Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paula Venosa is active.

Publication


Featured researches published by Paula Venosa.


networked computing and advanced information management | 2008

QoS -Traffic Classification in the Internet

Paula Venosa; Nicolás Macia; Luis Armando Marrone

In UNLPpsilas network, like in most of the present networks, a great percentage of the traffic network demand is that of HTTP protocol. At the moment it is around 60%. To be more precise, we would have to claim that most of the traffic is transported by TCP port 80. Although port 80 TCP is used by default by protocol HTTP, any other application can use it, taking advantage of the fact that usually this port is not filtered and that it is even assigned a greater priority over the others. This work proposes a way to classify traffic at the top level of the application. The objective consists of applying effective techniques of QoS, that distinguish HTTP from other protocols as well as different uses which the users generally give,like being navigation, streaming and downloading.


international conference on information systems | 2009

Requirements for troubleshooting wi-fi network security through location technologies

Nicolás Macia; Paula Venosa; Luis Armando Marrone

The location of mobile devices in a network can be used to provide services that locate users as well, making positioning and tracking of mobile devices. From the standpoint of security and network administration, the location of mobile devices can be used as a protective mechanism complementary to existing ones, either by detecting unauthorized access to the Wi-Fi network as well as allowing the tracking of stolen mobile computers. The aim of this paper is to study techniques for locating mobile devices in Wi-Fi environments and discuss countermeasures that can be used by users who want to avoid being located. Based on this, will select the most appropriate location technique taking into account the countermeasures discussed. It will analyze the feasibility of implementing location technologies with general purpose hardware, evaluating possible changes to the software needed for access points so as to permit use in the tracking system. From this, we propose a location system architecture taking into account the appropriate security requirements to perform access control to information obtained and to safeguard the privacy and anonymity of the same.


XX Workshop de Investigadores en Ciencias de la Computación (WICC 2018, Universidad Nacional del Nordeste). | 2018

Investigación en ciberseguridad: un enfoque integrado para la formación de recursosde alto grado de especialización

Francisco Javier Díaz; Lía Hebe Molinari; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky


XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017, ITBA, Buenos Aires) | 2017

Seguridad en entornos BPM: firma digital y gestión de clave

Patricia Bazán; Paula Venosa; Nicolás Macia; Iván Grcevic


XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017, ITBA, Buenos Aires) | 2017

Estrategias de IOT para lograr ciudades digitales seguras, más inclusivas y sustentables

Francisco Javier Díaz; Paula Venosa; Laura Andrea Fava; Néstor Castro; Diego Gastón Vilches Antão; Fernando Esteban Mariano López


XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017, ITBA, Buenos Aires) | 2017

Análisis de seguridad en redes wireless utilizando dispositivos móviles

Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky


XXII Congreso Argentino de Ciencias de la Computación (CACIC 2016) | 2016

Dispositivos móviles y el fenómeno del BYOD

Paula Venosa; Nicolás Macia; Carlos Damián Piazza Orlando; Sebastián Exequiel Pacheco Veliz


XVIII Workshop de Investigadores en Ciencias de la Computación (WICC 2016, Entre Ríos, Argentina) | 2016

Análisis digital forense utilizando herramientas de software libre

Francisco Javier Díaz; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco; Alejandro Javier Sabolansky; Damián Rubio


XXI Congreso Argentino de Ciencias de la Computación (Junín, 2015) | 2015

Automatizando el descubrimiento de portales de autenticación y evaluación de la seguridad mediante ataques de fuerza bruta en el marco de una auditoría de seguridad

Gastón Traberg; Lía Hebe Molinari; Paula Venosa; Nicolás Macia; Einar Felipe Lanfranco


XVII Workshop de Investigadores en Ciencias de la Computación (Salta, 2015) | 2015

Automatizando la gestión de configuraciones en pos de la seguridad

Einar Felipe Lanfranco; Raúl Benencia; Nicolás Macia; Paula Venosa

Collaboration


Dive into the Paula Venosa's collaboration.

Top Co-Authors

Avatar

Nicolás Macia

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Francisco Javier Díaz

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Einar Felipe Lanfranco

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar

Lía Hebe Molinari

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luis Armando Marrone

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Germán Vodopivec

National University of La Plata

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge