Search Results - "Gamble, Rose F."

Refine Results
  1. 1

    Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair by Alarcon, Gene M., Walter, Charles, Gibson, Anthony M., Gamble, Rose F., Capiola, August, Jessup, Sarah A., Ryan, Tyler J.

    Published in Systems (Basel) (01-03-2020)
    “…Automation and autonomous systems are quickly becoming a more engrained aspect of modern society. The need for effective, secure computer code in a timely…”
    Get full text
    Journal Article
  2. 2

    Outcomes of Emotional Content from Agile Team Forum Posts by Marshall, Allen, Gamble, Rose F., Hale, Matthew L.

    “…Social media and discussion centric collaborative tools have become an integral part of software development team communication. Accessible by mobile apps and…”
    Get full text
    Conference Proceeding
  3. 3

    Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards by Hale, Matthew L., Gamble, Rose F.

    Published in Requirements engineering (01-09-2019)
    “…Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various…”
    Get full text
    Journal Article
  4. 4

    DDoS Attacks in Service Clouds by Alqahtani, Sarra, Gamble, Rose

    “…The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services…”
    Get full text
    Conference Proceeding Journal Article
  5. 5

    Developing a platform to evaluate and assess the security of wearable devices by Hale, Matthew L., Lotfy, Kerolos, Gamble, Rose F., Walter, Charles, Lin, Jessica

    Published in Digital communications and networks (01-08-2019)
    “…Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain…”
    Get full text
    Journal Article
  6. 6

    CyberPhishing: A Game-Based Platform for Phishing Awareness Testing by Hale, Matthew L., Gamble, Rose F., Gamble, Philip

    “…Phishing attacks sap billions of dollars annually from unsuspecting individuals while compromising individual privacy. Companies and privacy advocates seek…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach by Alarcon, Gene M., Gamble, Rose F., Ryan, Tyler J., Walter, Charles, Jessup, Sarah A., Wood, David W., Capiola, August

    Published in Applied ergonomics (01-07-2018)
    “…Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the…”
    Get full text
    Journal Article
  8. 8

    Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation by Alarcon, Gene M., Gibson, Anthony M., Walter, Charles, Gamble, Rose F., Ryan, Tyler J., Jessup, Sarah A., Boyd, Brian E., Capiola, August

    Published in Systems (Basel) (01-09-2020)
    “…Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The…”
    Get full text
    Journal Article
  9. 9

    A Risk Adaptive Access Control Model for the Service Mesh Architecture by Alboqmi, Rami, Jahan, Sharmin, Gamble, Rose F.

    “…Microservice architecture (MSA) applications can be built with a service mesh infrastructure layer that manages service-to-service communications through…”
    Get full text
    Conference Proceeding
  10. 10

    Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture by Alboqmi, Rami, Jahan, Sharmin, Gamble, Rose F.

    “…The service mesh is a dedicated infrastructure layer in a microservice architecture. It manages service-to-service communication within an application between…”
    Get full text
    Conference Proceeding
  11. 11

    Automated Extraction of Security Profile Information from XAI Outcomes by Jahan, Sharmin, Alqahtani, Sarra, Gamble, Rose F., Bayesh, Masrufa

    “…Security applications use machine learning (ML) models and artificial intelligence (AI) to autonomously protect systems. However, security decisions are more…”
    Get full text
    Conference Proceeding
  12. 12

    Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks by Riley, Ian, Gamble, Rose F.

    “…Self-organization over ad hoc networks is of growing interest due to their application to collective adaptive systems of IoT devices, such as wearables and…”
    Get full text
    Conference Proceeding
  13. 13

    Applying Security-Awareness to Service-Based Systems by Jahan, Sharmin, Gamble, Rose F.

    “…A service-based system (SBS) dynamically composes third-party services to deliver comprehensive functionality. As adaptive systems, SBSs can substitute…”
    Get full text
    Conference Proceeding
  14. 14

    Assessing Adaptations based on Change Impacts by Jahan, Sharmin, Riley, Ian, Gamble, Rose F.

    “…When a self-adaptive system alters its functionality to operate in a dynamic environment, it may impact whether the system can remain in compliance with its…”
    Get full text
    Conference Proceeding
  15. 15

    Toward a Negotiation Framework for Self-Integration by Riley, Ian, Jahan, Sharmin, Gamble, Rose F.

    “…Self-integrating systems dynamically seek out external systems to help meet their local and global goals. To perform the integration, the systems must alter…”
    Get full text
    Conference Proceeding
  16. 16

    Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling by Jahan, Sharmin, Riley, Ian, Walter, Charles, Gamble, Rose F.

    “…A self-adaptive system (SAS) requires automated planning that alters its behavior to properly operate in dynamic environments. To select a successful…”
    Get full text
    Conference Proceeding
  17. 17

    MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases by Jahan, Sharmin, Riley, Ian, Walter, Charles, Gamble, Rose F., Pasco, Matt, McKinley, Philip K., Cheng, Betty H.C.

    Published in Future generation computer systems (01-08-2020)
    “…Security certification establishes that a given system satisfies properties and constraints as specified in the system security profile. Mechanisms and…”
    Get full text
    Journal Article
  18. 18

    Evaluating verification awareness as a method for assessing adaptation risk by Riley, Ian, Jahan, Sharmin, Marshall, Allen, Walter, Charles, Gamble, Rose F.

    Published in Future generation computer systems (01-06-2021)
    “…Self-integration requires a system to be self-aware and self-protecting of its functionality and communication processes to mitigate interference in…”
    Get full text
    Journal Article
  19. 19

    A patterned approach for linking knowledge-based systems to external resources by Davis, L., Gamble, R.F., Kimsen, S.

    “…Knowledge-based systems (KBSs) have been developed and used in industry and government as assistance systems, voting partner systems, and embedded…”
    Get full text
    Journal Article
  20. 20

    Assessing individual performance in Agile undergraduate software engineering teams by Gamble, Rose F., Hale, Matthew L.

    “…The Agile Software Development (ASD) process is at the forefront of rapid product development driven by changing customer requirements and a trusted,…”
    Get full text
    Conference Proceeding