{"id":5644,"date":"2020-10-31T23:02:00","date_gmt":"2020-11-01T04:02:00","guid":{"rendered":"http:\/\/www.icesi.edu.co\/editorial\/?p=5644"},"modified":"2024-04-11T16:03:32","modified_gmt":"2024-04-11T21:03:32","slug":"bitacora-7","status":"publish","type":"post","link":"https:\/\/www.icesi.edu.co\/editorial\/bitacora-7\/","title":{"rendered":"Aprovisionamiento \u00e1gil \u2013 Clasificaci\u00f3n de malware \u2013 Optimizaci\u00f3n Giraph"},"content":{"rendered":"<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Frepository.icesi.edu.co%2Fbiblioteca_digital%2Fbitstream%2F10906%2F87001%2F1%2Fgomez_aprovisionamiento_agil_2020.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 0px;height: 0px;border: none;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading...<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/87001\/1\/gomez_aprovisionamiento_agil_2020.pdf\" class=\"ead-document-btn\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><p class=\"embed_download\"><a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/87001\/1\/gomez_aprovisionamiento_agil_2020.pdf\" download target=\"_blank\" rel=\"noopener\">Download\/Descargar <\/a><\/p><\/div>\n<strong>T\u00edtulo completo:<\/strong> Aprovisionamiento \u00e1gil \u2013 Clasificaci\u00f3n de malware \u2013 Optimizaci\u00f3n Giraph.<br \/>\n<strong>Colecci\u00f3n:<\/strong> Bit\u00e1coras de la maestr\u00eda (7).<br \/>\n<strong>Autores:<\/strong> Juan Felipe G\u00f3mez Manzanares, \u00c1lvaro Pach\u00f3n de la Cruz, Sebasti\u00e1n Felipe Land\u00ednez Garc\u00eda, Andr\u00e9s Navarro Cadavid, C\u00e9sar Loaiza, Gabriel Tamura Morimitsu.<br \/>\n<strong>Editorial:<\/strong> Universidad Icesi.<br \/>\n<strong>Producci\u00f3n editorial:<\/strong> Claros Editores SAS.<br \/>\n<strong>A\u00f1o de edici\u00f3n:<\/strong> 2020 | <strong>ISBN:<\/strong> 978-958-5590-45-8 (PDF).<br \/>\n<span id=\"post-ratings-5644\" class=\"post-ratings\" data-nonce=\"cb31d9a2ed\"><img decoding=\"async\" id=\"rating_5644_1\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"1 estrella\" title=\"1 estrella\" onmouseover=\"current_rating(5644, 1, '1 estrella');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_5644_2\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"2 estrellas\" title=\"2 estrellas\" onmouseover=\"current_rating(5644, 2, '2 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_5644_3\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"3 estrellas\" title=\"3 estrellas\" onmouseover=\"current_rating(5644, 3, '3 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_5644_4\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"4 estrellas\" title=\"4 estrellas\" onmouseover=\"current_rating(5644, 4, '4 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_5644_5\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"5 estrellas\" title=\"5 estrellas\" onmouseover=\"current_rating(5644, 5, '5 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/> (<strong>1<\/strong> votos, promedio: <strong>5,00<\/strong> sobre 5)<br \/><span class=\"post-ratings-text\" id=\"ratings_5644_text\"><\/span><\/span><span id=\"post-ratings-5644-loading\" class=\"post-ratings-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/loading.gif\" width=\"16\" height=\"16\" class=\"post-ratings-image\" \/>Loading...