Angel Jesus Varela-Vaca
Orcid: 0000-0001-9953-6005
According to our database1,
Angel Jesus Varela-Vaca
authored at least 54 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Int. J. Inf. Sec., February, 2025
2024
Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case.
Internet Things, April, 2024
BIGOWL4DQ: Ontology-driven approach for Big Data quality meta-modelling, selection and reasoning.
Inf. Softw. Technol., March, 2024
J. Inf. Secur. Appl., 2024
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT).
Comput. Secur., 2024
2023
Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning.
Internet Things, December, 2023
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism.
Comput. Secur., September, 2023
PeerJ Comput. Sci., 2023
Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based Methodology.
Proceedings of the Advanced Information Systems Engineering, 2023
2022
J. Inf. Secur. Appl., 2022
Reasoning on the usage control security policies over data artifact business process models.
Comput. Sci. Inf. Syst., 2022
Proceedings of the SPLC '22: 26th ACM International Systems and Software Product Line Conference, Graz, Austria, September 12, 2022
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops, 2022
2021
Comput. Math. Methods, November, 2021
Inf. Syst., 2021
Empir. Softw. Eng., 2021
CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems.
Comput. Ind., 2021
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2021
Proceedings of the Best Dissertation Award, Doctoral Consortium, and Demonstration & Resources Track at BPM 2021 co-located with 19th International Conference on Business Process Management (BPM 2021), Rome, Italy, September 6th - to, 2021
Proceedings of the Business Process Management Cases Vol. 2, Digital Transformation, 2021
2020
Measuring data-centre workflows complexity through process mining: the Google cluster case.
J. Supercomput., 2020
Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review.
Sensors, 2020
J. Comput. Sci., 2020
Proceedings of the SPLC '20: 24th ACM International Systems and Software Product Line Conference, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices.
Entropy, 2019
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models.
IEEE Access, 2019
Process mining to unleash variability management: discovering configuration workflows using logs.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
Enabling process mining in aircraft manufactures: extracting event logs and discovering processes from complex data.
Proceedings of the Industry Forum at BPM 2019 co-located with 17th International Conference on Business Process Management (BPM 2019), 2019
Proceedings of the Business Process Management Workshops, 2019
2017
FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017
2016
AI Commun., 2016
Proceedings of the Business Process Management Workshops, 2016
Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models.
Proceedings of the Business Process Management Workshops, 2016
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models.
Proceedings of the Business Information Systems - 19th International Conference, 2016
2015
Formalization of security patterns as a means to infer security controls in business processes.
Log. J. IGPL, 2015
2013
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach.
Inf. Softw. Technol., 2013
CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper.
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013
2012
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework.
J. Syst. Softw., 2012
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
2011
OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011
Contract-based test generation for data flow of business processes using constraint programming.
Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, 2011
2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Computational Science and Its Applications, 2009
2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets.
Proceedings of the Second International Conference on Emerging Security Information, 2008