Browsing by Author "Fernandez-Sanz, Luis"
Now showing 1 - 20 of 21
- Results Per Page
- Sort Options
Article Citation - WoS: 31Citation - Scopus: 54Adopting Automated Whitelist Approach for Detecting Phishing Attacks(Elsevier Advanced Technology, 2021) Azeez, Nureni Ayofe; Misra, Sanjay; Margaret, Ihotu Agbo; Fernandez-Sanz, Luis; Abdulhamid, Shafi'i Muhammad; Computer EngineeringPhishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of quick access time in a real-time environment. However, it has been established that blacklist solution methods offer quick and immediate access time but with a low detection rate. This research paper presents an automated white-list approach for detecting phishing attacks. The white-list is determined by carrying out a detailed analysis between the visual link and the actual link. The similarities of the known trusted site are calculated by juxtaposing the domain name with the contents of the whitelist and later match it with the IP address before a decision is made and further analyzing the actual link and the visual link by calculating the similarities of the known trusted site. The technique then takes a final decision on the extracted information from the hyperlink, which can also be obtained from the web address provided by the user. The experiments carried out provided a very high level of accuracy, specifically, when the dataset was relatively at the lowest level. Six different datasets were used to perform the experiments. The average accuracy obtained after the six experiments was 96.17% and the approach detects phishing sites with a 95.0% true positive rate. It was observed that the level of accuracy varies from one dataset to another. This result shows that the proposed method performs better than similar approaches benchmarked with. The efficiency of the approach was further established through its computation time, memory, bandwidth as well as other computational resources that were utilized with the minimum requirements when compared with other approaches. This solution has provided immense benefits over the existing solutions by reducing the memory requirements and computational complexity, among other benefits. It has also shown that the proposed method can provide more robust detection performances when compared to other techniques. (c) 2021 Elsevier Ltd. All rights reserved.Article Citation - WoS: 32Agriculture 4.0: an Implementation Framework for Food Security Attainment in Nigeria's Post-Covid Era(Ieee-inst Electrical Electronics Engineers inc, 2021) Oruma, Samson O.; Misra, Sanjay; Fernandez-Sanz, Luis; Computer EngineeringThe challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting agriculture 4.0 and commercial farming. Using data from six digital libraries, the Nigerian Bureau of Statistics, and other internet sources, we conducted a Systematic Literature Review (SLR using PRISMA) on Nigeria's agriculture, food security, and agriculture 4.0. Our results show Nigeria's current agricultural state, threats to food security, and modern digital agriculture technologies. We adapted our SLR findings to develop an implementation framework for agriculture 4.0 in solving Nigeria's food insecurity challenge in the post-Covid-19 era. Our proposed framework integrates precision agriculture in Nigeria's food production and the necessary enabling digital technologies in the agri-food supply chain. We analyzed the critical implementation considerations during each agri-food supply chain stage of farming inputs, farming scale, farming approach, farming operation, food processing, food preservation/storage, distribution/logistics, and the final consumers. This study will help researchers, investors, and the government address food security in Nigeria. The implementation of agriculture 4.0 will substantially contribute to SDG 2 (zero hunger), SDG 3 (good health and well-being), and SDG 8 (decent work and economic growth) of #Envision 2030 of the United Nations, for the benefit of Nigeria, Africa, and the entire world.Article Citation - WoS: 5Citation - Scopus: 5Applying Model-Driven Paradigm for the Improvement of Web Requirement Validation(Budapest Tech, 2012) Aragon, Gustavo; Escalona, M. J.; Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer Engineering; Computer EngineeringThis paper proposes an approach for Web requirements validation by applying the model-driven paradigm in classical requirements validation techniques. In particular, we present how the Navigational Development Techniques (NDT) approach exploits the model-driven paradigm to improve its requirements validation task by exploring tool cases that systematize or even automate the application of requirements validation techniques. Our solution is validated by applying it in a real industrial environment. The results and the learned lessons are presented accordingly.Article Citation - WoS: 6Citation - Scopus: 7Automated Recovery and Visualization of Test-To Traceability (tct) Links: an Evaluation(Ieee-inst Electrical Electronics Engineers inc, 2021) Aljawabrah, Nadera; Gergely, Tamas; Misra, Sanjay; Fernandez-Sanz, Luis; Computer EngineeringIn the software development