<\/span>\n<script type=\"text\/javascript\" src=\"\/\/cdn.plu.mx\/widget-popup.js\"><\/script><a href=\"https:\/\/plu.mx\/plum\/a\/?doi=10.18046\/EUI\/bm.7.2020\" data-popup=\"right\" data-size=\"large\" class=\"plumx-plum-print-popup\" data-site=\"plum\" data-hide-when-empty=\"true\" data-lang=\"es\" target=\"_blank\" rel=\"noopener\">Aprovisionamiento \u00e1gil \u2013 Clasificaci\u00f3n de malware \u2013 Optimizaci\u00f3n Giraph<\/a><br \/>\n<div class=\"osc-res-tab tabbable   osc-tabs-left\"><div style=\"clear:both;width: 100%;\"><ul class=\"nav osc-res-nav nav-pills osc-tabs-left-ul\" id=\"oscitas-restabs-1-bitacora-7-47461\"><li class=\"active\"><a href=\"#ert_pane1-0\" data-toggle=\"tab\">Descripci\u00f3n<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-1\" data-toggle=\"tab\">Contenido<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-2\" data-toggle=\"tab\">Autor(es)<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-3\" data-toggle=\"tab\">Catalogaci\u00f3n<\/a><\/li><\/ul><\/div><div style=\"clear:both;width: 100%;\"><ul class=\"tab-content\" id=\"oscitas-restabcontent-1-bitacora-7-47461\"><li class=\"tab-pane active\" id=\"ert_pane1-0\"><p style=\"text-align: justify;\">Esta edici\u00f3n de Bit\u00e1coras de la Maestr\u00eda es una buena muestra de la diversidad de problemas que se pueden resolver con el aporte de la inform\u00e1tica. En el primer cap\u00edtulo se trata tangencialmente un tema sobre el que hay mucha discusi\u00f3n, la industria 4.0, la denominada cuarta revoluci\u00f3n industrial, con \u00e9nfasis en \u201cadaptaci\u00f3n\u201d. El tema del segundo cap\u00edtulo es la seguridad de los dispositivos m\u00f3viles que funcionan con un sistema operativo Android. El tercer cap\u00edtulo presenta una soluci\u00f3n para un problema de optimizaci\u00f3n complejo, el <i>Rooted Distance-Constrained Minimum Spanning Tree<\/i> (RDCMST), muy \u00fatil en temas con el dise\u00f1o de redes de telecomunicaciones.<\/p>\n<p style=\"text-align: justify;\"><strong>C\u00f3mo citar (APA):<\/strong> G\u00f3mez Manzanares, J.F.; Pach\u00f3n de la Cruz, A.; Land\u00ednez Garc\u00eda, S.F.; Navarro Cadavid, A.; Loaiza, C.; Tamura Morimitsu, G. (2020). <i>Aprovisionamiento \u00e1gil \u2013 Clasificaci\u00f3n de malware \u2013 Optimizaci\u00f3n Giraph<\/i>. Cali: Universidad Icesi. DOI: <a href=\"https:\/\/doi.org\/10.18046\/EUI\/bm.7.2020\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/bm.7.2020<\/a><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-1\"><strong>Tabla de contenido:<\/strong><\/p>\n<p>Presentaci\u00f3n<\/p>\n<p><b>1 \/ Modelo operativo para el aprovisionamiento \u00e1gil de aplicaciones y servicios de TI<\/b><br \/>\n<i>Juan Felipe G\u00f3mez Manzanares y \u00c1lvaro Pach\u00f3n De la Cruz<\/i><\/p>\n<p><b>2 \/ Sistemas basados en RNA para clasificar malware en Android<\/b><br \/>\n<i>Sebasti\u00e1n Felipe Land\u00ednez Garc\u00eda y Andr\u00e9s Navarro Cadavid<\/i><\/p>\n<p><b>3 \/ B\u00fasqueda local distribuida basada en la exploraci\u00f3n de vecindarios paralelos para el problema RDCMST<\/b><br \/>\n<i>C\u00e9sar Loaiza y Gabriel Tamura Morimitsu<\/i><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-2\"><ul>\n<li style=\"text-align: justify;\"><b>Juan Felipe G\u00f3mez Manzanares<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>\u00c1lvaro Pach\u00f3n de la Cruz<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Sebasti\u00e1n Felipe Land\u00ednez Garc\u00eda<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4154-2119\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Andr\u00e9s Navarro Cadavid<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>C\u00e9sar Loaiza<\/b>, University College Cork (Irlanda)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0001-5191-1347\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Gabriel Tamura Morimitsu<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-3\"><table>\n<tbody>\n<tr class=\"first odd\">\n<th width=\"150\">\n<p style=\"text-align: left;\">T\u00edtulo (ingl\u00e9s):<\/p>\n<\/th>\n<td class=\"data last\">Agile Provisioning &#8211; Malware Classification &#8211; Giraph Optimization<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">DOI\/URL:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/bm.7.2020\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/bm.7.2020<\/a><\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Editorial(es):<\/p>\n<\/th>\n<td class=\"data last\">Universidad Icesi.