Search Results

Now showing 1 - 6 of 6
  • Article
    Citation - WoS: 20
    Citation - Scopus: 24
    A Study on the Key Soft Skills for Successful Participation of Students in Multinational Engineering Education
    (Tempus Publications, 2017) Fernandez-Sanz, Luis; Teresa Villalba, Maria; Amelio Medina, Jose; Misra, Sanjay; Computer Engineering
    Soft-skills have proved to be a necessary complement to technical skills in today's multinational workplaces. As universities are facing the challenge of promoting internationalization and mobility in students and teachers, they have to decide how to help their students in developing these skills as well as increase their awareness on the cultural differences in multinational settings. After a long trajectory of participation in multinational educational experiences, the authors launched a survey to check if their previous findings on the preferred soft skills by educational experts and managers still remain valid after 5 years. Another goal of the study was the analysis of the link between preference for specific soft skills and cultural background in each country as characterized by Hofstede's indicators. The data collected from 123 experts from 45 different countries have confirmed the existence of a stable core set of preferred soft skills at global level and also for European countries. Results have also shown links between specific cultural indicators and preference for some soft skills.
  • Article
    Citation - WoS: 10
    Citation - Scopus: 16
    A Survey and Meta-Analysis of Application-Layer Distributed Denial-Of Attack
    (Wiley, 2020) Odusami, Modupe; Misra, Sanjay; Abayomi-Alli, Olusola; Abayomi-Alli, Adebayo; Fernandez-Sanz, Luis
    Background One of the significant attacks targeting the application layer is the distributed denial-of-service (DDoS) attack. It degrades the performance of the server by usurping its resources completely, thereby denying access to legitimate users and causing losses to businesses and organizations. Aim This study aims to investigate existing methodologies for application-layer DDoS (APDDoS) attack defense by using specific measures: detection methods/techniques, attack strategy, and feature exploration of existing APDDoS mechanisms. Methodology The review is carried out on a database search of relevant literature in IEEE Xplore, ACM, Science Direct, Springer, Wiley, and Google Search. The search dates to capture journals and conferences are from 2000 to 2019. Review papers that are not in English and not addressing the APDDoS attack are excluded. Three thousand seven hundred eighty-nine studies are identified and streamlined to a total of 75 studies. A quantifiable assessment is performed on the selected articles using six search procedures, namely: source, methods/technique, attack strategy, datasets/corpus, status, detection metric, and feature exploration. Results Based on existing methods/techniques for detection, the results show that machine learning gave the highest proportion with 36%. However, assessment based on attack strategy shows that several studies do not consider an attack form for deploying their solution. Result based on existing features for the APDDoS detection technique shows request stream during a user session and packet pattern gave the highest result with 47%. Unlike packet header information with 33%, request stream during absolute time interval with 12% and web user features 8%. Conclusion Research findings show that a large proportion of the solutions for APDDoS attack detection utilized features based on request stream during user session and packet pattern. The optimization of features will improve detection accuracy. Our study concludes that researchers need to exploit all attack strategies using deep learning algorithms, thus enhancing effective detection of APDDoS attack launch from different botnets.
  • Article
    Citation - WoS: 8
    Citation - Scopus: 18
    Featuring Cio: Roles, Skills and Soft Skills
    (Igi Global, 2013) Cano, Carmen; Fernandez-Sanz, Luis; Misra, Sanjay
    This paper describes how the CIO (Chief Information Officer) position appears as a key role in the organizations and the requirements for candidates. The authors compare the requirements presented in different studies to know what are the most important skills for a successful performance as a CIO. They stress the importance of non technical skills as key factors for professional performance. The authors have compared soft skills for CIO or equivalent positions and other professional profiles like programmers or analysts using data taken from thousands of job ads. An overview of the most valuable skills (especially soft skills) for CIOS is presented.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 4
    Ronsi: a Framework for Calculating Return on Network Security Investment
    (Springer, 2023) Barik, Kousik; Misra, Sanjay; Fernandez-Sanz, Luis; Koyuncu, Murat
    This competitive environment is rapidly driving technological modernization. Sophisticated cyber security attacks are expanding exponentially, inflicting reputation damage and financial and economic loss. Since security investments may take time to generate revenues, organizations need more time to convince top management to support them. Even though several ROSI techniques have been put out, they still need to address network-related infrastructure. By addressing gaps in existing techniques, this study delivers a comprehensive framework for calculating Return on Network Security Investment (RONSI). The proposed framework uses a statistical prediction model based on Bayes' theorem to calculate the RONSI. It is validated by Common Vulnerability Security Systems (CVSS) datasets and compared to existing studies. The results demonstrate that the annual loss is reduced to 75% with the proposed RONSI model after implementing a security strategy, and the proposed model is compared with existing studies. An organization can effectively justify investments in network-related infrastructure while enhancing its credibility and dependability in the cutthroat marketplace.
  • Article
    Citation - WoS: 7
    Citation - Scopus: 6
    Present and Future of Web Content Accessibility: an Analysis
    (Univ Osijek, Tech Fac, 2013) Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer Engineering
    The Web was created as a universal network of knowledge. It represented a huge qualitative and quantitative leap in terms of acquisition and processing of information. However, even today, significant barriers make difficult the access of a large number of citizens to the web, including disabled users and old people with diminished skills as an effect of age. Accessibility is the feature which facilitates access to and successful usage of a web site or service for as many people as possible, regardless of their personal limitations or limitations imposed by their environment. This article reviews the main aspects of web accessibility and its future, passing through the effective implementation of guidelines known as 2.0, which ensure compliance with existing legislation at national and international level.
  • Article
    Citation - WoS: 10
    PRACTICAL APPLICATION OF UML ACTIVITY DIAGRAMS FOR THE GENERATION OF TEST CASES
    (Editura Acad Romane, 2012) Fernandez-Sanz, Luis; Misra, Sanjay
    Software testing and debugging represents around one third of total effort in development projects. Different factors which have influence on poor practices of testing have been identified through specific surveys. Amongst several, one of the most important is the lack of efficient methods to exploit development models for generating test cases. This paper presents a new method for automatically generating a complete set of functional test cases from UML activity diagrams complementing specification of use cases. Test cases are prioritized according to software risk information. Results from experiences with more than 70 software professionals/experts validate benefits of the method. Participants also confirm its interest and effectiveness for testing needs of industry.