Search
Search Results
-
Cybersyn, big data, variety engineering and governance
This contribution offers reflections about Chilean Cybersyn, 50 years ago. In recent years, Cybersyn, has received significant attention. It was the...
-
The capabilities approach and variety engineering. A case for social cocreation of value
The purpose of this paper is to show an application of variety engineering in the social realm (Beer in The heart of enterprise. Wiley, Chichester,...
-
Engineering the Human Mind: Social Engineering Attack Using Kali Linux
This in-depth review article examines social engineering attacks and their implementation through the Kali Linux operating system, delving into the...
-
CoVaMaT: Functionality for Variety Reuse Through a Supporting Tool
Develo** reusable Big Data Systems (BDSs) implies dealing with modeling variety as reusable assets. Conceptually speaking, these assets might be... -
Using reactive links to propagate changes across engineering models
Collaborative model-driven development is a de facto practice to create software-intensive systems in several domains (e.g., aerospace, automotive,...
-
Social Engineering
In the realm of cybersecurity, social engineering refers to a broad spectrum of malicious activities accomplished through human interactions. It... -
Feature Engineering
In this chapter, we will introduce to you the key part in the algorithm competition that has the heaviest workload and that determines whether the... -
Ontological Engineering in Complex Systems Based on Meta-Associative Graphs
Abstract —The paper proposes a variety of metagraphs focused on the use in ontological engineering of complex systems characterized by complexity of...
-
Persistent spectral theory-guided protein engineering
Although protein engineering, which iteratively optimizes protein fitness by screening the gigantic mutational space, is constrained by experimental...
-
Prompt Engineering Techniques
In this day and age, it’s easy to make use of ChatGPT and other LLMs as a super-powered search engine and ask for information or even small tasks... -
Registered reports in software engineering
Registered reports are scientific publications which begin the publication process by first having the detailed research protocol, including key...
-
Modelling and analysis of social engineering threats using the attack tree and the Markov model
Social Engineering Threats (SETs) exploit human vulnerabilities in information system security. Due to its ability to bypass technical security,...
-
Quantum software engineering and quantum software development lifecycle: a survey
Quantum software engineering is advancing in the domain of quantum computing research and application, yet the documentation is scattered. The slow...
-
Terraform and Reverse Engineering
In the previous chapter, we studied the fundamentals of reverse engineering and its operation. Additionally, we discussed Terraform with you and the... -
Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems
This paper proposes a new intelligent optimization algorithm named Black Eagle Optimizer (BEO) based on the biological behaviour of the black eagle....
-
The Variety of Data Science Learners
Since data science is considered to be an important twenty-first centurySkills21st century skill, it should be acquired by everyone—children as well... -
Towards a systematic and knowledge-based requirements and conceptual engineering for modular electrolysis plants
The production of green hydrogen and its scale-up require the enginering and installation of new electrolysis plants. Modular electrolysis plants...
-
The Impact of Personality on Requirements Engineering Activities: A Mixed-Methods Study
ContextRequirements engineering (RE) is an important part of Software Engineering (SE), consisting of various human-centric activities that require...
-
A multi-layered security model to counter social engineering attacks: a learning-based approach
Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...
-
Forecasting the software engineering model’s effort estimation using constructive cost estimation models
Machine learning models are increasingly being developed to solve various problems in academic and corporate settings. However, data scientists...