Artículo | 2025 |
Business process models and simulation to enable GDPR compliance
|
International Journal of Information Security |
Ponencia | 2024 |
Análisis del impacto de las vulnerabilidades en las dependencias de proyectos software basado en Satisfiability Modulo Theories (SMT)
|
IX Jornadas Nacionales de Investigación En Ciberseguridad |
Artículo | 2024 |
Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case
|
Internet of Things (Netherlands) |
Artículo | 2024 |
BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning
|
INFORMATION AND SOFTWARE TECHNOLOGY |
Ponencia | 2024 |
Detección de Spear Phishing basada en métodos de decisión multicriterio
|
IX Jornadas Nacionales de Investigación En Ciberseguridad |
Artículo | 2024 |
Enabling security risk assessment and management for business process models
|
Journal of Information Security and Applications |
Artículo | 2024 |
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)
|
COMPUTERS & SECURITY |
Capítulo | 2023 |
Ciberseguridad cognitiva aplicada al phishing
|
Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad: Vigo, 21 a 23 de junio de 2023 |
Artículo | 2023 |
ELI: an IoT-aware big data pipeline with data curation and data quality
|
PEERJ COMPUTER SCIENCE |
Artículo | 2023 |
Feature models to boost the vulnerability management process
|
JOURNAL OF SYSTEMS AND SOFTWARE |
Libro | 2023 |
Internet of Things - New Trends, Challenges and Hurdles
|
Internet of Things - New Trends, Challenges and Hurdles |
Capítulo | 2023 |
Introductory Chapter: An Overview to the Internet of Things
|
Internet of Things - New Trends, Challenges and Hurdles |
Artículo | 2023 |
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning
|
Internet of Things (Netherlands) |
Artículo | 2023 |
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
|
COMPUTERS & SECURITY |
Capítulo | 2023 |
Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based Methodology
|
Advanced Information Systems Engineering |
Artículo | 2022 |
A domain-specific language for the specification of UCON policies
|
Journal of Information Security and Applications |
Capítulo | 2022 |
Advisory: Análisis de vulnerabilidades en proyectosde desarrollo software
|
Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) |
Ponencia | 2022 |
Advisory: vulnerability analysis in software development project dependencies
|
26th ACM International Systems and Software Product Line Conference, SPLC 2022 - Proceedings |
Ponencia | 2022 |
Advisory. Una herramienta para identificar los riesgos de seguridad
|
26th Jornadas de Ingenieria del Software y Bases de Datos, JISBD 2022 |
Capítulo | 2022 |
Automatizando RGPD 2016/679 mediante Procesos de Negocio: El caso del Artículo 32
|
Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) |
Ponencia | 2022 |
Dynamic checks of evidence models for assurance projects in eclipse OpenCert
|
Lecture Notes in Computer Science |
Artículo | 2022 |
Reasoning on the Usage Control Security policies over Data Artifact Business Process Models
|
COMPUTER SCIENCE AND INFORMATION SYSTEMS |
Artículo | 2022 |
Smart contract languages: a multivocal mapping study
|
ACM COMPUTING SURVEYS |
Capítulo | 2021 |
A NLP-oriented methodology to enhance event log quality
|
Enterprise, Business-Process and Information Systems Modeling |
Artículo | 2021 |
Blockchain-based federation of wireless sensor nodes
|
JOURNAL OF SUPERCOMPUTING |
Artículo | 2021 |
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
|
COMPUTERS IN INDUSTRY |
Ponencia | 2021 |
CC4Spark: distributing event logs and big complex conformance checking problems
|
CEUR workshop proceedings |
Artículo | 2021 |
Data curation in the Internet of things: a decision model approach
|
Computational and Mathematical Methods |
Artículo | 2021 |
Discovering configuration workflows from existing logs using process mining
|
EMPIRICAL SOFTWARE ENGINEERING |
Artículo | 2021 |
DMN4DQ: when data quality meets DMN
|
DECISION SUPPORT SYSTEMS |
Artículo | 2021 |
Empowering conformance checking using Big Data through horizontal decomposition
|
INFORMATION SYSTEMS |
Capítulo | 2021 |
Enabling Process Mining in Airbus Manufacturing
|
Business Process Management Cases Vol. 2 |
Ponencia | 2021 |
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
|
Actas de las XXV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2021): [Málaga, 22 al 24 de septiembre de 2021] |
Ponencia | 2021 |
Unleashing Constraint Optimisation Problem solving in Big Data environments
|
Actas de las XXV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2021): [Málaga, 22 al 24 de septiembre de 2021] |
Ponencia | 2020 |
AMADEUS: Towards the AutoMAteD secUrity teSting
|
ACM International Conference Proceeding Series |
Artículo | 2020 |
Blockchain from the perspective of privacy and anonymisation: a systematic literature review
|
SENSORS |
Ponencia | 2020 |
Chamaleon: Framework to improve data wrangling with complex data
|
40th International Conference on Information Systems, ICIS 2019 |
Ponencia | 2020 |
Definition and verification of security configurations of cyber-physical systems
|
Lecture Notes in Computer Science |
Artículo | 2020 |
Measuring data-centre workflows complexity through process mining: the Google cluster case
|
JOURNAL OF SUPERCOMPUTING |
Artículo | 2020 |
Unleashing constraint optimisation problem solving in Big Data environments
|
JOURNAL OF COMPUTATIONAL SCIENCE |
Artículo | 2019 |
A framework to secure the development and auditing of SSL pinning in mobile applications: the case of Android devices
|
ENTROPY |
Artículo | 2019 |
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
|
IEEE ACCESS |
Capítulo | 2019 |
Constraint-Driven Fault Diagnosis
|
Fault Diagnosis of Dynamic Systems: Quantitative and Qualitative Approaches |
Artículo | 2019 |
CyberSPL: A framework for the verification of cybersecurity policy compliance of system configurations using software product lines
