Galleta

Cookies

El sitio web de la UCLM utiliza cookies propias y de terceros con fines técnicos y de análisis.

Aviso de Cookies

Efficient Annotator Reliability Assessment and Sample Weighting for Knowledge-Based Misinformation Detection on Social Media DOI: 10.18653/v1/2025.findings-naacl.185

In NAACL (Findings). pp. 3348-3358.
2025

Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242

René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT. pp. 26:1-26:6.
2025

Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242

René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT. pp. 26:1-26:6.
2025

Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242

René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT. pp. 26:1-26:6.
2025

Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242

René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT. pp. 26:1-26:6.
2025

Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242

René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT. pp. 26:1-26:6.
2025

Towards a Holistic Cybersecurity Framework for e-Governments DOI: 10.1109/argencon62399.2024.10735846

Sánchez Crespo, L., Santos-Olmo Parra, A., García Rosado, D., Fernández-Medina Patón, E.
In 2024 IEEE Biennial Congress of Argentina (ARGENCON). San Nicolás de los Arroyos, Argentina, ES. pp. 1-8.
2024

SIEM-SC: Cost analysis of security policies in SIEM events from the sustainability point of view,SIEM-SC: Análisis del coste de las políticas de seguridad en los eventos de un SIEM desde el punto de vista de la sostenibilidad DOI: 10.1109/ici2st62251.2023.00023

Sánchez Crespo, L.
In 2023 Fourth International Conference on Information Systems and Software Technologies (ICI2ST). Quito, Ecuador, ES. pp. 112-119.
2023

Integrated requirements engineering framework with intelligent systems and semantic reasoning for the extraction of application vocabularies WEB

Corral , A., Sánchez Crespo, L., Antonelli , L.
In Decisioning 2022. La Plata, AR. pp. 197-200.
2022

A Security Pattern to Incorporate Blockchain in Big Data Ecosystems WEB

Moreno García-Nieto, J., Fernandez , E., Fernández-Medina Patón, E., Serrano Martín, M.
In EuroPLoP'19 - 24th European Conference on Pattern Languages of Programs. Irsee, DE. pp. 1-10.
2019

Mortadelo: A Model-Driven Framework for NoSQL Database Design DOI: 10.1007/978-3-030-00856-7\_3

Blanco Bueno, C.
In Lecture Notes in Computer Science. , ES. pp. 41-57.
2018

How the Conceptual Modelling Improves the Security on Document Databases DOI: 10.1007/978-3-030-00847-5\_36

Blanco Bueno, C., Peral , J., Maté , A., Fernández-Medina Patón, E.
In Lecture Notes in Computer Science. , ES. pp. 497-504.
2018

How the conceptual modelling improves the security on document databases DOI: 10.1007/978-3-030-00847-5_36

García Saiz, D., Peral , J., Maté , A., Fernández-Medina Patón, E.
In ER. pp. 497-504.
2018

How the conceptual modelling improves the security on document databases DOI: 10.1007/978-3-030-00847-5_36

García Saiz, D., Peral , J., Maté , A., Fernández-Medina Patón, E.
In ER. pp. 497-504.
2018

The Electroencephalogram as a Biomarker Based on Signal Processing Using Nonlinear Techniques to Detect Dementia DOI: 10.1007/978-3-319-78605-6_11

Guerra , L., Lanzarini , L., Sánchez Crespo, L.
In Smart Innovation, Systems and Technologies. Salinas, ES. pp. 135-150.
2018 PDF

A scalable infrastructure for teaching concepts of programming languages in Scala with WebLab: an experience report DOI: 10.1145/2998392.2998402

In SCALA@SPLASH. pp. 65-74.
2016

A scalable infrastructure for teaching concepts of programming languages in Scala with WebLab: an experience report DOI: 10.1145/2998392.2998402

In SCALA@SPLASH. pp. 65-74.
2016

Modelling secure cloud systems based on system requirements DOI: 10.1109/espre.2015.7330163

Shei , S., Márquez Alcañiz, L., Mouratidis , H., García Rosado, D., Fernández-Medina Patón, E.
In ESPRE. pp. 19-24.
2015

Modelling secure cloud systems based on system requirements DOI: 10.1109/espre.2015.7330163

Shei , S., Márquez Alcañiz, L., Mouratidis , H., García Rosado, D., Fernández-Medina Patón, E.
In ESPRE. pp. 19-24.
2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud DOI: 10.1007/978-3-319-19243-7_46

Márquez Alcañiz, L., García Rosado, D., Mouratidis , H., Mellado , D., Fernández-Medina Patón, E.
In CAiSE Workshops. pp. 507-517.
2015 PDF

A Framework for Secure Migration Processes of Legacy Systems to the Cloud DOI: 10.1007/978-3-319-19243-7_46

Márquez Alcañiz, L., García Rosado, D., Mouratidis , H., Mellado , D., Fernández-Medina Patón, E.
In CAiSE Workshops. pp. 507-517.
2015 PDF

