In SPAA.
pp. 255-268.
2025
Efficient Annotator Reliability Assessment and Sample Weighting for Knowledge-Based Misinformation Detection on Social Media DOI: 10.18653/v1/2025.findings-naacl.185
In NAACL (Findings).
pp. 3348-3358.
2025
Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242
René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT.
pp. 26:1-26:6.
2025
Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242
René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT.
pp. 26:1-26:6.
2025
Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242
René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT.
pp. 26:1-26:6.
2025
Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242
René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT.
pp. 26:1-26:6.
2025
Towards a Framework for Personal and Domestic Cybersecurity DOI: 10.1145/3773276.3775242
René Palacio, R., Santos-Olmo Parra, A., Fernández-Medina Patón, E.
In BDCAT.
pp. 26:1-26:6.
2025
Sánchez Crespo, L., Santos-Olmo Parra, A., García Rosado, D., Fernández-Medina Patón, E.
In 2024 IEEE Biennial Congress of Argentina (ARGENCON).
San Nicolás de los Arroyos, Argentina, ES. pp. 1-8.
2024
SIEM-SC: Cost analysis of security policies in SIEM events from the sustainability point of view,SIEM-SC: Análisis del coste de las políticas de seguridad en los eventos de un SIEM desde el punto de vista de la sostenibilidad DOI: 10.1109/ici2st62251.2023.00023
Sánchez Crespo, L.
In 2023 Fourth International Conference on Information Systems and Software Technologies (ICI2ST).
Quito, Ecuador, ES. pp. 112-119.
2023
DC and RF Reliability Assessment of 5G-MMW capable GaN HEMT Process (Invited) DOI: 10.1109/irps48227.2022.9764539
In IRPS.
pp. 11-.
2022
DC and RF Reliability Assessment of 5G-MMW capable GaN HEMT Process (Invited) DOI: 10.1109/irps48227.2022.9764539
In IRPS.
pp. 11-.
2022
Integrated requirements engineering framework with intelligent systems and semantic reasoning for the extraction of application vocabularies WEB
Corral , A., Sánchez Crespo, L., Antonelli , L.
In Decisioning 2022.
La Plata, AR. pp. 197-200.
2022
Logibot: Investigating Engagement and Development of Computational Thinking Through Virtual Reality DOI: 10.23919/ilrn52045.2021.9459352
In iLRN.
pp. 1-5.
Logibot: Investigating Engagement and Development of Computational Thinking Through Virtual Reality DOI: 10.23919/ilrn52045.2021.9459352
In iLRN.
pp. 1-5.
A Security Pattern to Incorporate Blockchain in Big Data Ecosystems WEB
Moreno García-Nieto, J., Fernandez , E., Fernández-Medina Patón, E., Serrano Martín, M.
In EuroPLoP'19 - 24th European Conference on Pattern Languages of Programs.
Irsee, DE. pp. 1-10.
2019
Fernández-Medina Patón, E.
In Encyclopedia of Database Systems (2nd ed.).
2018
Fernández-Medina Patón, E.
In Encyclopedia of Database Systems (2nd ed.).
2018
Blanco Bueno, C.
In Lecture Notes in Computer Science.
, ES. pp. 41-57.
2018
How the Conceptual Modelling Improves the Security on Document Databases DOI: 10.1007/978-3-030-00847-5\_36
Blanco Bueno, C., Peral , J., Maté , A., Fernández-Medina Patón, E.
In Lecture Notes in Computer Science.
, ES. pp. 497-504.
2018
How the conceptual modelling improves the security on document databases DOI: 10.1007/978-3-030-00847-5_36
García Saiz, D., Peral , J., Maté , A., Fernández-Medina Patón, E.
In ER.
pp. 497-504.
2018
How the conceptual modelling improves the security on document databases DOI: 10.1007/978-3-030-00847-5_36
García Saiz, D., Peral , J., Maté , A., Fernández-Medina Patón, E.
In ER.
pp. 497-504.
2018
The Electroencephalogram as a Biomarker Based on Signal Processing Using Nonlinear Techniques to Detect Dementia DOI: 10.1007/978-3-319-78605-6_11
Guerra , L., Lanzarini , L., Sánchez Crespo, L.
In Smart Innovation, Systems and Technologies.
