Centre for Research on Engineering Software Technologies

CTA BG
Our Publications

Papers

2024

Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges

H Chen, MA Babar
ACM Computing Surveys 56 (6), 1-38
2024
Link

Evaluation of distributed data processing frameworks in hybrid clouds

F Ullah, S Dhingra, X Xia, MA Babar
Journal of Network and Computer Applications, 103837
2024
Link

A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu, MA Babar
Journal of Systems and Software 208, 111899
2024
Link

Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions

A Jayatilaka, NAG Arachchilage, MA Babar
arXiv preprint arXiv:2401.13199
2024
Link

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

THM Le, X Du, MA Babar
arXiv preprint arXiv:2401.11105
Link

2023

An empirical study on secure usage of mobile health apps: The attack simulation approach

B Aljedaani, A Ahmad, M Zahedi, MA Babar
Information and Software Technology 163, 107285
Link

Defending SDN against packet injection attacks using deep learning

AT Phu, B Li, F Ullah, TU Huque, R Naha, MA Babar, H Nguyen
Computer Networks 234, 109935
Link

Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels

MM Kholoosi, MA Babar, C Yilmaz
arXiv preprint arXiv:2308.11862
Link

Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu

V Prokhorenko, C Islam, MA Babar
arXiv preprint arXiv:2307.04458
Link

Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)

B Sabir, MA Babar, S Abuadbba
arXiv preprint arXiv:2307.01225
Link

Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices

LH Iwaya, MA Babar, A Rashid
IEEE Transactions on Software Engineering
Link

Detecting Misuses of Security APIs: A Systematic Review

Z Mousavi, C Islam, MA Babar, A Abuadbba, K Moore
arXiv preprint arXiv:2306.08869
Link

Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions

ME Ali, MA Cheema, T Hashem, A Ulhaq, MA Babar
arXiv preprint arXiv:2306.06600
Link

Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions

M Eunus Ali, M Aamir Cheema, T Hashem, A Ulhaq, MA Babar
arXiv e-prints, arXiv: 2306.06600
Link

Mitigating ML Model Decay in Continuous Integration with Data Drift Detection: An Empirical Study

AK Arani, THM Le, M Zahedi, MA Babar
arXiv preprint arXiv:2305.12736
link

Systematic Literature Review on Application of Machine Learning in Continuous Integration

AK Arani, THM Le, M Zahedi, MA Babar
arXiv preprint arXiv:2305.12695
Link

Cost Sharing Public Project with Minimum Release Delay

M Guo, D Goel, G Wang, Y Yang, MA Babar
arXiv preprint arXiv:2305.11657
Link

A qualitative study of architectural design issues in DevOps

M Shahin, A Rezaei Nasab, M Ali Babar
Journal of Software: Evolution and Process 35 (5), e2379
Link

Apiro: A framework for automated security tools api recommendation

ZT Sworna, C Islam, MA Babar
ACM Transactions on Software Engineering and Methodology 32 (1), 1-42
Link

A review on c3i systems’ security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar
ACM Computing Surveys 55 (9), 1-38
Link

Resource Utilization of Distributed Databases in Edge-Cloud Environment

Y Mansouri, V Prokhorenko, F Ullah, MA Babar
IEEE Internet of Things Journal
Link

Understanding Socio-Technical Aspects of Software Security Patch Management

MA Babar
2023
Link

On the privacy of mental health apps: An empirical investigation and its implications for app development

LH Iwaya, MA Babar, A Rashid, C Wijayarathna
Empirical Software Engineering 28 (1), 2
Link

End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers

B Aljedaani, A Ahmad, M Zahedi, MA Babar
Journal of Systems and Software 195, 111519
Link

Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry

X Zhou, S Li, L Cao, H Zhang, Z Jia, C Zhong, Z Shan, MA Babar
Journal of Systems and Software 195, 111521
Link

2022

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar
ACM Computing Surveys 55 (5), 1-39
Link