process, traceability links between unit tests and code are not explicitly maintained, and dependencies in most cases are manually identified. As a result, a large amount of effort and time is required during the comprehension process to establish the links between these artifacts. Although there are several methods that can infer such links based on different phenomenons, these methods usually produce different set of traceability links. This work expands upon previous traceability link recovery and visualization studies by implementing a combination of traceability recovery methods that automatically retrieve the links, and visualizing them to help developers to overview the links inferred by various recovery techniques, and also to select the right relations for analyses. The results of the usability study show that the visualization model presented herein can effectively support browsing, comprehension, and maintenance of Test-to Code Traceability (TCT) links in a system with enhanced efficiency, as well as visualization of TCT links from multiple sources is better than a visualization of single source of traceability links.Conference Object Characterizing the Position of Cio(Ieee, 2012) Cano, Carmen; Fernandez-Sanz, Luis; Misra, Sanjay; Department of English Language and Literature; Computer EngineeringThis paper describes how the CIO position appear as a key role in the organizations and which are the requirements for candidates to it. We have compared the requirements presented in different studies in order to know which are the most important for a successful performance as CIO..Conference Object Characterizing the Position of Cio(Aisti-assoc Iberica Sistemas & Tecnologias informacao, 2012) Cano, Carmen; Fernandez-Sanz, Luis; Misra, Sanjay; Computer Engineering; Computer EngineeringThis paper describes how the CIO position appear as a key role in the organizations and which are the requirements for candidates to it. We have compared the requirements presented in different studies in order to know which are the most Important for a successful performance as CIO..Review Citation - WoS: 16Citation - Scopus: 30Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study(Taylor & Francis inc, 2022) Barik, Kousik; Misra, Sanjay; Konar, Karabi; Fernandez-Sanz, Luis; Murat, Koyuncu; Information Systems Engineering; Computer EngineeringCyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on during this period caused information security specialists to improvise the result. The deep learning techniques analyzed in this study are convolution neural networks, recurrent neural networks, and deep neural networks in the context of cybersecurity.A framework is proposed, and a real-time laboratory setup is performed to capture network packets and examine this captured data using various DL techniques. A comparable interpretation is presented under the DL techniques with essential parameters, particularly accuracy, false alarm rate, precision, and detection rate. The DL techniques experimental output projects improvise the performance of various real-time cybersecurity applications on a real-time dataset. CNN model provides the highest accuracy of 98.64% with a precision of 98% with binary class. The RNN model offers the second-highest accuracy of 97.75%. CNN model provides the highest accuracy of 98.42 with multiclass class. The study shows that DL techniques can be effectively used in cybersecurity applications. Future research areas are being elaborated, including the potential research topics to improve several DL methodologies for cybersecurity applications.Review Citation - WoS: 2Citation - Scopus: 8An Empirical Evaluation of Software Quality Assurance Practices and Challenges in a Developing Country: a Comparison of Nigeria and Turkey(Springer international Publishing Ag, 2016) Sowunmi, Olaperi Yeside; Mısra, Sanjay; Misra, Sanjay; Fernandez-Sanz, Luis; Crawford, Broderick; Soto, Ricardo; Mısra, Sanjay; Computer Engineering; Computer EngineeringBackground: The importance of quality assurance in the software development process cannot be overemphasized because its adoption results in high reliability and easy maintenance of the software system and other software products. Software quality assurance includes different activities such as quality control, quality management, quality standards, quality planning, process standardization and improvement amongst others. The aim of this work is to further investigate the software quality assurance practices of practitioners in Nigeria. While our previous work covered areas on quality planning, adherence to standardized processes and the inherent challenges, this work has been extended to include quality control, software process improvement and international quality standard organization membership. It also makes comparison based on a similar study carried out in Turkey. The goal is to generate more robust findings that can properly support decision making by the software community. The qualitative research approach, specifically, the use of questionnaire research instruments was applied to acquire data from software practitioners. Results: In addition to the