I am convinced that if you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not…
Igor SantosCybersecurity Researcher
Expertise: Systems Security; Project Management
I am convinced that if you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not…
We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,…
Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some…
It is not a secret that in the United States of America (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is…
After talking about how to choose a topic and director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:…
In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how a scientific contribution is done in…