Mostrando 5 resultados de: 5
Subtipo de publicación
Article(5)
Publisher
Computers and Security(1)
Computers in Industry(1)
Future Internet(1)
International Journal of Information Security(1)
Journal of Universal Computer Science(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Ciencias de la computación(1)
Dirección general(1)
Economía(1)
Área de conocimiento
Ciencias de la computación(3)
Análisis de datos(1)
Visualización de información(1)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(5)
ODS 8: Trabajo decente y crecimiento económico(3)
ODS 16: Paz, justicia e instituciones sólidas(1)
ODS 2: Hambre cero(1)
Origen
scopus(5)
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
ArticleAbstract: In the last years, cyber-physical systems (CPS) are receiving substantial mainstream attention especPalabras claves:Configuration models, Cyber-physical system, CYBERSECURITY, diagnosis, security, Security requirements, Security verificationAutores:Fernandez-Medina E., Gasca R.M., Gómez-López M.T., Luis Enrique Sánchez Crespo, Rosado D.G., Varela-Vaca Á.J.Fuentes:scopusApplying the action-research method to develop a methodology to reduce the installation and maintenance times of Information Security Management Systems
ArticleAbstract: Society is increasingly dependent on Information Security Management Systems (ISMS), and having thesPalabras claves:Action Research, cost saving, CYBERSECURITY, Information security management systems, ISMS, ISO27001, ISO27002, Process improvement, smes, Time reductionAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Rosado D.G., Santos-Olmo A.Fuentes:scopusSystematic review of SIEM technology: SIEM-SC birth
ArticleAbstract: This paper contains a systematic review carried out to address the current status of the System InfoPalabras claves:GDPR, Information security compliance, Privacy laws, Security events, Security Information, SIEMAutores:López Velásquez J.M., Luis Enrique Sánchez Crespo, Monterrubio S.M.M., Rosado D.G.Fuentes:scopusMARISMA-BiDa pattern: Integrated risk analysis for big data
ArticleAbstract: Data is one of the most important assets for all types of companies, which have undoubtedly grown thPalabras claves:BIG DATA, information security, Risk analysis, Risk Assessment, Security standardsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Moreno J., Rosado D.G., Santos-Olmo A., Serrano M.A.Fuentes:scopusManaging security and its maturity in small and medium-sized enterprises
ArticleAbstract: Due to the growing dependence of information society on Information and Communication Technologies,Palabras claves:ISMS, Security system, SMEAutores:Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Rosado D.G., Santos-Olmo A.Fuentes:scopus