Luis Enrique Sánchez Crespo

Orcid: 0000-0003-0086-1065

According to our database1, Luis Enrique Sánchez Crespo authored at least 35 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024

Maritime cybersecurity: protecting digital seas.
Int. J. Inf. Sec., April, 2024

Minimizing incident response time in real-world scenarios using quantum computing.
Softw. Qual. J., March, 2024

2023
Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Systematic review of SIEM technology: SIEM-SC birth.
Int. J. Inf. Sec., June, 2023

Modelling language for cyber security incident handling for critical infrastructures.
Comput. Secur., May, 2023

Design of a pollution ontology-based event generation framework for the dynamic application of traffic restrictions.
PeerJ Comput. Sci., 2023

New Frontiers in Security Risk Management.
IT Prof., 2023

Towards a Quantum World in Cybersecurity Land.
Proceedings of the Joint Proceedings of the Workshops, 2023

2022
Building an integrated requirements engineering process based on Intelligent Systems and Semantic Reasoning on the basis of a systematic analysis of existing proposals.
J. Univers. Comput. Sci., 2022

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern.
Comput. Ind., 2022

2021
Security Reference Architecture for Cyber-Physical Systems (CPS).
J. Univers. Comput. Sci., 2021

MARISMA-BiDa pattern: Integrated risk analysis for big data.
Comput. Secur., 2021

CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021

2020
Definition and Verification of Security Configurations of Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2016
Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies.
Future Internet, 2016

Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems.
Future Internet, 2016

The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets.
Future Internet, 2016

2014
Security in information systems: Advances and new challenges.
Comput. Stand. Interfaces, 2014

Considerations Regarding the Creation of a Post-graduate Master's Degree in Free Software.
Proceedings of the Open Source Software: Mobile Open Source Technologies, 2014

2012
Security in Information Systems: New Challenges and Opportunities.
J. Univers. Comput. Sci., 2012

HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management.
J. Univers. Comput. Sci., 2012

2011
Desirable Characteristics for an ISMS oriented to SMEs.
Proceedings of the WOSIS 2011, 2011

Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs.
Proceedings of the WOSIS 2011, 2011

2010
A systematic review of security requirements engineering.
Comput. Stand. Interfaces, 2010

Building ISMS through the Reuse of Knowledge.
Proceedings of the Trust, 2010

Security Culture in Small and Medium-Size Enterprise.
Proceedings of the ENTERprise Information Systems - International Conference, 2010

Managing the Asset Risk of SMEs.
Proceedings of the ARES 2010, 2010

2009
Managing Security and its Maturity in Small and Medium-sized Enterprises.
J. Univers. Comput. Sci., 2009

MMSM-SME: Methodology for the Management of Security and its Maturity in SME.
Proceedings of the Security in Information Systems, 2009

2008
Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.
Proceedings of the SECRYPT 2008, 2008

2007
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises.
Proceedings of the SECRYPT 2007, 2007

Scmm-Tool - Tool for Computer Automation of the Information Security Management Systems.
Proceedings of the ICSOFT 2007, 2007

2006
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises.
Proceedings of the Security in Information Systems, 2006

Practical Approach of a Secure Management System based on ISO/IEC 17799.
Proceedings of the The First International Conference on Availability, 2006


  Loading...