Design and evaluation of adaptive system for big data cyber security analytics

F Ullah, MA Babar, A Aleti
Expert Systems with Applications 207, 117948
Link

Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices

LH Iwaya, MA Babar, A Rashid
arXiv preprint arXiv:2211.08916
Link

Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support

RN Rajapakse, M Zahedi, MA Babar
arXiv preprint arXiv:2211.06953
Link

Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector

N Dissanayake, M Zahedi, A Jayatilaka, MA Babar
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-29
Link

Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors

B Sabir, MA Babar, R Gaire, A Abuadbba
IEEE Transactions on Dependable and Secure Computing
Link

Systematic scalability modeling of QoS-aware dynamic service composition

L Duboc, R Bahsoon, F Alrebeish, C Mera-Gómez, V Nallur, R Kazman, ...
ACM Transactions on Autonomous and Adaptive Systems 16 (3-4), 1-39
Link

A Survey on UAV-enabled Edge Computing: Resource Management Perspective

X Xia, SMM Fattah, MA Babar
arXiv preprint arXiv:2210.06679
Link

Mechanism Design for Public Projects via Three Machine Learning Based Approaches

M Guo, D Goel, G Wang, R Guo, Y Sakurai, MA Babar
2022
Link

A framework for automating deployment and evaluation of blockchain networks

NK Tran, MA Babar, A Walters
Journal of Network and Computer Applications 206, 103460
Link

Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases

Y Mansouri, F Ullah, S Dhingra, MA Babar
arXiv preprint arXiv:2209.09487
Link

Post-operative Use of Abdominal Binders: Bound to Tradition?

IB Khalid, M Babar, I Ahmed
Journal of Cancer & Allied Specialties 8 (2), 463-463
Link

Mod2Dash: A Framework for Model-Driven Dashboards Generation

L Jiang, NK Tran, M Ali Babar
Proceedings of the ACM on Human-Computer Interaction 6 (EICS), 1-28
Link

SmartValidator: A framework for automatic identification and classification of cyber threat data

C Islam, MA Babar, R Croft, H Janicke
Journal of Network and Computer Applications 202, 103370
Link

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler, M Zahedi, MA Babar
IEEE Access 10, 57525-57554
Link

Data preparation for software vulnerability prediction: A systematic literature review

R Croft, Y Xie, MA Babar
IEEE Transactions on Software Engineering 49 (3), 1044-1063
Link

Software security patch management-A systematic literature review of challenges, approaches, tools and practices

N Dissanayake, A Jayatilaka, M Zahedi, MA Babar
Information and Software Technology 144, 106771
Link

Runtime Software Patching: Taxonomy, Survey and Future Directions

C Islam, V Prokhorenko, MA Babar
arXiv preprint arXiv:2203.12132
Link

A Framework for Automating Deployment and Evaluation of Blockchain Networks

N Khoi Tran, MA Babar, A Walters
Muhammad Ali and Walters, Andrew, A Framework for Automating Deployment and …
Link

Toward energy‐efficient data management design for sustainable cities and societies

M Babar, S Javaid, A Saeed Khattak, A Ali
Transactions on Emerging Telecommunications Technologies 33 (2), e3821
Link

On the scalability of big data cyber security analytics systems

F Ullah, MA Babar
Journal of Network and Computer Applications 198, 103294
Link

On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development

LH Iwaya, MA Babar, A Rashid, C Wijayarathna
arXiv preprint arXiv:2201.09006
Link

NLP methods in host-based intrusion detection Systems: A systematic review and future directions

ZT Sworna, Z Mousavi, MA Babar
arXiv preprint arXiv:2201.08066
Link

Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges

H Chen, MA Babar
arXiv preprint arXiv:2201.04736
Link

A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment

F Ullah, I Mohammed, MA Babar
arXiv preprint arXiv:2201.01972
Link

Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds

F Ullah, S Dhingra, X Xia, MA Babar
arXiv preprint arXiv:2201.01948
Link

International Journal of Agriculture and Biosciences

W Khalid, HB Sajid, H Noor, M Babar, F Ullah, M Umar, MI ul Haq, N Tahir
Int J Agri Biosci 11 (3), 194-198
Link