Salinas, ES. pp. 135-150.
A scalable infrastructure for teaching concepts of programming languages in Scala with WebLab: an experience report DOI: 10.1145/2998392.2998402
In SCALA@SPLASH.
pp. 65-74.
2016
A scalable infrastructure for teaching concepts of programming languages in Scala with WebLab: an experience report DOI: 10.1145/2998392.2998402
In SCALA@SPLASH.
pp. 65-74.
2016
ImmPort: Shared research data for bioinformatics and immunology DOI: 10.1109/bibm.2015.7359752
In BIBM.
pp. 607-610.
2015
ImmPort: Shared research data for bioinformatics and immunology DOI: 10.1109/bibm.2015.7359752
In BIBM.
pp. 607-610.
2015
Shei , S., Márquez Alcañiz, L., Mouratidis , H., García Rosado, D., Fernández-Medina Patón, E.
In ESPRE.
pp. 19-24.
2015
Shei , S., Márquez Alcañiz, L., Mouratidis , H., García Rosado, D., Fernández-Medina Patón, E.
In ESPRE.
pp. 19-24.
2015
A Framework for Secure Migration Processes of Legacy Systems to the Cloud DOI: 10.1007/978-3-319-19243-7_46
Márquez Alcañiz, L., García Rosado, D., Mouratidis , H., Mellado , D., Fernández-Medina Patón, E.
In CAiSE Workshops.
pp. 507-517.
A Framework for Secure Migration Processes of Legacy Systems to the Cloud DOI: 10.1007/978-3-319-19243-7_46
Márquez Alcañiz, L., García Rosado, D., Mouratidis , H., Mellado , D., Fernández-Medina Patón, E.
In CAiSE Workshops.
pp. 507-517.
Modelling secure cloud systems based on system requirements WEB
Fernández-Medina Patón, E.
In 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
Ottawa, ON, Canada, ES. pp. 19-24.
Smartphone Application for Quantitative Measurement of Parkinson Tremors DOI: 10.1007/978-3-319-13117-7_200
Enrique Figueras, G., , P., , H., , M., , C., , G., , M., , P., , R., , A., , S.
In IFMBE Proceedings.
, ES. pp. 785-788.
2014
A Kinect Based Approach to Assist in the Diagnosis and Quantification of Parkinson's Disease DOI: 10.1007/978-3-319-13117-7_118
Torres , R., , H., , C., , G., , S., , R., , E.
In IFMBE Proceedings.
, ES. pp. 461-464.
2014
Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037
Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In 11th International Workshop on Security in Information Systems (WOSIS 2014).
Lisboa, ES. pp. 26-37.
2014
Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037
Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In WOSIS.
pp. 26-37.
2014
Security in legacy systems migration to the cloud: A systematic mapping study DOI: 10.5220/0004979900260037
Márquez Alcañiz, L., García Rosado, D., Mellado , D., Fernández-Medina Patón, E.
In WOSIS.
pp. 26-37.
2014
A model driven approach for automatically improving OLAP legacy applications with security WEB
Blanco Bueno, C., Trujillo Mondéjar, J.
In 10th International Workshop on Security in Information Systems.
Angers, France, ES. pp. 76-85.
2013
Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs
Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS.
pp. 159-166.
2011
Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs
Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS.
pp. 159-166.
2011
Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs
Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS.
pp. 159-166.
2011
Automated security metrics in ISMSs to discover the level of security of OSs and DBMSs
Santos-Olmo Parra, A., Sánchez Crespo, L., Fernández-Medina Patón, E.
In WOSIS.
pp. 159-166.
2011
Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66
Garzás Parra, J., Fernández-Medina Patón, E.
In Advanced Infomration Systemas Engineering Workshops (CAISE 2011).
Londres, GB. pp. 652-659.
2011
Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66
Garzás Parra, J., Fernández-Medina Patón, E.
In CAiSE Workshops.
pp. 652-659.
2011
Analysis of Application of Security Patterns to Build Secure Systems DOI: 10.1007/978-3-642-22056-2_66
Garzás Parra, J., Fernández-Medina Patón, E.
In CAiSE Workshops.
pp. 652-659.
2011
Security pattern mining: Systematic review and proposal
Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011).
Beijing, ES. pp. 13-24.
2011
Security pattern mining: Systematic review and proposal
Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In WOSIS.
pp. 13-24.
