softwareengineering is a 52 years vast field of knowledge. Along the time, a massive quantity of techniques, methods, and tools have been proposed by a vast academic and industrial community, involving a large spectr...
详细信息
ISBN:
(纸本)9789080328228
softwareengineering is a 52 years vast field of knowledge. Along the time, a massive quantity of techniques, methods, and tools have been proposed by a vast academic and industrial community, involving a large spectrum of subjects. Aiming to compile the body of knowledge of softwareengineering, we created "the softwareengineering Observatory Portal". the portal allows analyzing softwareengineering evolution and researchers' contributions through data visualization. So far, the portal relies on data of the internationalconference on softwareengineering (ICSE) and IEEE Transactions of softwareengineering (TSE), the premier venues in the area. A video explaining the usage of the portal is available at https://***/57Y80z9ymVw. the portal is available at https://***/docs/thesoftwareengineeringObservatoryPortal/.
Collaborative Online international Learning (coil) activities have become a widespread approach to promote internationalization because it is resilient, as proven during the pandemic COVID-19. Also, coil activities ha...
详细信息
the invention of the internet has revolutionized various fields, promoting rapid progress across many sectors, including economics, social sciences, politics, geography, and entertainment. Advancements in computer net...
详细信息
Due to the increasing amount of software and hardware in connected and autonomous cars, the attack surface is growing, which increases the risk of security attacks. Researchers proposed machine learning or deep learni...
详细信息
ISBN:
(纸本)9798400717017
Due to the increasing amount of software and hardware in connected and autonomous cars, the attack surface is growing, which increases the risk of security attacks. Researchers proposed machine learning or deep learning techniques to identify threats in in-vehicle networks. However, using these techniques is not enough to support the automotive industry since new processes or techniques must be conceptualized to make automotive systems more secure. therefore, this research work presents a methodology, Quantum-based Automotive threat Intelligence and Countermeasures (QUANTICAR), that integrates quantum optimization for CAN bus Intrusion Detection and the National Vulnerability Database (NVD) to understand the automotive attacks. In the first phase, QUANTICAR identifies the different types of attacks and then, based on the specific attack class, extracts new knowledge using the NVD. this contributes not only to improving attack detection but also to developing an Automotive knowledge Base that can support developers and security experts in the secure development of automotive components in compliance with ISO/SAE 21434.
In the realm of software development, code smells pose considerable challenges during system maintenance and evolution. Although several tools identify code smells, few provide real-time detection and refactoring guid...
详细信息
ISBN:
(数字)9783031641824
ISBN:
(纸本)9783031641817;9783031641824
In the realm of software development, code smells pose considerable challenges during system maintenance and evolution. Although several tools identify code smells, few provide real-time detection and refactoring guidance, which are integral for efficient coding practices. this paper presents an advanced tool for live detection and semi-automatic resolution of data clumps and global data, distinct types of code smell in Java. Our tool's prowess lies in its analysis of project structures, abstract syntax trees, and variable types to identify and address data clumps promptly. We successfully integrated our live detection technique into an IntelliJ plugin, achieving remarkable real-time detection with a median time of less than 1 s in 4 project case studies. Our method was extended to live detect Global Data. We are defining 9 base test cases for data clumps. the study contributes to the ongoing discourse on effective and efficient methods to remove code smells, enhancing software quality and developer productivity.
this study aimed to investigate ventilation rates in classrooms and the influence on students’ respiratory infection. It was conducted in 47 classes of ten elementary school in urban, suburban and rural area of Tianj...
详细信息
Mission engineering seeks to develop multiple Mission threads (MT) that flexibly bring an underlying System of System (SoS) together to accomplish one or more missions. In SoS, a constituent system contributes to the ...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
Mission engineering seeks to develop multiple Mission threads (MT) that flexibly bring an underlying System of System (SoS) together to accomplish one or more missions. In SoS, a constituent system contributes to the capability of other systems, and different MT pose unique integration of SoS, thereby leading to distinct dependence between systems. Furthermore, in an operational environment, systems in SoS may face degradation in their capability due to an adversary action or natural causes which propagates through the SoS, impacting other systems. this paper seeks to address the question of selecting a MT when the constituent systems of SoS face a degradation in their operational capability. First this involves quantifying the interdependence between systems in SoS, and then investigating multiple MTs with common degraded conditions. We utilize System Operational Dependency Analysis method to quantify interdependence in the MTs and show presence of latent interactions in MTs because different MTs are uniquely impacted by the same underlying degradation in systems. the approach provides an empirical reasoning capability to select the most promising MT when systems in a SoS are not operating at their optimal capacity.
Today's software systems are neither built nor operated in isolation and have to adapt to their environment. Uncertainty in the software and its context is inherently unavoidable and should be actively analyzed an...
详细信息
ISBN:
(纸本)9798350311921
Today's software systems are neither built nor operated in isolation and have to adapt to their environment. Uncertainty in the software and its context is inherently unavoidable and should be actively analyzed and managed already at design time. this includes analyzing the impact of uncertainty on a system's quality properties, which quickly becomes critical, e.g., regarding confidentiality. When not handled comprehensively, confidentiality violations can occur due to uncertainty that void previous analysis results. there exist many approaches to classify and handle uncertainty. However, without locating the impact of uncertainty, precise mitigation is often impossible. In this paper, we present an uncertainty impact analysis that shows potential confidentiality violations induced by different uncertainty types like structural, behavioral, or environmental uncertainty. this is achieved by combining software-architectural and data flow-based propagation of uncertainty. Our tool-supported approach is a first step towards predicting the impact of uncertainty without laborious modeling and testing of what-if scenarios. the case study-based evaluation shows that our impact analysis accurately predicts confidentiality violations with a high F1-score of 0.94 while reducing the effort of manual analysis by 82%.
this research paper introduces an innovative Smart Street Light System that optimizes street lighting operations by harnessing ambient light levels to govern the activation and deactivation of streetlights. Lux value ...
详细信息
暂无评论