12 results
Search Results
Now showing 1 - 10 of 12
Article Citation - WoS: 20Citation - Scopus: 24A Study on the Key Soft Skills for Successful Participation of Students in Multinational Engineering Education(Tempus Publications, 2017) Fernandez-Sanz, Luis; Teresa Villalba, Maria; Amelio Medina, Jose; Misra, Sanjay; Computer EngineeringSoft-skills have proved to be a necessary complement to technical skills in today's multinational workplaces. As universities are facing the challenge of promoting internationalization and mobility in students and teachers, they have to decide how to help their students in developing these skills as well as increase their awareness on the cultural differences in multinational settings. After a long trajectory of participation in multinational educational experiences, the authors launched a survey to check if their previous findings on the preferred soft skills by educational experts and managers still remain valid after 5 years. Another goal of the study was the analysis of the link between preference for specific soft skills and cultural background in each country as characterized by Hofstede's indicators. The data collected from 123 experts from 45 different countries have confirmed the existence of a stable core set of preferred soft skills at global level and also for European countries. Results have also shown links between specific cultural indicators and preference for some soft skills.Article Citation - WoS: 2Multi-Paradigm Metric and Its Applicability on Java Projects(Budapest Tech, 2013) Misra, Sanjay; Cafer, Ferid; Akman, Ibahim; Fernandez-Sanz, LuisJAVA is one of the favorite languages amongst software developers. However, the numbers of specific software metrics to evaluate the JAVA code are limited In this paper, we evaluate the applicability of a recently developed multi paradigm metric to JAVA projects. The experimentations show that the Multi paradigm metric is an effective measure for estimating the complexity of the JAVA code/projects, and therefore it can be used for controlling the quality of the projects. We have also evaluated the multi-paradigm metric against the principles of measurement theory.Article Citation - WoS: 7Citation - Scopus: 13An Expert System for the Diagnosis of Sexually Transmitted Diseases - Esstd(Ios Press, 2017) Thompson, Temitope; Sowunmi, Olaperi; Misra, Sanjay; Fernandez-Sanz, Luis; Crawford, Broderick; Soto, RicardoOver 93 million people get ill with sexually transmitted diseases in sub-Saharan Africa. However, research has shown that people with sexually transmitted diseases find it difficult to share their problem with a physician due to societal discrimination in Africa. Due to this problem, we have implemented a medical expert system for diagnosing sexually transmitted diseases (ESSTD) that maintains the anonymity of the individuals. The patients diagnose themselves by answering questions provided by the system. This paper presents the design and development of the system. Forward chaining rules were used to implement the knowledge base and the system is easily accessible on mobile platforms. The Java Expert System Shell was used for its inference engine and the system was validated by domain experts. It is useful because it helps to maintain anonymity for patients with STD.Article Citation - WoS: 10Citation - Scopus: 16A Survey and Meta-Analysis of Application-Layer Distributed Denial-Of Attack(Wiley, 2020) Odusami, Modupe; Misra, Sanjay; Abayomi-Alli, Olusola; Abayomi-Alli, Adebayo; Fernandez-Sanz, LuisBackground One of the significant attacks targeting the application layer is the distributed denial-of-service (DDoS) attack. It degrades the performance of the server by usurping its resources completely, thereby denying access to legitimate users and causing losses to businesses and organizations. Aim This study aims to investigate existing methodologies for application-layer DDoS (APDDoS) attack defense by using specific measures: detection methods/techniques, attack strategy, and feature exploration of existing APDDoS mechanisms. Methodology The review is carried out on a database search of relevant literature in IEEE Xplore, ACM, Science Direct, Springer, Wiley, and Google Search. The search dates to capture journals and conferences are from 2000 to 2019. Review papers that are not in English and not addressing the APDDoS attack are excluded. Three thousand seven hundred eighty-nine studies are identified and streamlined to a total of 75 studies. A quantifiable assessment is performed on the selected articles using six search procedures, namely: source, methods/technique, attack strategy, datasets/corpus, status, detection metric, and feature exploration. Results Based on existing methods/techniques for detection, the results show that machine learning gave the highest proportion with 36%. However, assessment based on attack strategy shows that several studies do not consider an attack form for deploying their solution. Result based on existing features for the APDDoS detection technique shows request stream during a user session and packet pattern gave the highest result with 47%. Unlike packet header information with 33%, request stream during absolute time interval with 12% and web user features 8%. Conclusion Research findings show that a large proportion of the solutions for APDDoS attack detection utilized features based on request stream during user session and packet pattern. The optimization of features will improve detection accuracy. Our study concludes that researchers need to exploit all attack strategies using deep learning algorithms, thus enhancing effective detection of APDDoS attack launch from different botnets.Article Citation - WoS: 8Citation - Scopus: 18Featuring Cio: Roles, Skills and Soft Skills(Igi Global, 2013) Cano, Carmen; Fernandez-Sanz, Luis; Misra, SanjayThis paper describes how the CIO (Chief Information Officer) position appears as a key role in the organizations and the requirements for candidates. The authors compare the requirements presented in different studies to know what are the most important skills for a successful performance as a CIO. They stress the importance of non technical skills as key factors for professional performance. The authors have compared soft skills for CIO or equivalent positions and other professional profiles like programmers or analysts using data taken from thousands of job ads. An overview of the most valuable skills (especially soft skills) for CIOS is presented.Article Citation - WoS: 5Citation - Scopus: 5Applying Model-Driven Paradigm for the Improvement of Web Requirement Validation(Budapest Tech, 2012) Aragon, Gustavo; Escalona, M. J.; Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer EngineeringThis paper proposes an approach for Web requirements validation by applying the model-driven paradigm in classical requirements validation techniques. In particular, we present how the Navigational Development Techniques (NDT) approach exploits the model-driven paradigm to improve its requirements validation task by exploring tool cases that systematize or even automate the application of requirements validation techniques. Our solution is validated by applying it in a real industrial environment. The results and the learned lessons are presented accordingly.Conference Object Characterizing the Position of Cio(Ieee, 2012) Cano, Carmen; Fernandez-Sanz, Luis; Misra, SanjayThis paper describes how the CIO position appear as a key role in the organizations and which are the requirements for candidates to it. We have compared the requirements presented in different studies in order to know which are the most important for a successful performance as CIO..Conference Object Citation - WoS: 29Influence of Human Factors in Software Quality and Productivity(Springer-verlag Berlin, 2011) Fernandez-Sanz, Luis; Misra, SanjayTraditionally more effort has been devoted to technical and process aspects of software quality and productivity. However, in an activity like software development so intensive in workforce and so dependent on professionals' performance, it is strange that human and social factors affecting development teams have been attracted little attention. This paper is aimed at analyzing contributions in this area as well as providing empirical data from specific initiatives to know more about real practices and situation in software organizations.Article Citation - WoS: 7Citation - Scopus: 6Present and Future of Web Content Accessibility: an Analysis(Univ Osijek, Tech Fac, 2013) Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer EngineeringThe Web was created as a universal network of knowledge. It represented a huge qualitative and quantitative leap in terms of acquisition and processing of information. However, even today, significant barriers make difficult the access of a large number of citizens to the web, including disabled users and old people with diminished skills as an effect of age. Accessibility is the feature which facilitates access to and successful usage of a web site or service for as many people as possible, regardless of their personal limitations or limitations imposed by their environment. This article reviews the main aspects of web accessibility and its future, passing through the effective implementation of guidelines known as 2.0, which ensure compliance with existing legislation at national and international level.Article Citation - WoS: 38Citation - Scopus: 71Adopting Automated Whitelist Approach for Detecting Phishing Attacks(Elsevier Advanced Technology, 2021) Azeez, Nureni Ayofe; Misra, Sanjay; Margaret, Ihotu Agbo; Fernandez-Sanz, Luis; Abdulhamid, Shafi'i MuhammadPhishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of quick access time in a real-time environment. However, it has been established that blacklist solution methods offer quick and immediate access time but with a low detection rate. This research paper presents an automated white-list approach for detecting phishing attacks. The white-list is determined by carrying out a detailed analysis between the visual link and the actual link. The similarities of the known trusted site are calculated by juxtaposing the domain name with the contents of the whitelist and later match it with the IP address before a decision is made and further analyzing the actual link and the visual link by calculating the similarities of the known trusted site. The technique then takes a final decision on the extracted information from the hyperlink, which can also be obtained from the web address provided by the user. The experiments carried out provided a very high level of accuracy, specifically, when the dataset was relatively at the lowest level. Six different datasets were used to perform the experiments. The average accuracy obtained after the six experiments was 96.17% and the approach detects phishing sites with a 95.0% true positive rate. It was observed that the level of accuracy varies from one dataset to another. This result shows that the proposed method performs better than similar approaches benchmarked with. The efficiency of the approach was further established through its computation time, memory, bandwidth as well as other computational resources that were utilized with the minimum requirements when compared with other approaches. This solution has provided immense benefits over the existing solutions by reducing the memory requirements and computational complexity, among other benefits. It has also shown that the proposed method can provide more robust detection performances when compared to other techniques. (c) 2021 Elsevier Ltd. All rights reserved.