2011
Security pattern mining: Systematic review and proposal
Moral García, S., Moral Rubio, S., Fernández-Medina Patón, E.
In WOSIS.
pp. 13-24.
2011
Towards a pattern-based security methodology to build secure information systems
Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011).
Beijing, ES. pp. 59-69.
2011
Towards a pattern-based security methodology to build secure information systems
Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In WOSIS.
pp. 59-69.
2011
Towards a pattern-based security methodology to build secure information systems
Moral Rubio, S., Garzás Parra, J., Fernández-Medina Patón, E.
In WOSIS.
pp. 59-69.
2011
A comparative review of cloud security proposals with ISO/IEC 27002
Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In 8th International Workshop on Security in Information Systems (WOSIS 2011).
Beijing, ES. pp. 3-12.
2011
A comparative review of cloud security proposals with ISO/IEC 27002
Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In WOSIS.
pp. 3-12.
2011
A comparative review of cloud security proposals with ISO/IEC 27002
Rebollo , O., Mellado , D., Fernández-Medina Patón, E.
In WOSIS.
pp. 3-12.
2011
Comparative Analysis of Information Security Governance Frameworks: A Public Sector Approach DOI: 10.13225/j.cnki.jccs.2011.03.030
In The Proceedings of the 11th European Conference on eGovernment (ECEG 2011).
Ljubljana, ES. pp. 482-490.
2011
Fernández-Medina Patón, E., Jurjens , J.
In Lecture Notes in Computer Science.
, ES. pp. 101-112.
2010
Fernández-Medina Patón, E., Jurjens , J.
In Secure Data Management.
pp. 101-112.
2010
Fernández-Medina Patón, E., Jurjens , J.
In Secure Data Management.
pp. 101-112.
2010
Model driven development of secure XML data warehouses: A case study DOI: 10.1145/1754239.1754251
Vela , B., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT Workshops.
2010
Model driven development of secure XML data warehouses: A case study DOI: 10.1145/1754239.1754251
Vela , B., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT Workshops.
2010
Model driven development of secure XML data warehouses: A case study WEB
Blanco Bueno, C., Fernández-Medina Patón, E., Marcos , E.
In EDBT/ICDT '10: EDBT/ICDT '10 joint conference.
Lausanne Switzerland, ES. pp. 1-8.
2010
PROFESSIONAL ORIENTATION IN SOFTWARE ENGINEERING WEB
Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010).
Valencia, ES. pp. 3897-3908.
2010
ORIENTATION OF SECURITY IN THE ACM CURRICULA WEB
Sánchez Crespo, L., Fernández-Medina Patón, E., Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010).
Valencia, ES. pp. 5416-5422.
2010
SOFTWARE SECURITY. AN INDISPENSABLE SUBJECT FOR A SOFTWARE ENGINEER WEB
Sánchez Crespo, L., Fernández-Medina Patón, E., Piattini Velthuis, M.
In Internatinal Technology, Education and Development Conference (INTED 2010).
Valencia, ES. pp. 5423-5433.
2010
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009
In INSTICC Press.
2009
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009
In INSTICC Press.
2009
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2009
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2009
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros
García Rosado, D., Fernández-Medina Patón, E.
In JISBD.
pp. 331-342.
2009
Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros
García Rosado, D., Fernández-Medina Patón, E.
In JISBD.
pp. 331-342.
2009
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM
Fernández-Medina Patón, E.
In JISBD.
pp. 146-157.
2009
Reingeniería sobre Almacenes de Datos Seguros aplicando ADM
Fernández-Medina Patón, E.
In JISBD.
pp. 146-157.
2009
Blanco Bueno, C., Pérez del Castillo, R., Hernandez , A., Fernández-Medina Patón, E., Trujillo Mondéjar, J.
In Lecture Notes in Computer Science.
, ES. pp. 24-35.
2009
García Rosado, D., Fernández-Medina Patón, E.
In SESS@ICSE.
pp. 1-8.
2009
García Rosado, D., Fernández-Medina Patón, E.
In SESS@ICSE.
pp. 1-8.
2009
Towards framework definition to obtain secure business process from legacy information systems WEB
Fernández-Medina Patón, E.
In CIKM '09: Conference on Information and Knowledge Management.
