- idUS
- Browsing by Author
Browsing by Author "Varela Vaca, Ángel Jesús"
Now showing items 1-20 of 161
-
Article
A domain-specific language for the specification of UCON policies
Reina Quintero, Antonia María; Martínez Pérez, Salvador; Varela Vaca, Ángel Jesús; Gómez López, María Teresa; Cabot, Jordi (Elsevier, 2022)Security policies constrain the behavior of all users of an information system. In any non-trivial system, these security ...
-
Article
A framework to secure the development and auditing of SSL pinning in mobile applications: The case of android devices
Ramírez López, Francisco José; Varela Vaca, Ángel Jesús; Ropero Rodríguez, Jorge; Luque Rodríguez, Joaquín; Carrasco Muñoz, Alejandro (MDPI AG, 2019-12)The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been ...
-
Presentation
A Model-Driven Engineering approach with Diagnosis of Non-Conformance of Security Objectives in Business Process Models
Varela Vaca, Ángel Jesús; Martínez Gasca, Rafael; Jiménez Ramírez, Andrés (IEEE Computer Society, 2011)Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The ...
-
Presentation
A NLP-Oriented Methodology to Enhance Event Log Quality
Ramos Gutiérrez, Belén; Varela Vaca, Ángel Jesús; Ortega Rodríguez, Francisco Javier; Gómez López, María Teresa; Wynn, Moe Thandar (Springer, 2021)The quality of event logs is a crucial cornerstone for the feasibility of the application of later process mining techniques. ...
-
Presentation
A novel ensemble learning system for cyberattack classification [Póster]
Mogollón Gutiérrez, Óscar; Ávila Vegas, Mar; Carlo Lindo, Andrés (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)This article introduces a novel approach to en hancing cybersecurity through AI by analyzing network traffic, proposing a ...
-
Presentation
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
Pozo Hidalgo, Sergio; Varela Vaca, Ángel Jesús; Martínez Gasca, Rafael (IEEE Computer Society, 2010)Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a ...
-
Presentation
A Review of An Interpretable Semi-Supervised System for Detecting Cyberattacks Using Anomaly Detection in Industrial Scenarios [Póster]
Perales Gómez, Ángel Luis; Fernández Maimó, Lorenzo; Huertas Celdrán, Alberto; García Clemente, Félix J. (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)The Anomaly Detection systems based on Ma chine Learning and Deep Learning techniques showed great performance when detecting ...
-
Presentation
A Review of Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized [Póster]
López Bernal, Sergio; Huertas Celdrán, Alberto; Martínez Pérez, Gregorio (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Brain-computer interfaces enable bidirectional communication between the brain and external devices, used in medicine for ...
-
Presentation
A review of Spotting Child Sexual Exploitation Material using File Names and their Path [Póster]
Al-Nabki, MHD Wesam; Jáñez Martino, Francisco; Fidalgo, Eduardo; Alegre, Enrique; Aláiz Rodríguez, Rocío (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Law Enforcement Agencies (LEAs) fight the pro duction and distribution of Child Sexual Exploitation Material (CSEM) daily. ...
-
Presentation
A Review of SUSAN: A Deep Learning based anomaly detection framework for sustainable industry [Póster]
Perales Gómez, Ángel Luis; Fernández Maimó, Lorenzo; Huertas Celdrán, Alberto; García Clemente, Félix J. (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Nowadays, sustainability is pivotal in green tech nologies, crucial for industries striving to cut carbon emissions and ...
-
Presentation
A Review of VAASI: Crafting Valid and Abnormal Adversarial Samples for Anomaly Detection Systems in Industrial Scenarios [Póster]
Perales Gómez, Ángel Luis; Fernández Maimó, Lorenzo; Huertas Celdrán, Alberto; García Clemente, Félix J. (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Existing adversarial attacks are not feasible in industrial scenarios since they primarly deals with continuous features ...
-
Presentation
A review of “A comprehensive review of the state of the art on security and privacy issues in Healthcare” [Póster]
López Martínez, Antonio; Gil Pérez, Manuel; Ruiz Martínez, Antonio (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)The healthcare industry plays a crucial role in society, and with the increasing use of technology in this field it has ...
-
Presentation
A Review of “A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices” [Póster]
Román, Roberto; Arjona, Rosario; Baturone Castillo, María Iluminada (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)This work proposes to include a low-cost Root of Trust for Measuring and Reporting (RoTMR) in an Internet-of-Thing (IoT) ...
-
Presentation
A Review of “Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management” [Póster]
García Pérez, Alberto; López Martínez, Antonio; Gil Pérez, Manuel (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Risk management has surged in importance across companies of all sizes due to escalating cyberthreats and as sociated ...
-
Presentation
A Review of “Post-Quantum Biometric Authentication based on Homomorphic Encryption and Classic McEliece” [Póster]
Arjona, Rosario; López González, Paula; Román, Roberto; Baturone, Iluminada (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)This work proposes a secure biometric authentication scheme that applies homomorphic encryption based on the Classic ...
-
Presentation
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
Varela Vaca, Ángel Jesús; Warschofsky, Robert; Martínez Gasca, Rafael; Pozo Hidalgo, Sergio; Meinel, Christoph (Springer, 2012)Risk management has become an essential mechanism for business and security analysts, since it enable the identification, ...
-
Presentation
A sumary of: Federated Explainability for Network Anomaly Characterization [Póster]
Sáez de Cámara, Xabier; Flores, José Luis; Arellano, Cristobal; Urbieta, Aitor; Zurutuza, Urko (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)Machine learning based systems have shown pro mising results for intrusion detection due to their ability to learn complex ...
-
Presentation
A Summary of Adversarial Attacks and Defenses on ML- and Hardware-based IoT Device Fingerprinting and Identification [Póster]
Sánchez Sánchez, Pedro Miguel; Huertas Celdrán, Alberto; Bovet, Gérôme; Martínez Pérez, Gregorio (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)In response to the rapid expansion of Internet of-Things (IoT) devices and associated cybersecurity threats, this work ...
-
Presentation
A Summary of on the feasibility of predicting fake news appearance– the Spanish case [Póster]
Ibañez Lissen, Luis; González Manzano, Lorena; Fuentes, José M.; Goyanes, Manuel (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)The growing amount of news shared on the Internet makes it hard to verify them in real time. An estimation of future fake ...
-
Presentation
A Summary of RansomAI: AI-powered Ransomware for Stealthy Encryption [Póster]
Assen, Jan von der; Huertas Celdrán, Alberto; Luechinger, Janik; Sánchez Sánchez, Pedro Miguel; Martínez Pérez, Gregorio; Stiller, Burkhard (Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)With Artificial Intelligence (AI) rapidly advancing, ransomware and malware will soon utilize AI techniques to intelligently ...