Search Results - "Gamble, Rose F."
-
1
Would You Fix This Code for Me? Effects of Repair Source and Commenting on Trust in Code Repair
Published in Systems (Basel) (01-03-2020)“…Automation and autonomous systems are quickly becoming a more engrained aspect of modern society. The need for effective, secure computer code in a timely…”
Get full text
Journal Article -
2
Outcomes of Emotional Content from Agile Team Forum Posts
Published in 2016 IEEE/ACM 1st International Workshop on Emotional Awareness in Software Engineering (SEmotion) (01-05-2016)“…Social media and discussion centric collaborative tools have become an integral part of software development team communication. Accessible by mobile apps and…”
Get full text
Conference Proceeding -
3
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
Published in Requirements engineering (01-09-2019)“…Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various…”
Get full text
Journal Article -
4
DDoS Attacks in Service Clouds
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services…”
Get full text
Conference Proceeding Journal Article -
5
Developing a platform to evaluate and assess the security of wearable devices
Published in Digital communications and networks (01-08-2019)“…Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain…”
Get full text
Journal Article -
6
CyberPhishing: A Game-Based Platform for Phishing Awareness Testing
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…Phishing attacks sap billions of dollars annually from unsuspecting individuals while compromising individual privacy. Companies and privacy advocates seek…”
Get full text
Conference Proceeding Journal Article -
7
The influence of commenting validity, placement, and style on perceptions of computer code trustworthiness: A heuristic-systematic processing approach
Published in Applied ergonomics (01-07-2018)“…Computer programs are a ubiquitous part of modern society, yet little is known about the psychological processes that underlie reviewing code. We applied the…”
Get full text
Journal Article -
8
Trust Perceptions of Metadata in Open-Source Software: The Role of Performance and Reputation
Published in Systems (Basel) (01-09-2020)“…Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The…”
Get full text
Journal Article -
9
A Risk Adaptive Access Control Model for the Service Mesh Architecture
Published in 2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI) (13-04-2024)“…Microservice architecture (MSA) applications can be built with a service mesh infrastructure layer that manages service-to-service communications through…”
Get full text
Conference Proceeding -
10
Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture
Published in 2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2022)“…The service mesh is a dedicated infrastructure layer in a microservice architecture. It manages service-to-service communication within an application between…”
Get full text
Conference Proceeding -
11
Automated Extraction of Security Profile Information from XAI Outcomes
Published in 2023 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (25-09-2023)“…Security applications use machine learning (ML) models and artificial intelligence (AI) to autonomously protect systems. However, security decisions are more…”
Get full text
Conference Proceeding -
12
Employing Stochastic Multiplayer Games to Support Self-Organization over Ad Hoc Networks
Published in 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2021)“…Self-organization over ad hoc networks is of growing interest due to their application to collective adaptive systems of IoT devices, such as wearables and…”
Get full text
Conference Proceeding -
13
Applying Security-Awareness to Service-Based Systems
Published in 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-09-2021)“…A service-based system (SBS) dynamically composes third-party services to deliver comprehensive functionality. As adaptive systems, SBSs can substitute…”
Get full text
Conference Proceeding -
14
Assessing Adaptations based on Change Impacts
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS) (01-08-2020)“…When a self-adaptive system alters its functionality to operate in a dynamic environment, it may impact whether the system can remain in compliance with its…”
Get full text
Conference Proceeding -
15
Toward a Negotiation Framework for Self-Integration
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-08-2020)“…Self-integrating systems dynamically seek out external systems to help meet their local and global goals. To perform the integration, the systems must alter…”
Get full text
Conference Proceeding -
16
Extending Context Awareness by Anticipating Uncertainty with Enki and Darjeeling
Published in 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C) (01-08-2020)“…A self-adaptive system (SAS) requires automated planning that alters its behavior to properly operate in dynamic environments. To select a successful…”
Get full text
Conference Proceeding -
17
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
Published in Future generation computer systems (01-08-2020)“…Security certification establishes that a given system satisfies properties and constraints as specified in the system security profile. Mechanisms and…”
Get full text
Journal Article -
18
Evaluating verification awareness as a method for assessing adaptation risk
Published in Future generation computer systems (01-06-2021)“…Self-integration requires a system to be self-aware and self-protecting of its functionality and communication processes to mitigate interference in…”
Get full text
Journal Article -
19
A patterned approach for linking knowledge-based systems to external resources
Published in IEEE transactions on systems, man and cybernetics. Part B, Cybernetics (01-02-2004)“…Knowledge-based systems (KBSs) have been developed and used in industry and government as assistance systems, voting partner systems, and embedded…”
Get full text
Journal Article -
20
Assessing individual performance in Agile undergraduate software engineering teams
Published in 2013 IEEE Frontiers in Education Conference (FIE) (01-10-2013)“…The Agile Software Development (ASD) process is at the forefront of rapid product development driven by changing customer requirements and a trusted,…”
Get full text
Conference Proceeding