All Stories

  1. DMN4DQ+: Optimising data repair to enhance data usability
  2. A dataset on vulnerabilities affecting dependencies in software package managers
  3. Optimising secure and sustainable smart home configurations
  4. Informed decision-making in prioritising product variants
  5. Business process models and simulation to enable GDPR compliance
  6. Enabling security risk assessment and management for business process models
  7. Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case
  8. Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)
  9. BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning
  10. Onto-CARMEN: Ontology-driven approach for Cyber–Physical System Security Requirements meta-modelling and reasoning
  11. ELI: an IoT-aware big data pipeline with data curation and data quality
  12. Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
  13. Feature models to boost the vulnerability management process
  14. Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based Methodology
  15. Advisory
  16. A domain-specific language for the specification of UCON policies
  17. Smart contract languages: A multivocal mapping study.
  18. Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert
  19. Reasoning on the usage control security policies over data artifact business process models
  20. CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
  21. Empowering conformance checking using Big Data through horizontal decomposition
  22. DMN4DQ: When data quality meets DMN
  23. Blockchain-based federation of wireless sensor nodes
  24. Discovering configuration workflows from existing logs using process mining
  25. A NLP-Oriented Methodology to Enhance Event Log Quality
  26. Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
  27. Curso de Especialización en Ciberseguridad, ¿están preparados nuestros docentes?
  28. Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review
  29. AMADEUS
  30. Unleashing Constraint Optimisation Problem solving in Big Data environments
  31. CyberSPL: A Framework for the Verification of Cybersecurity Policy Compliance of System Configurations Using Software Product Lines
  32. A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices
  33. Measuring data-centre workflows complexity through process mining: the Google cluster case
  34. Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
  35. DMN for Data Quality Measurement and Assessment
  36. Process mining to unleash variability management
  37. Constraint-Driven Fault Diagnosis
  38. Model-Based Software Debugging
  39. Business Process Configuration according to Data Dependency Specification
  40. Business Process Configuration according to Data Dependency Specification
  41. FABIOLA: Towards the Resolution of Constraint Optimization Problems in Big Data Environment
  42. Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps
  43. Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models
  44. A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
  45. Formalization of security patterns as a means to infer security controls in business processes
  46. OPBUS: A framework for improving the dependability of risk-aware business processes
  47. Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
  48. CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper
  49. A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
  50. Improvement of Optimization Agreements in Business Processes Involving Web Services
  51. CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
  52. Contract-based test generation for data flow of business processes using constraint programming
  53. A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models
  54. Towards Dependable Business Processes with Fault-Tolerance Approach
  55. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
  56. OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
  57. AFPL2, an Abstract Language for Firewall ACLs with NAT Support
  58. MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
  59. Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
  60. Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets