[PDF][PDF] Using electronic design automation and guided inquiry learning model in higher engineering education

M Rifai, S Masitoh, BS Bachri, WH Setyawan… - Universal Journal of …, 2020 - academia.edu
Electronic design automation software is a part of software learning. This study uses digital
electronic circuit design software as learning media, namely, Electronic Design Automation …

C3-Sex: A Conversational Agent to Detect Online Sex Offenders

JI Rodríguez, SR Durán, D Díaz-López… - Electronics, 2020 - mdpi.com
Prevention of cybercrime is one of the missions of Law Enforcement Agencies (LEA) aiming
to protect and guarantee sovereignty in the cyberspace. In this regard, online sex crimes are …

Dynamic counter-measures for risk-based access control systems: An evolutive approach

D Díaz-López, G Dólera-Tormo… - Future Generation …, 2016 - Elsevier
Risk-based access control systems are a new element in access control categories,
incorporating risk analysis as part of the inputs to consider when taking an authorization …

PALOT: Profiling and authenticating users leveraging internet of things

P Nespoli, M Zago, A Huertas Celdrán, M Gil Pérez… - Sensors, 2019 - mdpi.com
Continuous authentication was introduced to propose novel mechanisms to validate users'
identity and address the problems and limitations exposed by traditional techniques …

On the way to automatic exploitation of vulnerabilities and validation of systems security through security chaos engineering

S Palacios Chavarro, P Nespoli, D Díaz-López… - Big Data and Cognitive …, 2022 - mdpi.com
Software is behind the technological solutions that deliver many services to our society,
which means that software security should not be considered a desirable feature anymore …

Nothing to hide? On the security and privacy threats beyond open data

J Pastor-Galindo, FG Mármol… - IEEE Internet …, 2021 - ieeexplore.ieee.org
People's online activity continuously dumps personally identifiable information on the web.
Alarmingly, this public information becomes a dangerous cyberweapon in the era of finely …

Job satisfaction strategies to improve performance of small businesses

A Abubaha - 2019 - search.proquest.com
Small business leaders continually face challenges due to limited resources and lack of
employees' engagement. Only 78% of new small businesses survive 1 year after …

Strategies to improve job satisfaction and reduce voluntary employee turnover of nurses

S Proctor - 2017 - search.proquest.com
Job satisfaction and employee turnover affect the health care industry in the form of
overworked staff, inadequate health care, and loss of profits. In 2015, the United States …

ChaosXploit: A Security Chaos Engineering framework based on Attack Trees

S Palacios, D Díaz-López, P Nespoli - 2022 - pure.urosario.edu.co
Security incidents may have several origins. However, many times they are caused due to
components that are supposed to be correctly configured or deployed. Traditional methods …

A new three party key establishment scheme: Applicable for internet-enabled sensor networks

H Nasiraee, JB Mohasefi - Computers & Electrical Engineering, 2015 - Elsevier
Abstract Internet-Enabled Sensor Networks (IESNs) play an important role in Internet-of-
Things (IoT) which usually need key establishment and secure communication. In this paper …