Buscar
Mostrando ítems 1-10 de 27
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, ...
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Artículo
Blockchain‑based federation of wireless sensor nodes
(Springer, 2021)
Wireless sensor networks (WSNs), as an integral part of most Internet of Things (IoT) devices, are currently proliferating providing a new paradigm of emerging technologies. It is estimated that the number of globally ...
Artículo
Unleashing Constraint Optimisation Problem solving in Big Data environments
(Elsevier, 2020)
The application of the optimisation problems in the daily decisions of companies is able to be used for finding the best management according to the necessities of the organisations. However, optimisation problems imply ...
Ponencia
Enabling Process Mining in Aircraft Manufactures: Extracting Event Logs and Discovering Processes from Complex Data
(CEUR Workshop Proceedings (CEUR-WS.org), 2019)
Process mining is employed by organizations to completely understand and improve their processes and to detect possible deviations from expected behavior. Process discovery uses event logs as input data, which describe ...
Ponencia
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
(Association for Computing Machinery (ACM), 2019)
Variability models are used to build configurators. Configurators are programs that guide users through the configuration process to reach a desired configuration that fulfils user requirements. The same variability ...
Artículo
Discovering configuration workflows from existing logs using process mining
(Springer, 2021)
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to design different ...
Ponencia
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
(Springer, 2016)
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity centric workflow description inadequate. Several artifact-centric initia tives pursue the ...
Artículo
DMN4DQ: when data quality meets DMN
(Elsevier, 2021)
To succeed in their business processes, organizations need data that not only attains suitable levels of quality for the task at hand, but that can also be considered as usable for the business. However, many researchers ...
Ponencia
CC4Spark: Distributing Event Logs and big complex Conformance Checking problems
(CEUR Workshop Proceedings (CEUR-WS.org), 2021)
Conformance checking is one of the disciplines that best exposes the power of process mining, since it allows detecting anomalies and deviations in business processes, helping to assess and improve the quality of these. ...