previous results, it was observed that quality assurance practices are quite neglected and this can be the cause of low patronage. Moreover, software practitioners are neither aware of international standards organizations or the required process improvement techniques; as such their claimed standards are not aligned to those of accredited bodies, and are only limited to their local experience and knowledge, which makes it questionable. The comparison with Turkey also yielded similar findings, making the results typical of developing countries. The research instrument used was tested for internal consistency using the Cronbach's alpha, and it was proved reliable. Conclusion: For the software industry in developing countries to grow strong and be a viable source of external revenue, software assurance practices have to be taken seriously because its effect is evident in the final product. Moreover, quality frameworks and tools which require minimum time and cost are highly needed in these countries.Article Citation - WoS: 4Citation - Scopus: 5Enhancing Misuse Cases With Risk Assessment for Safety Requirements(Ieee-inst Electrical Electronics Engineers inc, 2020) Arogundade, Oluwasefunmi T.; Misra, Sanjay; Abayomi-Alli, Olusola O.; Fernandez-Sanz, Luis; Computer EngineeringRisk-driven requirements elicitation represents an approach that allows assignment of appropriate countermeasure for the protection of the Information System (IS) depending on the risk level. Elicitation of safety requirements based on risk analysis is essential for those IS which will run on the open and dynamic Internet platform. Traditionally, misuse cases are used to find the weak points of an IS but cannot differentiate between the weak point that can lead to lenient hazard and/or serious hazard. In this paper, we present an enhanced misuse case approach to support IS safety risk assessment at the early stages of software process. We extensively examined and identified concepts which constitute a modelling technique for IS safety risk assessment and build a conceptual model for achieving IS safety risk assessment during the requirement analysis phase of software process. The risk assessment process follows an approach of consequential analysis based on misuse cases for safety hazard identification and qualitative risk measurement. The safety requirements are elicited according to the results of the risk assessment. A medical IS is used as a case study to validate the proposed model.Article Citation - WoS: 6Citation - Scopus: 9Experimental Simulation-Based Performance Evaluation of an Sms-Based Emergency Geolocation Notification System(Hindawi Ltd, 2017) Osebor, Isibor; Misra, Sanjay; Omoregbe, Nicholas; Adewumi, Adewole; Fernandez-Sanz, Luis; Computer EngineeringIn an emergency, a prompt response can save the lives of victims. This statement generates an imperative issue in emergency medical services (EMS). Designing a system that brings simplicity in locating emergency scenes is a step towards improving response time. This paper therefore implemented and evaluated the performance of an SMS-based emergency geolocation notification system with emphasis on its SMS delivery time and the system's geolocation and dispatch time. Using the RAS metrics recommended by IEEE for evaluation, the designed system was found to be efficient and effective as its reliability stood within 62.7% to 70.0% while its availability stood at 99% with a downtime of 3.65 days/year.Article Citation - WoS: 7Citation - Scopus: 13An Expert System for the Diagnosis of Sexually Transmitted Diseases - Esstd(Ios Press, 2017) Thompson, Temitope; Sowunmi, Olaperi; Misra, Sanjay; Fernandez-Sanz, Luis; Crawford, Broderick; Soto, Ricardo; Computer EngineeringOver 93 million people get ill with sexually transmitted diseases in sub-Saharan Africa. However, research has shown that people with sexually transmitted diseases find it difficult to share their problem with a physician due to societal discrimination in Africa. Due to this problem, we have implemented a medical expert system for diagnosing sexually transmitted diseases (ESSTD) that maintains the anonymity of the individuals. The patients diagnose themselves by answering questions provided by the system. This paper presents the design and development of the system. Forward chaining rules were used to implement the knowledge base and the system is easily accessible on mobile platforms. The Java Expert System Shell was used for its inference engine and the system was validated by domain experts. It is useful because it helps to maintain anonymity for patients with STD.Article Citation - WoS: 8Citation - Scopus: 18Featuring Cio: Roles, Skills and Soft Skills(Igi Global, 2013) Cano, Carmen; Fernandez-Sanz, Luis; Misra, Sanjay; Computer EngineeringThis paper describes how the CIO (Chief Information Officer) position appears as a key role in the organizations and the requirements for candidates. The authors compare the requirements presented in different studies to know what are the most important skills for a successful performance as a CIO. They stress the importance of non technical skills as key factors