Search Results - "Gamble, Rose"
-
1
DDoS Attacks in Service Clouds
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services…”
Get full text
Conference Proceeding Journal Article -
2
Outcomes of Emotional Content from Agile Team Forum Posts
Published in 2016 IEEE/ACM 1st International Workshop on Emotional Awareness in Software Engineering (SEmotion) (01-05-2016)“…Social media and discussion centric collaborative tools have become an integral part of software development team communication. Accessible by mobile apps and…”
Get full text
Conference Proceeding -
3
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
Published in Requirements engineering (01-09-2019)“…Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various…”
Get full text
Journal Article -
4
Editorial: Understanding and engineering cyber-physical collectives
Published in Frontiers in robotics and AI (06-05-2024)Get full text
Journal Article -
5
CyberPhishing: A Game-Based Platform for Phishing Awareness Testing
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…Phishing attacks sap billions of dollars annually from unsuspecting individuals while compromising individual privacy. Companies and privacy advocates seek…”
Get full text
Conference Proceeding Journal Article -
6
The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach
Published in Applied ergonomics (01-07-2018)“…Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the…”
Get full text
Journal Article -
7
Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair
Published in Systems (Basel) (01-03-2020)“…Automation and autonomous systems are quickly becoming a more engrained aspect of modern society. The need for effective, secure computer code in a timely…”
Get full text
Journal Article -
8
Application of the heuristic-systematic model to computer code trustworthiness: The influence of reputation and transparency
Published in Cogent psychology (31-12-2017)“…Computer programs (code) are integral to the functions of current society. Yet, little is known about why programmers trust code they did not create. The…”
Get full text
Journal Article -
9
Developing a platform to evaluate and assess the security of wearable devices
Published in Digital communications and networks (01-08-2019)“…Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain…”
Get full text
Journal Article -
10
A Risk Adaptive Access Control Model for the Service Mesh Architecture
Published in 2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI) (13-04-2024)“…Microservice architecture (MSA) applications can be built with a service mesh infrastructure layer that manages service-to-service communications through…”
Get full text
Conference Proceeding -
11
Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture
Published in 2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2022)“…The service mesh is a dedicated infrastructure layer in a microservice architecture. It manages service-to-service communication within an application between…”
Get full text
Conference Proceeding -
12
Automated Extraction of Security Profile Information from XAI Outcomes
Published in 2023 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (25-09-2023)“…Security applications use machine learning (ML) models and artificial intelligence (AI) to autonomously protect systems. However, security decisions are more…”
Get full text
Conference Proceeding -
13
Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks
Published in 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2021)“…Self-organization over ad hoc networks is of growing interest due to their application to collective adaptive systems of IoT devices, such as wearables and…”
Get full text
Conference Proceeding -
14
Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation
Published in Systems (Basel) (01-09-2020)“…Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The…”
Get full text
Journal Article -
15
Applying Security-Awareness to Service-Based Systems
Published in 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2021)“…A service-based system (SBS) dynamically composes third-party services to deliver comprehensive functionality. As adaptive systems, SBSs can substitute…”
Get full text
Conference Proceeding -
16
Assessing Adaptations based on Change Impacts
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS) (01-08-2020)“…When a self-adaptive system alters its functionality to operate in a dynamic environment, it may impact whether the system can remain in compliance with its…”
Get full text
Conference Proceeding -
17
Toward a Negotiation Framework for Self-Integration
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-08-2020)“…Self-integrating systems dynamically seek out external systems to help meet their local and global goals. To perform the integration, the systems must alter…”
Get full text
Conference Proceeding -
18
Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-08-2020)“…A self-adaptive system (SAS) requires automated planning that alters its behavior to properly operate in dynamic environments. To select a successful…”
Get full text
Conference Proceeding -
19
Adaptive Coordination to Complete Mission Goals
Published in 2018 IEEE 3rd International Workshops on Foundations and Applications of Self Systems (FASW) (01-09-2018)“…Autonomous systems have become incredibly common, with autonomous vehicles and drones dictating major research trends. Coordination of autonomous vehicles is…”
Get full text
Conference Proceeding -
20
Introducing Replaceability into Web Service Composition
Published in IEEE transactions on services computing (01-04-2014)“…By discovering and reusing relevant web services, an organization can select and compose those services that most closely meet its business and Quality of…”
Get full text
Journal Article