Modelamiento matemático de la dinámica de poblaciones naturales de Aedes (Stegomyia) aegypti (Linnaeus, 1762) de Colombia con presencia de la mutación kdr Val1016Ile, incluyendo transporte pasivo y condiciones climáticas (Solabima 2019)
Stephanía Restrepo Serna, Irene Duarte Gandica, Oscar Alexander Aguirre-Obando
This is a modified beamerposter template based on the Gemini theme (see https://github.com/anishathalye/gemini) and the Beamer seagull color theme. Several colored boxes made with tcolorbox are also added.
Can a Smartphone be specifically identified according to the behavior or actions of the
user? Smartphones are nowadays widely used especially due to their numerous functionalities. These devices act like small computers as they have many functions such as internet
connection, emailing, chats, social media among others. A lot of traffic is therefore generated
from these devices and adversaries may use the traffic to attack the smartphones. Traffic
generated by smartphones may be used to interfere with user privacy. Information collected
from the traffic can be used to create specific fingerprints that will identify a particular device. This is seen from the two articles reviewed in this paper. Both papers investigate how
traffic from a smartphone can be used by attackers to infringe user privacy. Though different
methods are used in the studies, the results indicate that user privacy can be infringed.
Clean CV/resume template with shaded title bars developed by Scott Clark.
See also: https://github.com/sc932/resume.
Note: This template was originally published on ShareLaTeX but it was moved to Overleaf in November 2019. When moving it to Overleaf we found a bug which was resolved by applying this fix from tex.stackexchange.