Buscar
Mostrando ítems 1-2 de 2
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Ponencia
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
(Association for Computing Machinery (ACM), 2019)
Variability models are used to build configurators. Configurators are programs that guide users through the configuration process to reach a desired configuration that fulfils user requirements. The same variability ...