A multi-vocal review of security orchestration
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …
vendors provide security solutions developed using heterogeneous technologies and …
Competencies for managing activities in agile projects
The management of activities in an agile environment takes place in iterative and
incremental processes, in which people from the development team and other project …
incremental processes, in which people from the development team and other project …
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina… - Information and …, 2015 - Elsevier
Context Cloud computing is a thriving paradigm that supports an efficient way to provide IT
services by introducing on-demand services and flexible computing resources. However …
services by introducing on-demand services and flexible computing resources. However …
Discovering configuration workflows from existing logs using process mining
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …
configuration process to reach the desired setting that fulfils user requirements. The same …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
Process management: systematic review of determining factors for automation
MC Arantes, SF Santos, VG Simão - Business Process Management …, 2023 - emerald.com
Purpose The objective of this article is to identify through a literature study which factors
determine the success of process automation in management systems …
determine the success of process automation in management systems …
Process mining to unleash variability management: discovering configuration workflows using logs
ÁJ Varela-Vaca, JA Galindo… - Proceedings of the 23rd …, 2019 - dl.acm.org
Variability models are used to build configurators. Configurators are programs that guide
users through the configuration process to reach a desired configuration that fulfils user …
users through the configuration process to reach a desired configuration that fulfils user …
Feature models to boost the vulnerability management process
Vulnerability management is a critical and very challenging process that allows
organisations to design a procedure to identify potential vulnerabilities, assess the level of …
organisations to design a procedure to identify potential vulnerabilities, assess the level of …
Elliptic curve cryptography hardware accelerator for high-performance secure servers
Security threats affecting electronics communications in the current world make necessary
the encryption and authentication of every transaction. The increasing levels of security …
the encryption and authentication of every transaction. The increasing levels of security …
AMADEUS: towards the AutoMAteD secUrity teSting
ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …