181 results on '"BABAR, MUHAMMAD ALI"'
Search Results
2. ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems
3. Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems
4. Taxonomy of Edge Blockchain Network Designs
5. LogDP: Combining Dependency and Proximity for Log-Based Anomaly Detection
6. Enhancing bitcoin transaction confirmation prediction: a hybrid model combining neural networks and XGBoost
7. A Survey on UAV-Enabled Edge Computing: Resource Management Perspective
8. Defending SDN against packet injection attacks using deep learning
9. Privacy Engineering in the Wild: Understanding the Practitioners’ Mindset, Organizational Aspects, and Current Practices
10. Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform
11. Agile Approaches for Teaching and Learning Software Architecture Design Processes and Methods
12. Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review
13. A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures
14. Resource Utilization of Distributed Databases in Edge-Cloud Environment
15. Security Tools’ API Recommendation Using Machine Learning
16. Design Decisions and Patterns for Edge Blockchain Networks
17. Defending Sdn Against Packet Injection Attacks Using Deep Learning
18. Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry
19. LogGD: Detecting Anomalies from System Logs with Graph Neural Networks
20. Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector
21. Mechanism Design for Public Projects via Three Machine Learning Based Approaches
22. An Empirical Study of Automation in Software Security Patch Management
23. Cost Sharing Public Project with Minimum Release Delay
24. List of Contributors
25. Using Reference Architectures for Design and Evaluation of Web of Things Systems✶✶This chapter describes a method for software architecture design, analysis, evaluation and evolution of individual Internet of Things (IoT) subsystems and how individual IoT subsystems can be used for design of Web of Things (WoT) systems.
26. APIRO: A Framework for Automated Security Tools API Recommendation
27. A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service
28. Research on Microservice Architecture: A Tertiary Study
29. Relationships between software architecture and source code in practice: An exploratory survey and interview
30. Runtime Software Patching: Taxonomy, Survey and Future Directions
31. A Framework for Automating Deployment and Evaluation of Blockchain Networks
32. Improving the Quality of Architecture Design Through Peer-Reviews and Recombination
33. An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps
34. The impact of traceability on software maintenance and evolution: A mapping study
35. A grounded theory of the role of coordination in software security patch management
36. Revenue maximizing markets for zero-day exploits
37. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites
38. Designing a Security Platform for Collaborating Autonomous Systems - An Experience Report
39. Understanding and addressing quality attributes of microservices architecture: A Systematic literature review
40. OSS Integration Issues and Community Support: An Integrator Perspective
41. Variability Management in Software Product Lines: An Investigation of Contemporary Industrial Challenges
42. A Web-Based System for Managing Software Architectural Knowledge
43. Supporting the Software Architecture Process with Knowledge Management
44. Architecture-Centric Methods and Agile Approaches
45. How Can Agile Practices Minimize Global Software Development Co-ordination Risks?
46. ReinforceBug: A Framework to Generate Adversarial Textual Examples
47. Middleware Architecture Evaluation for Dependable Self-managing Systems
48. Architecture-Centric Methods and Agile Approaches
49. Blockchain-based Solutions for IoT: A Tertiary Study
50. An evidence-based inquiry into the use of grey literature in software engineering
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.