Modelling secure cloud systems based on system requirements WEB

Fernández-Medina Patón, E.
In 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Ottawa, ON, Canada, ES. pp. 19-24.
2015 PDF

Smartphone Application for Quantitative Measurement of Parkinson Tremors DOI: 10.1007/978-3-319-13117-7_200

Enrique Figueras, G., , P., , H., , M., , C., , G., , M., , P., , R., , A., , S.
In IFMBE Proceedings. , ES. pp. 785-788.
2014

A Kinect Based Approach to Assist in the Diagnosis and Quantification of Parkinson's Disease DOI: 10.1007/978-3-319-13117-7_118

Torres , R., , H., , C., , G., , S., , R., , E.
In IFMBE Proceedings. , ES. pp. 461-464.
2014

Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037

Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In 11th International Workshop on Security in Information Systems (WOSIS 2014). Lisboa, ES. pp. 26-37.
2014

Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037

Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In WOSIS. pp. 26-37.
2014

Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037

Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In WOSIS. pp. 26-37.
2014

A model driven approach for automatically improving OLAP legacy applications with security WEB

Blanco Bueno, C., Trujillo Mondéjar, J.
In 10th International Workshop on Security in Information Systems. Angers, France, ES. pp. 76-85.
2013

Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs

Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS. pp. 159-166.
2011

Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs

Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS. pp. 159-166.
2011

Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs

Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS. pp. 159-166.
2011

Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs

Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS. pp. 159-166.
2011

Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66

Garzás Parra, J., Fernández-Medina Patón, E.
In Advanced Infomration Systemas Engineering Workshops (CAISE 2011). Londres, GB. pp. 652-659.
2011

Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66

Garzás Parra, J., Fernández-Medina Patón, E.
In CAiSE Workshops. pp. 652-659.
2011

Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66

Garzás Parra, J., Fernández-Medina Patón, E.
In CAiSE Workshops. pp. 652-659.
2011

Security pattern mining: Systematic review and proposal

Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011). Beijing, ES. pp. 13-24.
2011

Security pattern mining: Systematic review and proposal

Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In WOSIS. pp. 13-24.
2011

Security pattern mining: Systematic review and proposal

Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In WOSIS. pp. 13-24.
2011

Towards a pattern-based security methodology to build secure information systems

Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011). Beijing, ES. pp. 59-69.
2011

Towards a pattern-based security methodology to build secure information systems

Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In WOSIS. pp. 59-69.
2011

Towards a pattern-based security methodology to build secure information systems

Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In WOSIS. pp. 59-69.
2011

A comparative review of cloud security proposals with ISO/IEC 27002

Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011). Beijing, ES. pp. 3-12.
2011

A comparative review of cloud security proposals with ISO/IEC 27002

Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In WOSIS. pp. 3-12.
2011

A comparative review of cloud security proposals with ISO/IEC 27002

Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In WOSIS. pp. 3-12.
2011

Comparative Analysis of Information Security Governance Frameworks: A Public Sector Approach DOI: 10.13225/j.cnki.jccs.2011.03.030

In The Proceedings of the 11th European Conference on eGovernment (ECEG 2011). Ljubljana, ES. pp. 482-490.
2011

Towards the Secure Modelling of OLAP Users' Behaviour DOI: 10.1007/978-3-642-15546-8_8

Fernández-Medina Patón, E., Jurjens , J.
In Lecture Notes in Computer Science. , ES. pp. 101-112.
2010

Towards the Secure Modelling of OLAP Users' Behaviour DOI: 10.1007/978-3-642-15546-8_8

Fernández-Medina Patón, E., Jurjens , J.
In Secure Data Management. pp. 101-112.
2010

Towards the Secure Modelling of OLAP Users' Behaviour DOI: 10.1007/978-3-642-15546-8_8

Fernández-Medina Patón, E., Jurjens , J.
In Secure Data Management. pp. 101-112.
2010

Model driven development of secure XML data warehouses: A case study DOI: 10.1145/1754239.1754251

Vela , B., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT Workshops.
2010

Model driven development of secure XML data warehouses: A case study DOI: 10.1145/1754239.1754251

Vela , B., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT Workshops.
2010

Model driven development of secure XML data warehouses: A case study WEB

Blanco Bueno, C., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT '10: EDBT/ICDT '10 joint conference. Lausanne Switzerland, ES. pp. 1-8.
2010

PROFESSIONAL ORIENTATION IN SOFTWARE ENGINEERING WEB

Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010). Valencia, ES. pp. 3897-3908.
2010

ORIENTATION OF SECURITY IN THE ACM CURRICULA WEB

Sánchez Crespo, L., Fernández-Medina Patón, E., Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010). Valencia, ES. pp. 5416-5422.
2010

SOFTWARE SECURITY. AN INDISPENSABLE SUBJECT FOR A SOFTWARE ENGINEER WEB

Sánchez Crespo, L., Fernández-Medina Patón, E., Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010). Valencia, ES. pp. 5423-5433.
2010

Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009

In INSTICC Press.
2009

Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009

In INSTICC Press.
2009

SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2009

SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros

García Rosado, D., Fernández-Medina Patón, E.
In JISBD. pp. 331-342.
2009

Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros

García Rosado, D., Fernández-Medina Patón, E.
In JISBD. pp. 331-342.
2009

Reingeniería sobre Almacenes de Datos Seguros aplicando ADM

Fernández-Medina Patón, E.
In JISBD. pp. 146-157.
2009

Reingeniería sobre Almacenes de Datos Seguros aplicando ADM

Fernández-Medina Patón, E.
In JISBD. pp. 146-157.
2009

Towards a Modernization Process for Secure Data Warehouses DOI: 10.1007/978-3-642-03730-6\_3

Blanco Bueno, C., Pérez del Castillo, R., Hernandez , A., Fernández-Medina Patón, E., Trujillo Mondéjar, J.
In Lecture Notes in Computer Science. , ES. pp. 24-35.
2009

Reusable Security Use Cases for Mobile Grid environments DOI: 10.1109/iwsess.2009.5068452

García Rosado, D., Fernández-Medina Patón, E.
In SESS@ICSE. pp. 1-8.
2009

Reusable Security Use Cases for Mobile Grid environments DOI: 10.1109/iwsess.2009.5068452

García Rosado, D., Fernández-Medina Patón, E.
In SESS@ICSE. pp. 1-8.
2009

Towards framework definition to obtain secure business process from legacy information systems WEB

Fernández-Medina Patón, E.
In CIKM '09: Conference on Information and Knowledge Management. Hong Kong China, ES. pp. 17-24.
2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros

García Rosado, D., Fernández-Medina Patón, E.
In IDEAS 2009: XII Conferencias Iberoamericanas de Ingeniería de Requisitos y Ambientes de Software. Medellín, CO. pp. 388-393.
2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros

García Rosado, D., Fernández-Medina Patón, E.
In CIbSE. pp. 388-393.
2009

Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros

García Rosado, D., Fernández-Medina Patón, E.
In CIbSE. pp. 388-393.
2009

Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008

In INSTICC Press.
2008

Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008

In INSTICC Press.
2008

SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2008

SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2008

Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach WEB

Blanco Bueno, C., García Rodríguez de Guzmán, I., Fernández-Medina Patón, E., Trujillo Mondéjar, J., Piattini Velthuis, M.
In Lecture Notes in Computer Science. Menterrey, ES. pp. 1052-1068.
2008

Towards security requirements management for software product lines: A security domain requirements engineering process DOI: 10.1016/j.csi.2008.03.004

Mellado , D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In .
2008 PDF

Towards security requirements management for software product lines: A security domain requirements engineering process DOI: 10.1016/j.csi.2008.03.004

Mellado , D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In .
2008 PDF

Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007

In INSTICC Press.
2007

Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007

In INSTICC Press.
2007

SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2007

SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2007

Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006

In INSTICC Press.
2006

Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006

In INSTICC Press.
2006

SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2006

SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications

In INSTICC Press.
2006

Secure Information Systems Development

Mellado Fernández, D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In SECRYPT 2006: International Conference on Security and Cryptography. Setúbal, PT. pp. 467-470.
2006

QACTIS-based Question Answering at TREC 2005

In TREC.
2005

QACTIS-based Question Answering at TREC 2005

In TREC.
2005

Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005

In INSTICC Press.
2005

Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005

In INSTICC Press.
2005

Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004

In INSTICC Press.
2004

Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004

In INSTICC Press.
2004

Implementing an Access Control System for SVG Documents DOI: 10.1007/978-3-540-39962-9_75

Fernández-Medina Patón, E., De Capitani di Vimercati, S.
In OTM Workshops. pp. 741-753.
2003

Implementing an Access Control System for SVG Documents DOI: 10.1007/978-3-540-39962-9_75

Fernández-Medina Patón, E., De Capitani di Vimercati, S.
In OTM Workshops. pp. 741-753.
2003

Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002

In ICEIS Press.
2002

Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002

In ICEIS Press.
2002

Access Control of SVG Documents

Damiani , E., De Capitani di Vimercati, S., Fernández-Medina Patón, E., Samarati , P.
In DBSec. pp. 219-230.
2002

Access Control of SVG Documents

Damiani , E., De Capitani di Vimercati, S., Fernández-Medina Patón, E., Samarati , P.
In DBSec. pp. 219-230.
2002

Issues in Analyzing the Behavior of Event Dispatching Systems

In IWSSD. pp. 95-104.
2000

Issues in Analyzing the Behavior of Event Dispatching Systems

In IWSSD. pp. 95-104.
2000

First Test Results of System Level Fault Tolerant Design Validation Through Laser Fault Injection DOI: 10.1109/iccd.1997.628919

In ICCD. pp. 544-548.
1997

First Test Results of System Level Fault Tolerant Design Validation Through Laser Fault Injection DOI: 10.1109/iccd.1997.628919

In ICCD. pp. 544-548.
1997