Relationships between software architecture and source code in practice: An exploratory survey and interview

F Tian, P Liang, MA Babar
Information and Software Technology 141, 106705
Link

An empirical study of developers’ discussions about security challenges of different programming languages

R Croft, Y Xie, M Zahedi, MA Babar, C Treude
Empirical Software Engineering 27, 1-52
Link

Challenges and solutions when adopting DevSecOps: A systematic review

RN Rajapakse, M Zahedi, MA Babar, H Shen
Information and software technology 141, 106700
Link

2021

Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline

A Jayatilaka, N Beu, I Baetu, M Zahedi, MA Babar, L Hartley, ...
arXiv preprint arXiv:2112.06356
Link

Privacy-aware data forensics of VRUs using machine learning and big data analytics

M Babar, MU Tariq, AS Almasoud, MD Alshehri
Security and Communication Networks 2021, 1-9
Link

The impact of traceability on software maintenance and evolution: A mapping study

F Tian, T Wang, P Liang, C Wang, AA Khan, MA Babar
Journal of Software: Evolution and Process 33 (10), e2374
Link

Revenue maximizing markets for zero-day exploits

M Guo, G Wang, H Hata, MA Babar
Autonomous Agents and Multi-Agent Systems 35 (2), 36
Link

Evaluation of distributed databases in hybrid clouds and edge computing: Energy, bandwidth, and storage consumption

Y Mansouri, V Prokhorenko, F Ullah, MA Babar
arXiv preprint arXiv:2109.07260
Link

Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

A Jayatilaka, NAG Arachchilage, MA Babar
arXiv preprint arXiv:2108.04766
Link

Challenges with developing secure mobile health applications: Systematic review

B Aljedaani, MA Babar
JMIR mHealth and uHealth 9 (6), e15654
Link

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire
ACM Computing Surveys (CSUR) 54 (3), 1-47
Link

A review of edge computing: Features and resource virtualization

Y Mansouri, MA Babar
Journal of Parallel and Distributed Computing 150, 155-183
Link

Challenges and solutions when adopting DevSecOps: A systematic review

RN Rajapakse, M Zahedi, MA Babar, H Shen
arXiv preprint arXiv:2103.08266
Link

ReinforceBug: A framework to generate adversarial textual examples

B Sabir, MA Babar, R Gaire
arXiv preprint arXiv:2103.08306
Link

Understanding and addressing quality attributes of microservices architecture: A Systematic literature review

S Li, H Zhang, Z Jia, C Zhong, C Zhang, Z Shan, J Shen, MA Babar
Information and software technology 131, 106449
Link

End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers

B Aljedaani, A Ahmad, M Zahedi, MA Babar
arXiv preprint arXiv:2101.10412
Link

Effect or Program Constructs on Code Readability and Predicting Code Readability Using Statistical Modeling

A Batool, MB Bashir, M Babar, A Sohail, N Ejaz
Foundations of Computing and Decision Sciences 46 (2), 127-145
Link

End-users’ knowledge and perception about security of mobile health apps: An empirical study

B Aljedaani, A Ahmad, M Zahedi, MA Babar
arXiv preprint ArXiv:2101.10412 v3
Link

Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs

NK Tran, MA Babar, J Boan
Journal of Network and Computer Applications 173, 102844
Link

2020

Architectural design space for modelling and simulation as a service: A review

M Shahin, MA Babar, MA Chauhan
Journal of Systems and Software 170, 110752
Link

An automated implementation of hybrid cloud for performance evaluation of distributed databases

Y Mansouri, V Prokhorenko, MA Babar
Journal of Network and Computer Applications 167, 102740
Link

