Mostrando 10 resultados de: 12
Filtros aplicados
Publisher
Computers in Industry(2)
IEEE Latin America Transactions(2)
Journal of Universal Computer Science(2)
Computer Standards and Interfaces(1)
Computers and Security(1)
Área temáticas
Ciencias de la computación(5)
Física aplicada(4)
Programación informática, programas, datos, seguridad(4)
Funcionamiento de bibliotecas y archivos(2)
Derecho privado(1)
Competency Assessment of the Engineering Software for the Curricular Orientation of Students
ArticleAbstract: During the reform of computer engineering degrees, the emergence of the concept of competence has noPalabras claves:Degree in Computer Engineering, E-hrm, EHE, European higher education, General skills, METRICS, Specific General SkillsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Rosado D.G., Santos-Olmo A., Sara CamachoFuentes:scopusContent related to computing security on computer engineering degree according to international professional certificates
ArticleAbstract: Companies and professionals are currently demanding increasingly more specialized profiles, and it iPalabras claves:Contents, Implementation, professional certificates, security and auditing, subjectsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Mellado D., Rosado D.G.Fuentes:scopusDefinition and Verification of Security Configurations of Cyber-Physical Systems
Conference ObjectAbstract: The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These arePalabras claves:Configuration, CPS, Cyber-physical system, Feature model, Requirement, security, VerificationAutores:Fernandez-Medina E., Gasca R.M., Gómez-López M.T., Luis Enrique Sánchez Crespo, Rosado D.G., Varela-Vaca Á.J.Fuentes:scopusCARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
ArticleAbstract: In the last years, cyber-physical systems (CPS) are receiving substantial mainstream attention especPalabras claves:Configuration models, Cyber-physical system, CYBERSECURITY, diagnosis, security, Security requirements, Security verificationAutores:Fernandez-Medina E., Gasca R.M., Gómez-López M.T., Luis Enrique Sánchez Crespo, Rosado D.G., Varela-Vaca Á.J.Fuentes:scopusApplying the action-research method to develop a methodology to reduce the installation and maintenance times of Information Security Management Systems
ArticleAbstract: Society is increasingly dependent on Information Security Management Systems (ISMS), and having thesPalabras claves:Action Research, cost saving, CYBERSECURITY, Information security management systems, ISMS, ISO27001, ISO27002, Process improvement, smes, Time reductionAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Rosado D.G., Santos-Olmo A.Fuentes:scopusForeword
OtherAbstract:Palabras claves:Autores:Abraho S., Annosi M.C., Baldassarri S., Begin T., Berenbach B., Berry D., Blanco C., Champneys A., Claudio A. Cañizares, Conejo B.A.J., Conradi R., Creighton O., Curtis B., Damian D., de la Cruz Llopis L.J., Del Azuay U., Doerr J., Dunghana D., Ebert C., Eslamian S., Fenwick A.J., Ferrari R., Franch X., Fraser S., Furze J.N., Gallardo J., Genero M., Gómez-Expósito A., Gregory A. Lewbart, Gruenbacher P., Guillermo Casado-López, Guillermo Rafael-Valdivia, Hall M.L., Hernandez S., Holban A.M., Houdek F., Hulgan J., Jefferson Torres-Quezada, Jeffery R., Johnson J.B., José Manuel Saiz-Alvarez, Juan Pablo Carvallo Vega, Jürjens J., Kelly Swing, Lacuesta-Gilaberte R., LePennec J.L., Li Z., Luis Enrique Sánchez Crespo, Lutz R., Madhavji N.H., Männistö T., Marcia Martins Marques, Marian Wiercigroch, Mavin A., Mellado D., Miranskyy A., Mohagheghi P., Mónica Aguilar Igartua, Mónica Cartelle Gestal, Murtaza S., Natalia Juristo, Pablo Samaniego Ponce, Perry D., Porter A., Raafat S.M., Regnell B., Reyes A., Richard J. Aspinall, Rosado D.G., Schwanke R., Seaman C., Sergio Albiol-Pérez, Sergio Luján-Mora, Tamai T., Terzakis J., Torchiano M., Trujillo S., Votta L., Walter Mera Ortiz, Whittle J., Wieringa R., Wilma FreireFuentes:scopusMARISMA-BiDa pattern: Integrated risk analysis for big data
ArticleAbstract: Data is one of the most important assets for all types of companies, which have undoubtedly grown thPalabras claves:BIG DATA, information security, Risk analysis, Risk Assessment, Security standardsAutores:Fernandez-Medina E., Luis Enrique Sánchez Crespo, Moreno J., Rosado D.G., Santos-Olmo A., Serrano M.A.Fuentes:scopusManaging cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern
ArticleAbstract: Cyber-physical systems (CPSs) are smart systems that include engineered interacting networks of physPalabras claves:Cyber-physical system, MARISMA, Risk analysis, Risk AssessmentAutores:Blanco C., Fernandez-Medina E., Luis Enrique Sánchez Crespo, Mouratidis H., Rosado D.G., Santos-Olmo A., Serrano M.A.Fuentes:scopusManaging security and its maturity in small and medium-sized enterprises
ArticleAbstract: Due to the growing dependence of information society on Information and Communication Technologies,Palabras claves:ISMS, Security system, SMEAutores:Luis Enrique Sánchez Crespo, Piattini-Velthuis M., Rosado D.G., Santos-Olmo A.Fuentes:scopusSecurity in information systems: Advances and new challenges
OtherAbstract:Palabras claves:Autores:Blanco C., Jürjens J., Luis Enrique Sánchez Crespo, Rosado D.G.Fuentes:scopus