for professional performance. The authors have compared soft skills for CIO or equivalent positions and other professional profiles like programmers or analysts using data taken from thousands of job ads. An overview of the most valuable skills (especially soft skills) for CIOS is presented.Conference Object Citation - WoS: 28Influence of Human Factors in Software Quality and Productivity(Springer-verlag Berlin, 2011) Fernandez-Sanz, Luis; Misra, Sanjay; Computer EngineeringTraditionally more effort has been devoted to technical and process aspects of software quality and productivity. However, in an activity like software development so intensive in workforce and so dependent on professionals' performance, it is strange that human and social factors affecting development teams have been attracted little attention. This paper is aimed at analyzing contributions in this area as well as providing empirical data from specific initiatives to know more about real practices and situation in software organizations.Article Citation - WoS: 2Multi-Paradigm Metric and Its Applicability on Java Projects(Budapest Tech, 2013) Misra, Sanjay; Cafer, Ferid; Akman, Ibahim; Fernandez-Sanz, Luis; Physiotherapy Program; Computer EngineeringJAVA is one of the favorite languages amongst software developers. However, the numbers of specific software metrics to evaluate the JAVA code are limited In this paper, we evaluate the applicability of a recently developed multi paradigm metric to JAVA projects. The experimentations show that the Multi paradigm metric is an effective measure for estimating the complexity of the JAVA code/projects, and therefore it can be used for controlling the quality of the projects. We have also evaluated the multi-paradigm metric against the principles of measurement theory.Article Citation - WoS: 30Citation - Scopus: 49Optimizing Green Computing Awareness for Environmental Sustainability and Economic Security as a Stochastic Optimization Problem(Mdpi, 2017) Okewu, Emmanuel; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, Robertas; Fernandez-Sanz, Luis; Computer EngineeringThe role of automation in sustainable development is not in doubt. Computerization in particular has permeated every facet of human endeavour, enhancing the provision of information for decision-making that reduces cost of operation, promotes productivity and socioeconomic prosperity and cohesion. Hence, a new field called information and communication technology for development (ICT4D) has emerged. Nonetheless, the need to ensure environmentally friendly computing has led to this research study with particular focus on green computing in Africa. This is against the backdrop that the continent is feared to suffer most from the vulnerability of climate change and the impact of environmental risk. Using Nigeria as a test case, this paper gauges the green computing awareness level of Africans via sample survey. It also attempts to institutionalize green computing maturity model with a view to optimizing the level of citizens awareness amid inherent uncertainties like low bandwidth, poor network and erratic power in an emerging African market. Consequently, we classified the problem as a stochastic optimization problem and applied metaheuristic search algorithm to determine the best sensitization strategy. Although there are alternative ways of promoting green computing education, the metaheuristic search we conducted indicated that an online real-time solution that not only drives but preserves timely conversations on electronic waste (e-waste) management and energy saving techniques among the citizenry is cutting edge. The authors therefore reviewed literature, gathered requirements, modelled the proposed solution using Universal Modelling Language (UML) and developed a prototype. The proposed solution is a web-based multi-tier e-Green computing system that educates computer users on innovative techniques of managing computers and accessories in an environmentally friendly way. We found out that such a real-time web-based interactive forum does not only stimulate the interest of the common man in environment-related issues, but also raises awareness about the impact his computer-related activities have on mother earth. This way, he willingly becomes part of the solution to environment degradation in his circle of influence.Article Citation - WoS: 10PRACTICAL APPLICATION OF UML ACTIVITY DIAGRAMS FOR THE GENERATION OF TEST CASES(Editura Acad Romane, 2012) Fernandez-Sanz, Luis; Misra, Sanjay; Computer EngineeringSoftware testing and debugging represents around one third of total effort in development projects. Different factors which have influence on poor practices of testing have been identified through specific surveys. Amongst several, one of the most important is the lack of efficient methods to exploit development models for generating test cases. This paper presents a new method for automatically generating a complete set of functional test cases from UML activity diagrams complementing specification of use cases. Test cases are prioritized according to software risk information. Results from experiences with