Search

Your search keyword '"BABAR, MUHAMMAD ALI"' showing total 519 results

Search Constraints

Start Over You searched for: Author "BABAR, MUHAMMAD ALI" Remove constraint Author: "BABAR, MUHAMMAD ALI"
519 results on '"BABAR, MUHAMMAD ALI"'

Search Results

1. SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting

2. Towards Secure Management of Edge-Cloud IoT Microservices using Policy as Code

3. A Multivocal Review of MLOps Practices, Challenges and Open Issues

4. Beyond Data, Towards Sustainability: A Sydney Case Study on Urban Digital Twins

6. LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking

7. An Investigation into Misuse of Java Security APIs by Large Language Models

8. Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions

9. Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu

10. Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions

11. Mitigating ML Model Decay in Continuous Integration with Data Drift Detection: An Empirical Study

12. Systematic Literature Review on Application of Machine Learning in Continuous Integration

13. Cost Sharing Public Project with Minimum Release Delay

14. SoK: Machine Learning for Continuous Integration

15. Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices

16. Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support

17. A Survey on UAV-enabled Edge Computing: Resource Management Perspective

18. LogGD:Detecting Anomalies from System Logs by Graph Neural Networks

19. An Empirical Study of Automation in Software Security Patch Management

23. NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

24. APIRO: A Framework for Automated Security Tools API Recommendation

25. On the Scalability of Big Data Cyber Security Analytics Systems

26. LogDP: Combining Dependency and Proximity for Log-based Anomaly Detection

27. A Qualitative Study of Architectural Design Issues in DevOps

28. Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

29. The Impact of Traceability on Software Maintenance and Evolution: A Mapping Study

30. Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview

31. An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

32. A Grounded Theory of the Role of Coordination in Software Security Patch Management

33. Cost Sharing Security Information with Minimal Release Delay

34. Guidance Models for Designing Big Data Cyber Security Analytics Systems

35. An Experience Report on the Design and Implementation of an Ad-hoc Blockchain Platform for Tactical Edge Applications

40. ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems

42. An Empirical Study of Architecting for Continuous Delivery and Deployment

43. Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices

44. Security Support in Continuous Deployment Pipeline

46. Taxonomy of Edge Blockchain Network Designs

47. Applying empirical software engineering to software architecture: challenges and lessons learned

48. Software Architectures for Robotics Systems: A Systematic Mapping Study

Catalog

Books, media, physical & digital resources