A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

Competencies for managing activities in agile projects

JR da Costa Filho, R Penha, LF da Silva… - Global Journal of …, 2022 - Springer
The management of activities in an agile environment takes place in iterative and
incremental processes, in which people from the development team and other project …

Empirical evaluation of a cloud computing information security governance framework

O Rebollo, D Mellado, E Fernández-Medina… - Information and …, 2015 - Elsevier
Context Cloud computing is a thriving paradigm that supports an efficient way to provide IT
services by introducing on-demand services and flexible computing resources. However …

Discovering configuration workflows from existing logs using process mining

B Ramos-Gutiérrez, ÁJ Varela-Vaca, JA Galindo… - Empirical Software …, 2021 - Springer
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

Process management: systematic review of determining factors for automation

MC Arantes, SF Santos, VG Simão - Business Process Management …, 2023 - emerald.com
Purpose The objective of this article is to identify through a literature study which factors
determine the success of process automation in management systems …

Process mining to unleash variability management: discovering configuration workflows using logs

ÁJ Varela-Vaca, JA Galindo… - Proceedings of the 23rd …, 2019 - dl.acm.org
Variability models are used to build configurators. Configurators are programs that guide
users through the configuration process to reach a desired configuration that fulfils user …

Feature models to boost the vulnerability management process

ÁJ Varela-Vaca, D Borrego, MT Gómez-López… - Journal of Systems and …, 2023 - Elsevier
Vulnerability management is a critical and very challenging process that allows
organisations to design a procedure to identify potential vulnerabilities, assess the level of …

Elliptic curve cryptography hardware accelerator for high-performance secure servers

L Parrilla, JA Álvarez-Bermejo, E Castillo… - The Journal of …, 2019 - Springer
Security threats affecting electronics communications in the current world make necessary
the encryption and authentication of every transaction. The increasing levels of security …

AMADEUS: towards the AutoMAteD secUrity teSting

ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …