INGENIERIA DEL SOFTWARE
Publications (2,871)
View referenced research data.2026
-
A performance evaluation framework for post-quantum TLS
Future Generation Computer Systems, Vol. 175
-
Comparative analysis of post-quantum handshake performance in QUIC and TLS protocols
Computer Networks, Vol. 275
-
Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks
Lecture Notes in Computer Science
-
Influence of External Dependency Retrieval and Prompt Engineering in Test Case Generation Using LLMs
Lecture Notes in Computer Science
-
Multi-objective consensus optimization for gene regulatory networks inference: A preference-based approach
Computational Biology and Chemistry, Vol. 121
-
ParetoInvest: Integrating real-time financial data and multi-objective meta-heuristics for portfolio optimization
SoftwareX, Vol. 33
-
Preface
Lecture Notes in Computer Science
2025
-
A Lightweight Mechanism for Dynamic Secret Sharing of Private Data by Constrained Devices
IEEE Internet of Things Journal, Vol. 12, Núm. 13, pp. 22725-22732
-
A cluster of patterns for trusted computing
International Journal of Information Security, Vol. 24, Núm. 1
-
A decision framework for privacy-preserving synthetic data generation
Computers and Electrical Engineering, Vol. 126
-
A machine learning-based clinical prediction rule for adverse outcomes in multimorbid patients
Intelligent Medicine, Vol. 5, Núm. 4, pp. 300-309
-
A soft sensor open-source methodology for inexpensive monitoring of water quality: A case study of NO3− concentrations
Journal of Computational Science, Vol. 85
-
Addressing significant challenges for animal detection in camera trap images: a novel deep learning-based approach
Scientific Reports, Vol. 15, Núm. 1
-
Advancing soil biology research: Empowering European databases with ontological frameworks for enhanced data integration of soil biodiversity data
Ecological Informatics, Vol. 91
-
An End-to-End Digital Twin Framework for Dynamic Traffic Analytics in O-RAN
IEEE Transactions on Network and Service Management
-
Analysis of Transferable Adversarial Evasion Attack Detection in IoT and Industrial ADS
IEEE Open Journal of the Computer Society
-
Automatic Proof Generation: Fine-tuning and RAG in Reasoner vs. Math LLMs
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
-
Benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains
Lecture Notes in Computer Science
-
Big Data-driven MLOps workflow for annual high-resolution land cover classification models
Future Generation Computer Systems, Vol. 163
-
Blockchain-Based Multi-Signature System for Critical Scenarios
Proceedings of the International Conference on Security and Cryptography