Angel Jesus Varela-Vaca

Orcid: 0000-0001-9953-6005

According to our database1, Angel Jesus Varela-Vaca authored at least 51 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case.
Internet Things, April, 2024

BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning.
Inf. Softw. Technol., March, 2024

2023
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
Internet Things, December, 2023

Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism.
Comput. Secur., September, 2023

ELI: an IoT-aware big data pipeline with data curation and data quality.
PeerJ Comput. Sci., 2023

Feature models to boost the vulnerability management process.
J. Syst. Softw., 2023

Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based Methodology.
Proceedings of the Advanced Information Systems Engineering, 2023

2022
A domain-specific language for the specification of UCON policies.
J. Inf. Secur. Appl., 2022

Smart Contract Languages: A Multivocal Mapping Study.
ACM Comput. Surv., 2022

Reasoning on the usage control security policies over data artifact business process models.
Comput. Sci. Inf. Syst., 2022

Advisory: vulnerability analysis in software development project dependencies.
Proceedings of the SPLC '22: 26th ACM International Systems and Software Product Line Conference, Graz, Austria, September 12, 2022

Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops, 2022

2021
Data curation in the Internet of Things: A decision model approach.
Comput. Math. Methods, November, 2021

Blockchain-based federation of wireless sensor nodes.
J. Supercomput., 2021

Empowering conformance checking using Big Data through horizontal decomposition.
Inf. Syst., 2021

Discovering configuration workflows from existing logs using process mining.
Empir. Softw. Eng., 2021

DMN4DQ: When data quality meets DMN.
Decis. Support Syst., 2021

CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021

A NLP-Oriented Methodology to Enhance Event Log Quality.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2021

CC4Spark: Distributing event logs and big complex conformance checking problems.
Proceedings of the Best Dissertation Award, Doctoral Consortium, and Demonstration & Resources Track at BPM 2021 co-located with 19th International Conference on Business Process Management (BPM 2021), Rome, Italy, September 6th - to, 2021

Enabling Process Mining in Airbus Manufacturing.
Proceedings of the Business Process Management Cases Vol. 2, Digital Transformation, 2021

2020
Measuring data-centre workflows complexity through process mining: the Google cluster case.
J. Supercomput., 2020

Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review.
Sensors, 2020

Unleashing Constraint Optimisation Problem solving in Big Data environments.
J. Comput. Sci., 2020

AMADEUS: towards the AutoMAteD secUrity teSting.
Proceedings of the SPLC '20: 24th ACM International Systems and Software Product Line Conference, 2020

Definition and Verification of Security Configurations of Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices.
Entropy, 2019

Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models.
IEEE Access, 2019

Process mining to unleash variability management: discovering configuration workflows using logs.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

CHAMALEON: Framework to improve Data Wrangling with Complex Data.
Proceedings of the 40th International Conference on Information Systems, 2019

Enabling process mining in aircraft manufactures: extracting event logs and discovering processes from complex data.
Proceedings of the Industry Forum at BPM 2019 co-located with 17th International Conference on Business Process Management (BPM 2019), 2019

DMN for Data Quality Measurement and Assessment.
Proceedings of the Business Process Management Workshops, 2019

2017
FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017

2016
OPBUS: A framework for improving the dependability of risk-aware business processes.
AI Commun., 2016

Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps.
Proceedings of the Business Process Management Workshops, 2016

Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models.
Proceedings of the Business Process Management Workshops, 2016

A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models.
Proceedings of the Business Information Systems - 19th International Conference, 2016

2015
Formalization of security patterns as a means to infer security controls in business processes.
Log. J. IGPL, 2015

2013
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach.
Inf. Softw. Technol., 2013

CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper.
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013

2012
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework.
J. Syst. Softw., 2012

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2011
OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011

Contract-based test generation for data flow of business processes using constraint programming.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011

2010
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs.
Proceedings of the SECRYPT 2009, 2009

MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT.
Proceedings of the Computational Science and Its Applications, 2009

2008
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...