Search Results - "Gamble, Rose"

Refine Results
  1. 1

    DDoS Attacks in Service Clouds by Alqahtani, Sarra, Gamble, Rose

    “…The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services…”
    Get full text
    Conference Proceeding Journal Article
  2. 2

    Outcomes of Emotional Content from Agile Team Forum Posts by Marshall, Allen, Gamble, Rose F., Hale, Matthew L.

    “…Social media and discussion centric collaborative tools have become an integral part of software development team communication. Accessible by mobile apps and…”
    Get full text
    Conference Proceeding
  3. 3

    Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards by Hale, Matthew L., Gamble, Rose F.

    Published in Requirements engineering (01-09-2019)
    “…Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various…”
    Get full text
    Journal Article
  4. 4
  5. 5

    CyberPhishing: A Game-Based Platform for Phishing Awareness Testing by Hale, Matthew L., Gamble, Rose F., Gamble, Philip

    “…Phishing attacks sap billions of dollars annually from unsuspecting individuals while compromising individual privacy. Companies and privacy advocates seek…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach by Alarcon, Gene M., Gamble, Rose F., Ryan, Tyler J., Walter, Charles, Jessup, Sarah A., Wood, David W., Capiola, August

    Published in Applied ergonomics (01-07-2018)
    “…Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the…”
    Get full text
    Journal Article
  7. 7

    Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair by Alarcon, Gene M., Walter, Charles, Gibson, Anthony M., Gamble, Rose F., Capiola, August, Jessup, Sarah A., Ryan, Tyler J.

    Published in Systems (Basel) (01-03-2020)
    “…Automation and autonomous systems are quickly becoming a more engrained aspect of modern society. The need for effective, secure computer code in a timely…”
    Get full text
    Journal Article
  8. 8

    Application of the heuristic-systematic model to computer code trustworthiness: The influence of reputation and transparency by Alarcon, Gene M., Gamble, Rose, Jessup, Sarah A., Walter, Charles, Ryan, Tyler J., Wood, David W., Calhoun, Chris S.

    Published in Cogent psychology (31-12-2017)
    “…Computer programs (code) are integral to the functions of current society. Yet, little is known about why programmers trust code they did not create. The…”
    Get full text
    Journal Article
  9. 9

    Developing a platform to evaluate and assess the security of wearable devices by Hale, Matthew L., Lotfy, Kerolos, Gamble, Rose F., Walter, Charles, Lin, Jessica

    Published in Digital communications and networks (01-08-2019)
    “…Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain…”
    Get full text
    Journal Article
  10. 10

    A Risk Adaptive Access Control Model for the Service Mesh Architecture by Alboqmi, Rami, Jahan, Sharmin, Gamble, Rose F.

    “…Microservice architecture (MSA) applications can be built with a service mesh infrastructure layer that manages service-to-service communications through…”
    Get full text
    Conference Proceeding
  11. 11

    Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture by Alboqmi, Rami, Jahan, Sharmin, Gamble, Rose F.

    “…The service mesh is a dedicated infrastructure layer in a microservice architecture. It manages service-to-service communication within an application between…”
    Get full text
    Conference Proceeding
  12. 12

    Automated Extraction of Security Profile Information from XAI Outcomes by Jahan, Sharmin, Alqahtani, Sarra, Gamble, Rose F., Bayesh, Masrufa

    “…Security applications use machine learning (ML) models and artificial intelligence (AI) to autonomously protect systems. However, security decisions are more…”
    Get full text
    Conference Proceeding
  13. 13

    Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks by Riley, Ian, Gamble, Rose F.

    “…Self-organization over ad hoc networks is of growing interest due to their application to collective adaptive systems of IoT devices, such as wearables and…”
    Get full text
    Conference Proceeding
  14. 14

    Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation by Alarcon, Gene M., Gibson, Anthony M., Walter, Charles, Gamble, Rose F., Ryan, Tyler J., Jessup, Sarah A., Boyd, Brian E., Capiola, August

    Published in Systems (Basel) (01-09-2020)
    “…Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The…”
    Get full text
    Journal Article
  15. 15

    Applying Security-Awareness to Service-Based Systems by Jahan, Sharmin, Gamble, Rose F.

    “…A service-based system (SBS) dynamically composes third-party services to deliver comprehensive functionality. As adaptive systems, SBSs can substitute…”
    Get full text
    Conference Proceeding
  16. 16

    Assessing Adaptations based on Change Impacts by Jahan, Sharmin, Riley, Ian, Gamble, Rose F.

    “…When a self-adaptive system alters its functionality to operate in a dynamic environment, it may impact whether the system can remain in compliance with its…”
    Get full text
    Conference Proceeding
  17. 17

    Toward a Negotiation Framework for Self-Integration by Riley, Ian, Jahan, Sharmin, Gamble, Rose F.

    “…Self-integrating systems dynamically seek out external systems to help meet their local and global goals. To perform the integration, the systems must alter…”
    Get full text
    Conference Proceeding
  18. 18

    Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling by Jahan, Sharmin, Riley, Ian, Walter, Charles, Gamble, Rose F.

    “…A self-adaptive system (SAS) requires automated planning that alters its behavior to properly operate in dynamic environments. To select a successful…”
    Get full text
    Conference Proceeding
  19. 19

    Adaptive Coordination to Complete Mission Goals by Jahan, Sharmin, Walter, Charles, Alqahtani, Sarra, Gamble, Rose

    “…Autonomous systems have become incredibly common, with autonomous vehicles and drones dictating major research trends. Coordination of autonomous vehicles is…”
    Get full text
    Conference Proceeding
  20. 20

    Introducing Replaceability into Web Service Composition by Al-Helal, Hussein, Gamble, Rose

    Published in IEEE transactions on services computing (01-04-2014)
    “…By discovering and reusing relevant web services, an organization can select and compose those services that most closely meet its business and Quality of…”
    Get full text
    Journal Article