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Autor(es):<\/p>\n<\/th>\n<td class=\"data last\">Juan Felipe G\u00f3mez Manzanares, \u00c1lvaro Pach\u00f3n de la Cruz, Sebasti\u00e1n Felipe Land\u00ednez Garc\u00eda, Andr\u00e9s Navarro Cadavid, C\u00e9sar Loaiza, Gabriel Tamura Morimitsu.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Palabras clave:<\/p>\n<\/th>\n<td class=\"data last\">Agile computing, Cybersecurity, Optimization.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">ISBN:<\/p>\n<\/th>\n<td class=\"data last\">978-958-5590-45-8 (PDF).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Fecha de edici\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Octubre de 2020.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">No. de p\u00e1ginas:<\/p>\n<\/th>\n<td class=\"data last\">252.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Idioma(s):<\/p>\n<\/th>\n<td class=\"data last\">Espa\u00f1ol.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Formato(s):<\/p>\n<\/th>\n<td class=\"data last\">Libro electr\u00f3nico (PDF).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Alto x ancho:<\/p>\n<\/th>\n<td class=\"data last\">24 x 19 cm<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Colecci\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Bit\u00e1coras de la Maestr\u00eda (7).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Producto:<\/p>\n<\/th>\n<td class=\"data last\">Libro de divulgaci\u00f3n.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Observaciones:<\/p>\n<\/th>\n<td class=\"data last\">Incluye referencias bibliogr\u00e1ficas.<\/td>\n<\/tr>\n<tr class=\"last odd\">\n<th>\n<p style=\"text-align: left;\">Registro DSpace:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/bm.7.2020\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2016\/04\/downloadIcon-e1460499009176.png\" alt=\"Icono de Repositorio - Contenido en la Nube\" width=\"25\" height=\"25\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo completo: Aprovisionamiento \u00e1gil \u2013 Clasificaci\u00f3n de malware \u2013 Optimizaci\u00f3n Giraph. Colecci\u00f3n: Bit\u00e1coras de la maestr\u00eda (7). Autores: Juan Felipe G\u00f3mez Manzanares, \u00c1lvaro Pach\u00f3n de la Cruz, Sebasti\u00e1n Felipe Land\u00ednez Garc\u00eda, Andr\u00e9s Navarro Cadavid, C\u00e9sar Loaiza, Gabriel Tamura Morimitsu. Editorial: Universidad Icesi. Producci\u00f3n editorial: Claros Editores SAS. A\u00f1o de edici\u00f3n: 2020 | ISBN: 978-958-5590-45-8 (PDF). [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5648,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[591],"tags":[263,324,465,530,531,534,576,626,721,727,870,903],"class_list":["post-5644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bitacoras-de-la-maestria","tag-fi","tag-libro-electronico","tag-descarga-gratuita","tag-ciberseguridad","tag-malware","tag-andres-navarro-cadavid","tag-576","tag-divulgacion-cientifica","tag-gabriel-tamura-morimitsu","tag-libro-de-divulgacion","tag-christian-urcuqui","tag-fidca"],"_links":{"self":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/5644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/comments?post=5644"}],"version-history":[{"count":4,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/5644\/revisions"}],"predecessor-version":[{"id":6550,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/5644\/revisions\/6550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media\/5648"}],"wp:attachment":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media?parent=5644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/categories?post=5644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/tags?post=5644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}