Hong Kong China, ES. pp. 17-24.
2009
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros
García Rosado, D., Fernández-Medina Patón, E.
In IDEAS 2009: XII Conferencias Iberoamericanas de Ingeniería de Requisitos y Ambientes de Software.
Medellín, CO. pp. 388-393.
2009
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros
García Rosado, D., Fernández-Medina Patón, E.
In CIbSE.
pp. 388-393.
2009
Reutilización de Casos de Uso en el Desarrollo de Sistemas Grid seguros
García Rosado, D., Fernández-Medina Patón, E.
In CIbSE.
pp. 388-393.
2009
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008
In INSTICC Press.
2008
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008
In INSTICC Press.
2008
SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2008
SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2008
Automatic Generation of Secure Multidimensional Code for Data Warehouses:
An MDA Approach WEB
Blanco Bueno, C., García Rodríguez de Guzmán, I., Fernández-Medina Patón, E., Trujillo Mondéjar, J., Piattini Velthuis, M.
In Lecture Notes in Computer Science.
Menterrey, ES. pp. 1052-1068.
2008
Towards security requirements management for software product lines: A security domain requirements engineering process DOI: 10.1016/j.csi.2008.03.004
Mellado , D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In .
Towards security requirements management for software product lines: A security domain requirements engineering process DOI: 10.1016/j.csi.2008.03.004
Mellado , D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In .
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007
In INSTICC Press.
2007
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007
In INSTICC Press.
2007
SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2007
SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2007
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006
In INSTICC Press.
2006
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006
In INSTICC Press.
2006
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2006
SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
In INSTICC Press.
2006
Secure Information Systems Development
Mellado Fernández, D., Fernández-Medina Patón, E., Piattini Velthuis, M.
In SECRYPT 2006: International Conference on Security and Cryptography.
Setúbal, PT. pp. 467-470.
2006
QACTIS-based Question Answering at TREC 2005
In TREC.
2005
QACTIS-based Question Answering at TREC 2005
In TREC.
2005
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005
In INSTICC Press.
2005
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005
In INSTICC Press.
2005
A Web-Based Infrastructure for the Management of Semantic Meta-Data DOI: 10.1109/iceccs.2004.1310916
In ICECCS.
pp. 181-190.
2004
A Web-Based Infrastructure for the Management of Semantic Meta-Data DOI: 10.1109/iceccs.2004.1310916
In ICECCS.
pp. 181-190.
2004
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004
In INSTICC Press.
2004
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004
In INSTICC Press.
2004
Fernández-Medina Patón, E., De Capitani di Vimercati, S.
In OTM Workshops.
pp. 741-753.
2003
Fernández-Medina Patón, E., De Capitani di Vimercati, S.
In OTM Workshops.
pp. 741-753.
2003
In ICSE.
pp. 155-165.
2002
In ICSE.
pp. 155-165.
2002
Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002
In ICEIS Press.
2002
Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002
In ICEIS Press.
2002
Access Control of SVG Documents
Damiani , E., De Capitani di Vimercati, S., Fernández-Medina Patón, E., Samarati , P.
In DBSec.
pp. 219-230.
2002
Access Control of SVG Documents
Damiani , E., De Capitani di Vimercati, S., Fernández-Medina Patón, E., Samarati , P.
In DBSec.
pp. 219-230.
2002
Issues in Analyzing the Behavior of Event Dispatching Systems
In IWSSD.
pp. 95-104.
2000
Issues in Analyzing the Behavior of Event Dispatching Systems
In IWSSD.
pp. 95-104.
2000
Analyzing the Behavior of Event Dispatching Systems through Simulation DOI: 10.1007/3-540-44467-x_12
In HiPC.
pp. 131-140.
2000
Analyzing the Behavior of Event Dispatching Systems through Simulation DOI: 10.1007/3-540-44467-x_12
In HiPC.
pp. 131-140.
2000
First Test Results of System Level Fault Tolerant Design Validation Through Laser Fault Injection DOI: 10.1109/iccd.1997.628919
In ICCD.
pp. 544-548.
1997
First Test Results of System Level Fault Tolerant Design Validation Through Laser Fault Injection DOI: 10.1109/iccd.1997.628919
In ICCD.
pp. 544-548.
1997