Buscar
Mostrando ítems 1-10 de 152
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, ...
Ponencia
Improving the Diagnosability of Business Process Management Systems Using Test Points
(Springer, 2010)
The management and automation of business processes have become an essential task within IT organizations, where the diagnosis is a very important issue, since it enables fault isolation in a business process. The ...
Ponencia
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
(IEEE Computer Society, 2008)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as managing frequent topology changes. ...
Tesis Doctoral
Técnicas automáticas para la diagnosis de errores en software diseñado por contrato
(2011-12-21)
Cada vez más la calidad en los productos software es primordial. En el desarrollo del software los costes asociados a la reparación de los errores representan un porcentaje importante de recursos, por tanto, mejorar el ...
Ponencia
Querying a Polynomial Object-Relational Constraint Database in Model-Based Diagnosis
(Springer, 2005)
Many papers related to Constraint Databases (CDBs) theories exist, including proposals that present frameworks for the treatment of constraints as a new data type. Our proposal presents a new way of storing and manipulating ...
Artículo
Metodología Semicualitativa para Razonar sobre Sistemas Dinámicos
(Scientific Electronic Library Online (SCIELO), 2005-01)
En este artículo se propone una metodología para razonar sobre los modelos semicualitativos construidos para sistemas dinámicos con conocimiento cualitativo y cuantitativo. La información cualitativa de estos sistemas puede ...
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Ponencia
AMADEUS: Towards the AutoMAteD secUrity teSting
(ACM: Association for Computing Machinery, 2020)
The proper configuration of systems has become a fundamental factor to avoid cybersecurity risks. Thereby, the analysis of cyber security vulnerabilities is a mandatory task, but the number of vul nerabilities and system ...