{"id":"https://openalex.org/W7118477849","doi":"https://doi.org/10.48550/arxiv.2601.00798","title":"Aplicacion de analitica de datos para la deteccion de anomalias y fortalecimiento de la seguridad en la red WiFi del campus universitario de la Universidad Nacional del Altiplano","display_name":"Aplicacion de analitica de datos para la deteccion de anomalias y fortalecimiento de la seguridad en la red WiFi del campus universitario de la Universidad Nacional del Altiplano","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7118477849","doi":"https://doi.org/10.48550/arxiv.2601.00798"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00798","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00798","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00798","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122212135","display_name":"Adiv Brander Cari Quispe","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Quispe, Adiv Brander Cari","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5122212135"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14070","display_name":"Knowledge Societies in the 21st Century","score":0.14550000429153442,"subfield":{"id":"https://openalex.org/subfields/3317","display_name":"Demography"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14070","display_name":"Knowledge Societies in the 21st Century","score":0.14550000429153442,"subfield":{"id":"https://openalex.org/subfields/3317","display_name":"Demography"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14267","display_name":"Technology in Education and Healthcare","score":0.04969999939203262,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13979","display_name":"Communication and COVID-19 Impact","score":0.03680000081658363,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.44519999623298645},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4056999981403351},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.40220001339912415},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.3644999861717224},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3513000011444092},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.3066999912261963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5486999750137329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47360000014305115},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.44519999623298645},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4056999981403351},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.40220001339912415},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3513000011444092},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.34209999442100525},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.33489999175071716},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3057999908924103},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.2773999869823456},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00798","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00798","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00798","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00798","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6179965138435364,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"today's":[1],"university":[2,173],"environment,":[3],"wireless":[4,68,88],"connectivity":[5],"is":[6],"an":[7,188],"essential":[8],"resource":[9],"for":[10,145,154],"academic,":[11],"administrative,":[12],"and":[13,52,79,96,103,109,116,128,139,152,159,179],"research":[14],"activities.":[15],"However,":[16],"at":[17],"the":[18,22,27,36,45,63,66,71,83,87,146,162,170],"National":[19],"University":[20],"of":[21,24,29,47,65,73,94,148,172],"Altiplano":[23],"Puno":[25],"(UNAP),":[26],"use":[28],"a":[30],"QR":[31],"code":[32],"access":[33,53],"system":[34],"on":[35,113],"institutional":[37,195],"Wi-Fi":[38],"network":[39,69],"has":[40],"generated":[41,85],"vulnerabilities":[42,178],"related":[43],"to":[44,61,82],"lack":[46],"individual":[48],"authentication,":[49],"user":[50],"traceability,":[51],"control.":[54],"Given":[55],"this":[56,58],"situation,":[57],"study":[59],"aims":[60],"strengthen":[62],"security":[64],"university's":[67],"through":[70],"application":[72],"data":[74,99],"analytics,":[75],"employing":[76],"descriptive,":[77],"predictive,":[78],"prescriptive":[80],"approaches":[81],"logs":[84],"by":[86],"controller":[89],"(WLC).":[90],"The":[91,120],"methodology":[92],"consisted":[93],"collecting":[95],"processing":[97],"connection":[98],"from":[100],"users,":[101],"devices,":[102],"daily":[104],"traffic,":[105],"analyzing":[106],"behavioral":[107],"patterns,":[108],"detecting":[110],"anomalies":[111],"based":[112],"statistical":[114],"models":[115],"machine":[117],"learning":[118],"algorithms.":[119],"results":[121],"revealed":[122],"critical":[123],"usage":[124],"peaks":[125],"between":[126],"10:00":[127],"14:00,":[129],"as":[130,132],"well":[131],"anomalous":[133],"behavior":[134],"associated":[135],"with":[136,193],"recurring":[137],"devices":[138],"irregular":[140],"traffic":[141],"spikes.":[142],"This":[143],"allowed":[144],"establishment":[147],"dynamic":[149],"alert":[150],"thresholds":[151],"recommendations":[153],"improvements":[155],"in":[156],"bandwidth":[157],"management":[158,171],"authentication.":[160],"Furthermore,":[161],"conclusion":[163],"states":[164],"that":[165],"integrating":[166],"advanced":[167],"analytics":[168],"into":[169],"networks":[174],"not":[175],"only":[176],"identifies":[177],"optimizes":[180],"WiFi":[181],"service":[182],"performance,":[183],"but":[184],"also":[185],"advances":[186],"towards":[187],"intelligent,":[189],"proactive":[190],"infrastructure":[191],"aligned":[192],"modern":[194],"cybersecurity":[196],"standards.":[197]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
