[PDF][PDF] Using electronic design automation and guided inquiry learning model in higher engineering education
Electronic design automation software is a part of software learning. This study uses digital
electronic circuit design software as learning media, namely, Electronic Design Automation …
electronic circuit design software as learning media, namely, Electronic Design Automation …
C3-Sex: A Conversational Agent to Detect Online Sex Offenders
JI Rodríguez, SR Durán, D Díaz-López… - Electronics, 2020 - mdpi.com
Prevention of cybercrime is one of the missions of Law Enforcement Agencies (LEA) aiming
to protect and guarantee sovereignty in the cyberspace. In this regard, online sex crimes are …
to protect and guarantee sovereignty in the cyberspace. In this regard, online sex crimes are …
Dynamic counter-measures for risk-based access control systems: An evolutive approach
D Díaz-López, G Dólera-Tormo… - Future Generation …, 2016 - Elsevier
Risk-based access control systems are a new element in access control categories,
incorporating risk analysis as part of the inputs to consider when taking an authorization …
incorporating risk analysis as part of the inputs to consider when taking an authorization …
PALOT: Profiling and authenticating users leveraging internet of things
Continuous authentication was introduced to propose novel mechanisms to validate users'
identity and address the problems and limitations exposed by traditional techniques …
identity and address the problems and limitations exposed by traditional techniques …
On the way to automatic exploitation of vulnerabilities and validation of systems security through security chaos engineering
Software is behind the technological solutions that deliver many services to our society,
which means that software security should not be considered a desirable feature anymore …
which means that software security should not be considered a desirable feature anymore …
Nothing to hide? On the security and privacy threats beyond open data
People's online activity continuously dumps personally identifiable information on the web.
Alarmingly, this public information becomes a dangerous cyberweapon in the era of finely …
Alarmingly, this public information becomes a dangerous cyberweapon in the era of finely …
Job satisfaction strategies to improve performance of small businesses
A Abubaha - 2019 - search.proquest.com
Small business leaders continually face challenges due to limited resources and lack of
employees' engagement. Only 78% of new small businesses survive 1 year after …
employees' engagement. Only 78% of new small businesses survive 1 year after …
Strategies to improve job satisfaction and reduce voluntary employee turnover of nurses
S Proctor - 2017 - search.proquest.com
Job satisfaction and employee turnover affect the health care industry in the form of
overworked staff, inadequate health care, and loss of profits. In 2015, the United States …
overworked staff, inadequate health care, and loss of profits. In 2015, the United States …
ChaosXploit: A Security Chaos Engineering framework based on Attack Trees
S Palacios, D Díaz-López, P Nespoli - 2022 - pure.urosario.edu.co
Security incidents may have several origins. However, many times they are caused due to
components that are supposed to be correctly configured or deployed. Traditional methods …
components that are supposed to be correctly configured or deployed. Traditional methods …
A new three party key establishment scheme: Applicable for internet-enabled sensor networks
Abstract Internet-Enabled Sensor Networks (IESNs) play an important role in Internet-of-
Things (IoT) which usually need key establishment and secure communication. In this paper …
Things (IoT) which usually need key establishment and secure communication. In this paper …