Buscar
Mostrando ítems 1-10 de 10
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Ponencia
Enabling Process Mining in Aircraft Manufactures: Extracting Event Logs and Discovering Processes from Complex Data
(CEUR Workshop Proceedings (CEUR-WS.org), 2019)
Process mining is employed by organizations to completely understand and improve their processes and to detect possible deviations from expected behavior. Process discovery uses event logs as input data, which describe ...
Ponencia
Guidelines towards secure SSL pinning in mobile applicationsand
(Universidad de Extremadura, 2019)
Security is a major concern in web applications for so long, but it is only recently that the use of mobile applications has reached the level of web services. This way, we are taking OWASP Top 10 Mobile as our starting ...
Ponencia
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
(Association for Computing Machinery (ACM), 2019)
Variability models are used to build configurators. Configurators are programs that guide users through the configuration process to reach a desired configuration that fulfils user requirements. The same variability ...
Ponencia
DMN for Data Quality Measurement and Assessment
(Springer, 2019)
Data Quality assessment is aimed at evaluating the suitability of a dataset for an intended task. The extensive literature on data quality describes the various methodologies for assessing data quality by means of data ...
Artículo
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
(IEEE Computer Society, 2019)
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental for achieving a business objective, but they also imply the assumption of certain security risks ...
Capítulo de Libro
Model-Based Software Debugging
(Springer, 2019)
The complexity and size of software systems have rapidly increased in recent years, with software engineers facing ever-growing challenges in building and maintaining such systems. In particular, testing and debugging, ...
Capítulo de Libro
Constraint-Driven Fault Diagnosis
(Springer, 2019)
Constraint-Driven Fault Diagnosis (CDD) is based on the concept of constraint suspension [6], which was proposed as an approach to fault detection and diagnosis. In this chapter, its capabilities are demonstrated by ...
Ponencia
CyberSPL: Plataforma para la verificación del cumplimiento de políticas de ciberseguridad en configuraciones de sistemas usando modelos de caracterısticas
(Universidad de Extremadura, 2019)
Los ataques de ciberseguridad se han convertido en un factor muy relevante que pueden contravenir el cumplimiento de las políticas de ciberseguridad de las empresas y organizaciones. Dichos ataques pueden estar provocados ...
Ponencia
CHAMALEON: Framework to improve Data Wrangling with Complex Data
(Association for Information Systems (AIS), 2019)
Data transformation and schema conciliation are relevant topics in Industry due to the incorporation of data-intensive business processes in organizations. As the amount of data sources increases, the complexity of such ...