Sam-sos: A stochastic software architecture modeling and verification approach for complex system-of-systems

A Mohsin, NK Janjua, SMS Islam, MA Babar
IEEE Access 8, 177580-177603
Link

Security and privacy for mHealth and uHealth systems: a systematic mapping study

LH Iwaya, A Ahmad, MA Babar
IEEE Access 8, 150081-150112
Link

The impact of distance on performance and scalability of distributed database systems in hybrid clouds

Y Mansouri, MA Babar
arXiv preprint arXiv:2007.15826
Link

Deep learning for source code modeling and generation: Models, applications, and challenges

THM Le, H Chen, MA Babar
ACM Computing Surveys (CSUR) 53 (3), 1-38
Link

Reliability and robustness analysis of machine learning based phishing url detectors

B Sabir, MA Babar, R Gaire, A Abuadbba
arXiv preprint arXiv:2005.08454
Link

An evasion attack against ml-based phishing url detectors

B Sabir, MA Babar, R Gaire
arXiv e-prints, arXiv: 2005.08454
Link

Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems

JEL Hachem, V Chiprianov, MA Babar, TAL Khalil, P Aniorte
Journal of Systems and Software 162, 110484
Link

Architectural resilience in cloud, fog and edge systems: A survey

V Prokhorenko, MA Babar
IEEE Access 8, 28078-28095
Link

Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites

THM Le, R Croft, D Hin, MA Babar
CoRR abs/2008.04176
Link

Code readability management of high-level programming languages: a comparative study

MU Tariq, MB Bashir, M Babar, A Sohail
International Journal of Advanced Computer Science and Applications 11 (3)
Link

2019

A review on requirements engineering for internet of things (loT) applications

S Kaleem, S Ahmad, M Babar, V Akre, A Raian, F Ullah
2019 Sixth HCT Information Technology Trends (ITT), 269-275 4 2019
Link

Game theoretical modelling of network/cybersecurity

A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott
IEEE Access 7, 154167-154179 17 2019
Link

Ethnographic research in software engineering: a critical review and checklist

H Zhang, X Huang, X Zhou, H Huang, MA Babar
Proceedings of the 2019 27th ACM joint meeting on European software … 18 2019
Link

Gathering cyber threat intelligence from Twitter using novelty classification

BD Le, G Wang, M Nasim, A Babar
arXiv preprint arXiv:1907.01755 43 2019
Link

Internet of things search engine

NK Tran, QZ Sheng, MA Babar, L Yao, WE Zhang, S Dustdar
Communications of the ACM 62 (7), 66-73 19 2019
Link

An empirical study of architecting for continuous delivery and deployment

M Shahin, M Zahedi, MA Babar, L Zhu
Empirical Software Engineering 24, 1061-1108 58 2019
Link

An empirical study of the effectiveness of software architecture evaluation meetings

MA Babar, H Shen, S Biffl, D Winkler
IEEE Access 7, 79069-79084 5 2019
Link

Architectural tactics for big data cybersecurity analytics systems: a review

F Ullah, MA Babar
Journal of Systems and Software 151, 81-118 89 2019
Link

A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal
ACM Computing Surveys (CSUR) 52 (2), 1-45 70 2019
Link

Welcome message from the general chair and program co-chairs

MA Babar, S Ali, V Garousi
PervasiveHealth: Pervasive Computing Technologies for Healthcare 2019
Link

An architecture-driven adaptation approach for big data cyber security analytics

F Ullah, MA Babar
2019 IEEE International Conference on Software Architecture (ICSA), 41-50 8 2019
Link

Special issue on architecting for hyper connectivity and hyper virtualization

B Tekinerdogan, U Zdun, MA Babar
Journal of Systems and Software 149, 531-532 2019
Link

Agile approaches for teaching and learning software architecture design processes and methods

MA Chauhan, CW Probst, MA Babar
Agile and Lean Concepts for Teaching and Learning: Bringing Methodologies … 2 2019
Link

