Mostrando 10 resultados de: 14
Filtros aplicados
Publisher
Computers and Security(2)
Computers in Industry(2)
Computer Standards and Interfaces(1)
ICSOFT 2007 - 2nd International Conference on Software and Data Technologies, Proceedings(1)
IEEE Latin America Transactions(1)
Área temáticas
Ciencias de la computación(8)
Programación informática, programas, datos, seguridad(6)
Dirección general(5)
Física aplicada(4)
Derecho privado(3)
Área de conocimiento
Análisis de datos(1)
Aprendizaje automático(1)
Automatización(1)
Ingeniería de software(1)
Tecnologías de la información y la comunicación(1)
Origen
scopus(14)
Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs
Conference ObjectAbstract: The information society is ever-increasingly dependent upon Information Security Management SystemsPalabras claves:Autores:Fernandez-Medina E., Gallego A., Luis Enrique Sánchez Crespo, Santos-Olmo A.Fuentes:scopusDetecting malware in cyberphysical systems using machine learning: A survey
ArticleAbstract: Among the scientific literature, it has not been possible to find a consensus on the definition of tPalabras claves:Cyber-physical system, detection, IOT, Machine learning, MalwareAutores:Higuera J.B., Higuera J.R.B., Luis Enrique Sánchez Crespo, Montes F., Sicilia J.A.Fuentes:scopusDeveloping a maturity model for information system security management within small and medium size enterprises
Conference ObjectAbstract: For enterprises to be able to use information and communication technologies with guarantees, it isPalabras claves:Autores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Villafranca D.Fuentes:scopusDeveloping a model and a tool to manage the information security in small and medium enterprises
Conference ObjectAbstract: The maturity and security management systems are essential in order to guarantee the continuity andPalabras claves:ISMS, Maturity model, Risk analysis, SMEAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Villafranca D.Fuentes:scopusContent related to computing security on computer engineering degree according to international professional certificates
ArticleAbstract: Companies and professionals are currently demanding increasingly more specialized profiles, and it iPalabras claves:Contents, Implementation, professional certificates, security and auditing, subjectsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Mellado D., Rosado D.G.Fuentes:scopusDefinition and Verification of Security Configurations of Cyber-Physical Systems
Conference ObjectAbstract: The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These arePalabras claves:Configuration, CPS, Cyber-physical system, Feature model, Requirement, security, VerificationAutores:Fernandez-Medina E., Gasca R.M., Gómez-López M.T., Luis Enrique Sánchez Crespo, Rosado D.G., Varela-Vaca Á.J.Fuentes:scopusCARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
ArticleAbstract: In the last years, cyber-physical systems (CPS) are receiving substantial mainstream attention especPalabras claves:Configuration models, Cyber-physical system, CYBERSECURITY, diagnosis, security, Security requirements, Security verificationAutores:Fernandez-Medina E., Gasca R.M., Gómez-López M.T., Luis Enrique Sánchez Crespo, Rosado D.G., Varela-Vaca Á.J.Fuentes:scopusMARISMA-BiDa pattern: Integrated risk analysis for big data
ArticleAbstract: Data is one of the most important assets for all types of companies, which have undoubtedly grown thPalabras claves:BIG DATA, information security, Risk analysis, Risk Assessment, Security standardsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Moreno J., Rosado D.G., Santos-Olmo A., Serrano M.A.Fuentes:scopusManaging cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern
ArticleAbstract: Cyber-physical systems (CPSs) are smart systems that include engineered interacting networks of physPalabras claves:Cyber-physical system, MARISMA, Risk analysis, Risk AssessmentAutores:Blanco C., Fernandez-Medina E., Luis Enrique Sánchez Crespo, Mouratidis H., Rosado D.G., Santos-Olmo A., Serrano M.A.Fuentes:scopusModelling language for cyber security incident handling for critical infrastructures
ArticleAbstract: Cyber security incident handling is a consistent methodology with which to ensure overall business cPalabras claves:Critical infrastructure, Cyber course of action, Cyber incident, Cyber threat intelligence, Incident response, Meta-model, Security requirementsAutores:Islam S., Ismail U.M., Luis Enrique Sánchez Crespo, Mouratidis H., Santos-Olmo A.Fuentes:scopus