|
APPLIED SCIENCES-BASEL |
Ponencia | 2019 |
CyberSPL: Plataforma para la verificación del cumplimiento de políticas de ciberseguridad en configuraciones de sistemas usando modelos de características
|
Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres |
Ponencia | 2019 |
DMN for Data Quality Measurement and Assessment
|
Lecture Notes in Business Information Processing |
Ponencia | 2019 |
Enabling process mining in aircraft manufactures: Extracting event logs and discovering processes from complex data
|
CEUR workshop proceedings |
Ponencia | 2019 |
Guidelines towards secure SSL pinning in mobile applications
|
Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019, Cáceres |
Capítulo | 2019 |
Model-Based Software Debugging
|
Fault Diagnosis of Dynamic Systems: Quantitative and Qualitative Approaches |
Ponencia | 2019 |
Process mining to unleash variability management: discovering configuration workflows using logs
|
SPLC'19: PROCEEDINGS OF THE 23RD INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL A |
Ponencia | 2018 |
Análisis de los datos y coreografia de múltiples procesos en entornos logísticos
|
JCIS 2018: XIV Jornadas de Ingeniería de Ciencia e Ingeniería de Servicios (2018). |
Artículo | 2018 |
Business Process Configuration According to Data Dependency Specification
|
APPLIED SCIENCES-BASEL |
Capítulo | 2018 |
FABIOLA: Towards the resolution of constraint optimization problems in big data environment
|
Lecture Notes in Information Systems and Organisation |
Ponencia | 2017 |
FABIOLA: Defining the components for constraint optimization problems in big data environment
|
Information Systems Development: Advances in Methods, Tools and Management - Proceedings of the 26th International Conference on Information Systems Development, ISD 2017 |
Ponencia | 2017 |
FABIOLA: herramienta para la optimización de problemas en entornos de Big Data
|
Actas de las 22nd Jornadas de Ingeniería del Software y Bases de Datos, JISBD 2017 |
Ponencia | 2017 |
Governance knowledge management and decision support using fuzzy governance maps
|
Lecture Notes in Business Information Processing |
Ponencia | 2017 |
Guiding the creation of choreographed processes with multiple instances based on data models
|
Lecture Notes in Business Information Processing |
Ponencia | 2016 |
A usage control model extension for the verification of security policies in artifact-centric business process models
|
BUSINESS INFORMATION SYSTEMS (BIS 2016) |
Ponencia | 2016 |
OPBUS: A framework for improving the dependability of risk-aware business processes
|
AI COMMUNICATIONS |
Ponencia | 2015 |
An open-source proactive security infrastructure for Business Process Management
|
Proceedings of the 26th International Business Information Management Association Conference - Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015 |
Artículo | 2015 |
Formalization of security patterns as a means to infer security controls in business processes
|
Logic Journal of the IGPL |
Ponencia | 2015 |
Towards Automatic Integration of Information Security Governance and Management using a BPMS approach
|
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015: I JNIC2015 |
Ponencia | 2013 |
A security pattern-driven approach toward the automation of risk treatment in business processes
|
INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS |
Ponencia | 2013 |
CombiS-BP Editor: Combining Declarative and Imperative Languages in BP Modelling
|
2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS) |
Ponencia | 2013 |
CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper
|
2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS) |
Artículo | 2013 |
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
|
INFORMATION AND SOFTWARE TECHNOLOGY |
Artículo | 2012 |
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
|
JOURNAL OF SYSTEMS AND SOFTWARE |
Artículo | 2012 |
Improvement of Optimization Agreements in Business Processes involving Web Services
|
IBIMA Communications |
Ponencia | 2011 |
A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models
|
2011 fifth international conference on research challenges in information science |
Ponencia | 2011 |
An Approach For Optimization Agreements In Business Processes Based On Web Services
|
CREATING GLOBAL COMPETITIVE ECONOMIES: A 360-DEGREE APPROACH, VOLS 1-4 |
Ponencia | 2011 |
Contract-based test generation for data flow of business processes using constraint programming
|
2011 fifth international conference on research challenges in information science |
Ponencia | 2011 |
OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
|
SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY |
Ponencia | 2010 |
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
|
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) |
Ponencia | 2010 |
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
|
COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010 |
Ponencia | 2010 |
Towards dependable business processes with fault-tolerance approach
|
Proceedings - 3rd International Conference on Dependability, DEPEND 2010 |
Ponencia | 2009 |
AFPL2, An Abstract Language for Firewall ACLs with NAT support
|
DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY |
Ponencia | 2009 |
EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN FIREWALL ACLS
|
SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY |
Ponencia | 2009 |
MDA-based framework for automatic generation of consistent firewall ACLs with NAT
|
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II |
Ponencia | 2008 |
Fast algorithms for local inconsistency detection in firewall ACL updates
|
Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys. |
Ponencia | 2008 |
Polynomial heuristic algorithms for inconsistency characterization in firewall rule sets
|
Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys. |