more than 70 software professionals/experts validate benefits of the method. Participants also confirm its interest and effectiveness for testing needs of industry.Article Citation - WoS: 7Citation - Scopus: 6Present and Future of Web Content Accessibility: an Analysis(Univ Osijek, Tech Fac, 2013) Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer Engineering; Computer EngineeringThe Web was created as a universal network of knowledge. It represented a huge qualitative and quantitative leap in terms of acquisition and processing of information. However, even today, significant barriers make difficult the access of a large number of citizens to the web, including disabled users and old people with diminished skills as an effect of age. Accessibility is the feature which facilitates access to and successful usage of a web site or service for as many people as possible, regardless of their personal limitations or limitations imposed by their environment. This article reviews the main aspects of web accessibility and its future, passing through the effective implementation of guidelines known as 2.0, which ensure compliance with existing legislation at national and international level.Article Citation - WoS: 1Citation - Scopus: 2Ronsi: a Framework for Calculating Return on Network Security Investment(Springer, 2023) Barik, Kousik; Misra, Sanjay; Fernandez-Sanz, Luis; Koyuncu, Murat; Information Systems Engineering; Computer EngineeringThis competitive environment is rapidly driving technological modernization. Sophisticated cyber security attacks are expanding exponentially, inflicting reputation damage and financial and economic loss. Since security investments may take time to generate revenues, organizations need more time to convince top management to support them. Even though several ROSI techniques have been put out, they still need to address network-related infrastructure. By addressing gaps in existing techniques, this study delivers a comprehensive framework for calculating Return on Network Security Investment (RONSI). The proposed framework uses a statistical prediction model based on Bayes' theorem to calculate the RONSI. It is validated by Common Vulnerability Security Systems (CVSS) datasets and compared to existing studies. The results demonstrate that the annual loss is reduced to 75% with the proposed RONSI model after implementing a security strategy, and the proposed model is compared with existing studies. An organization can effectively justify investments in network-related infrastructure while enhancing its credibility and dependability in the cutthroat marketplace.Article Citation - WoS: 19Citation - Scopus: 23A Study on the Key Soft Skills for Successful Participation of Students in Multinational Engineering Education(Tempus Publications, 2017) Fernandez-Sanz, Luis; Teresa Villalba, Maria; Amelio Medina, Jose; Misra, Sanjay; Computer Engineering; Computer EngineeringSoft-skills have proved to be a necessary complement to technical skills in today's multinational workplaces. As universities are facing the challenge of promoting internationalization and mobility in students and teachers, they have to decide how to help their students in developing these skills as well as increase their awareness on the cultural differences in multinational settings. After a long trajectory of participation in multinational educational experiences, the authors launched a survey to check if their previous findings on the preferred soft skills by educational experts and managers still remain valid after 5 years. Another goal of the study was the analysis of the link between preference for specific soft skills and cultural background in each country as characterized by Hofstede's indicators. The data collected from 123 experts from 45 different countries have confirmed the existence of a stable core set of preferred soft skills at global level and also for European countries. Results have also shown links between specific cultural indicators and preference for some soft skills.Article Citation - WoS: 35Citation - Scopus: 56A Suite of Object Oriented Cognitive Complexity Metrics(Ieee-inst Electrical Electronics Engineers inc, 2018) Misra, Sanjay; Adewumi, Adewole; Fernandez-Sanz, Luis; Damasevicius, Robertas; Computer EngineeringObject orientation has gained a wide adoption in the software development community. To this end, different metrics that can be utilized in measuring and improving the quality of object-oriented (OO) software have been proposed, by providing insight into the maintainability and reliability of the system. Some of these software metrics are based on cognitive weight and are referred to as cognitive complexity metrics. It is our objective in this paper to present a suite of cognitive complexity metrics that can be used to evaluate OO software projects. The present suite of metrics includes method complexity, message complexity, attribute complexity, weighted class complexity, and code complexity. The metrics suite was evaluated theoretically using measurement theory and Weyuker's properties, practically using Kaner's framework and empirically using thirty projects.
