are several vulnerabilities that threaten a Web application specifically related to cookies: theft, tampering, and/or forgery. Any of these vulnerabilities may favor session theft and/or unauthorized access using the identity of another user in the system. In this chapter, we present an alternative technique for management of Web sessions, where no session cookies are sent to clients while maintaining backward compatibility. As a result, the proposed technique is shown to avoid several specific vulnerabilities that affect the security of Web application sessions and users. The proposed mechanism works transparently for Web applications, and a proof of concept was successfully tested with Web applications based on different languages such as Php, Perl, Ruby, and Python.


international conference on information systems | 2009

Requirements for troubleshooting wi-fi network security through location technologies

Nicolás Macia; Paula Venosa; Luis Armando Marrone

The location of mobile devices in a network can be used to provide services that locate users as well, making positioning and tracking of mobile devices. From the standpoint of security and network administration, the location of mobile devices can be used as a protective mechanism complementary to existing ones, either by detecting unauthorized access to the Wi-Fi network as well as allowing the tracking of stolen mobile computers. The aim of this paper is to study techniques for locating mobile devices in Wi-Fi environments and discuss countermeasures that can be used by users who want to avoid being located. Based on this, will select the most appropriate location technique taking into account the countermeasures discussed. It will analyze the feasibility of implementing location technologies with general purpose hardware, evaluating possible changes to the software needed for access points so as to permit use in the tracking system. From this, we propose a location system architecture taking into account the appropriate security requirements to perform access control to information obtained and to safeguard the privacy and anonymity of the same.


publisher | None

title

author


XX Workshop de Investigadores en Ciencias de la Computación (WICC 2018, Universidad Nacional del Nordeste). | 2018

Investigación en ciberseguridad: un enfoque integrado para la formación de recursosde alto grado de especialización

Francisco Javier Díaz; Lía Hebe Molinari; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky


XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017, ITBA, Buenos Aires) | 2017

Seguridad en entornos BPM: firma digital y gestión de clave

Patricia Bazán; Paula Venosa; Nicolás Macia; Iván Grcevic


XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017, ITBA, Buenos Aires) | 2017

Análisis de seguridad en redes wireless utilizando dispositivos móviles

Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky


XXII Congreso Argentino de Ciencias de la Computación (CACIC 2016) | 2016

Dispositivos móviles y el fenómeno del BYOD

Paula Venosa; Nicolás Macia; Carlos Damián Piazza Orlando; Sebastián Exequiel Pacheco Veliz


XVIII Workshop de Investigadores en Ciencias de la Computación (WICC 2016, Entre Ríos, Argentina) | 2016

Análisis digital forense utilizando herramientas de software libre

Francisco Javier Díaz; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky; Damián Rubio


XXI Congreso Argentino de Ciencias de la Computación (Junín, 2015) | 2015

Automatizando el descubrimiento de portales de autenticación y evaluación de la seguridad mediante ataques de fuerza bruta en el marco de una auditoría de seguridad

Gastón Traberg; Lía Hebe Molinari; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco

Collaboration


Dive into the Nicolás Macia's collaboration.

Top Co-Authors

Avatar

Paula Venosa

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Francisco Javier Díaz

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Einar Felipe Lanfranco

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Lía Hebe Molinari

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fernando Gustavo Tinetti

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Luis Armando Marrone

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Germán Vodopivec

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

María Alejandra Osorio

National University of La Plata

View shared research outputs
Researchain Logo
Decentralizing Knowledge