Conference

2023

A Goal-Driven Approach to Support Decision-Making with Incomplete Information in Cyber Operations

A Dawoud, G Mahala, C Islam, W Mayer, A Ghose, MA Babar, ...
International Conference on Advanced Information Systems Engineering, 77-85
Link

Data quality for software vulnerability datasets

R Croft, MA Babar, MM Kholoosi
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)
Link

IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools’ APIs

ZT Sworna, MA Babar, A Sreekumar
2023 IEEE International Conference on Software Analysis, Evolution and …
Link

Sok: Machine learning for continuous integration

AK Arani, M Zahedi, THM Le, MA Babar
2023 IEEE/ACM International Workshop on Cloud Intelligence & AIOps (AIOps)
Link

SoK: Machine Learning for Continuous Integration

A Kazemi Arani, M Zahedi, THM Le, MA Babar
arXiv e-prints, arXiv: 2304.02829
Link

A Study on Early & Non-Intrusive Security Assessment for Container Images

MU Haque, MA Babar
ENASE, 640-647
link

2022

LogGD: Detecting Anomalies from System Logs with Graph Neural Networks

Y Xie, H Zhang, MA Babar
2022 IEEE 22nd International Conference on Software Quality, Reliability and …
Link

Mining software repositories for security: data quality issues lessons from trenches (keynote)

M Ali Babar
Proceedings of the 1st International Workshop on Mining Software …
Link

An Empirical Study of Automation in Software Security Patch Management

N Dissanayake, A Jayatilaka, M Zahedi, MA Babar
Proceedings of the 37th IEEE/ACM International Conference on Automated …
Link

ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems

N Khoi Tran, B Sabir, MA Babar, N Cui, M Abolhasan, J Lipman
European Conference on Software Architecture, 49-65
Link

On the use of fine-grained vulnerable code statements for software vulnerability assessment models

THM Le, MA Babar
Proceedings of the 19th International Conference on Mining Software …
Link

Noisy label learning for security defects

R Croft, MA Babar, H Chen
Proceedings of the 19th International Conference on Mining Software …
Link

LineVD: Statement-level vulnerability detection using graph neural networks

D Hin, A Kan, H Chen, MA Babar
Proceedings of the 19th International Conference on Mining Software …
Link

An investigation into inconsistency of software vulnerability severity across data sources

R Croft, MA Babar, L Li
2022 IEEE International Conference on Software Analysis, Evolution and …
Link

Well begun is half done: An empirical study of exploitability & impact of base-image vulnerabilities

MU Haque, MA Babar
2022 IEEE International Conference on Software Analysis, Evolution and …
Link

KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration

MU Haque, MM Kholoosi, MA Babar
2022 IEEE International Conference on Software Analysis, Evolution and …
Link

2021

Automated security assessment for the internet of things

X Duan, M Ge, THM Le, F Ullah, S Gao, X Lu, MA Babar
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing …
Link

An empirical study of rule-based and learning-based approaches for static application security testing

R Croft, D Newlands, Z Chen, MA Babar
Proceedings of the 15th ACM/IEEE international symposium on empirical …
Link

An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

RN Rajapakse, M Zahedi, MA Babar
Proceedings of the 15th ACM/IEEE International Symposium on Empirical …
Link

Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning

THM Le, D Hin, R Croft, MA Babar
2021 36th IEEE/ACM International Conference on Automated Software …
Link

Taxonomy of edge blockchain network designs

NK Tran, MA Babar
European Conference on Software Architecture, 172-180
Link

A grounded theory of the role of coordination in software security patch management

N Dissanayake, M Zahedi, A Jayatilaka, MA Babar
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …
Link

A large-scale study of security vulnerability support on developer q&a websites

THM Le, R Croft, D Hin, MA Babar
Evaluation and assessment in software engineering, 109-118
Link

Designing a security platform for collaborating autonomous systems-an experience report

MA Chauhan, MA Babar, S Grainger
2021 IEEE 18th International Conference on Software Architecture Companion …
Link

Logdp: Combining dependency and proximity for log-based anomaly detection

Y Xie, H Zhang, B Zhang, MA Babar, S Lu
Service-Oriented Computing: 19th International Conference, ICSOC 2021 …
Link

2020

Blockchain-based solutions for IoT: A tertiary study

Q Xu, X Chen, S Li, H Zhang, MA Babar, NK Tran
2020 IEEE 20th International Conference on Software Quality, Reliability and …
Link

Security awareness of end-users of mobile health applications: an empirical study

B Aljedaani, A Ahmad, M Zahedi, M Ali Babar
MobiQuitous 2020-17th EAI International Conference on Mobile and Ubiquitous …
Link

An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective

B Aljedaani, A Ahmad, M Zahedi, MA Babar
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 208-217
Link

Challenges in docker development: A large-scale study using stack overflow

MU Haque, LH Iwaya, MA Babar
Proceedings of the 14th ACM/IEEE International Symposium on Empirical …
Link

Puminer: Mining security posts from developer question and answer websites with pu learning

THM Le, D Hin, R Croft, MA Babar
Proceedings of the 17th International Conference on Mining Software …
Link

An evidence-based inquiry into the use of grey literature in software engineering

H Zhang, X Zhou, X Huang, H Huang, MA Babar
Proceedings of the ACM/IEEE 42nd International Conference on Software …
Link

On the role of software architecture in DevOps transformation: An industrial case study

M Shahin, MA Babar
Proceedings of the International Conference on Software and System Processes …
Link

Mining questions asked about continuous software engineering: A case study of stack overflow

M Zahedi, RN Rajapakse, MA Babar
Proceedings of the 24th International Conference on Evaluation and …
Link

Anatomy, concept, and design space of blockchain networks

NK Tran, MA Babar
2020 IEEE International Conference on Software Architecture (ICSA), 125-134
Link

Internet of things based smart community design and planning using Hadoop-based big data analytics

M Babar, W Iqbal, S Kaleem
Advances in Information and Communication: Proceedings of the 2019 Future of …
Link

Automatic Identification of Architecture Smell Discussions from Stack Overflow.

F Tian, F Lu, P Liang, MA Babar
SEKE, 451-456
Link

Architecture-centric support for integrating security tools in a security orchestration platform

C Islam, MA Babar, S Nepal
Software Architecture: 14th European Conference, ECSA 2020, L'Aquila, Italy …
Link

2019

Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation

F Ullah, MA Babar
2019 20th International Conference on Parallel and Distributed Computing … 3 2019
Link

A Framework for Internet of Things Search Engines Engineering

NK Tran, MA Babar, QZ Sheng, J Grundy
2019 26th Asia-Pacific Software Engineering Conference (APSEC), 228-235 1 2019
Link

QuickAdapt: scalable adaptation for Big Data cyber security analytics

F Ullah, MA Babar
2019 24th international conference on engineering of complex computer … 6 2019
Link

Automated software vulnerability assessment with concept drift

THM Le, B Sabir, MA Babar
2019 IEEE/ACM 16th International Conference on Mining Software Repositories … 36 2019
Link

An ontology-driven approach to automating the process of integrating security software systems

C Islam, MA Babar, S Nepal
2019 IEEE/ACM International Conference on Software and System Processes … 11 2019
Link

How developers discuss architecture smells? an exploratory study on stack overflow

F Tian, P Liang, MA Babar
2019 IEEE international conference on software architecture (ICSA), 91-100 31 2019
Link

Automated interpretation and integration of security tools using semantic knowledge

C Islam, MA Babar, S Nepal
Advanced Information Systems Engineering: 31st International Conference … 17 2019
Link

logo

Adelaide, SA, Australia

© 2024 CREST. All Rights Reserved.