In the field of wireless communication, the reception and detection of vortex electromagnetic wave is undoubtedly the key to the use of orbital angular momentum (OAM) for communication. However, the misalignment betwe...
详细信息
DevOps is a methodology that seeks to unify development and operations teams in organizations, aiming to facilitate faster software delivery and promote collaboration to build a positive company culture. Our research ...
详细信息
ISBN:
(纸本)9798400717017
DevOps is a methodology that seeks to unify development and operations teams in organizations, aiming to facilitate faster software delivery and promote collaboration to build a positive company culture. Our research aims to investigate the current state-of-the-art of DevOps, align academic research with industry practices, and identify critical success factors. We conducted a comprehensive literature review using a variety of databases and search engines, which revealed that several factors are essential to the success of DevOps, including DevOps culture, automation processes, continuous integration, and deployment, monitoring, and feedback, standardization with tools, team leadership, and DecSecOps for security issues. While DevOps has gained significant attention, it remains essential to understand practitioners' perspectives. Our research has the potential to strengthen the concepts and ideas of critical success factors, broaden DevOps practices and perspectives for professionals, and enhance academic knowledge in this area.
Producing accurate software models is crucial in model-driven softwareengineering (MDE). However, modeling complex systems is an error-prone task that requires deep application domain knowledge. In the past decade, s...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Producing accurate software models is crucial in model-driven softwareengineering (MDE). However, modeling complex systems is an error-prone task that requires deep application domain knowledge. In the past decade, several automated techniques have been proposed to support academic and industrial practitioners by providing relevant modeling operations. Nevertheless, those techniques require a huge amount of training data that cannot be available due to several factors, e.g., privacy issues. the advent of large language models (LLMs) can support the generation of synthetic data although state-of-the-art approaches are not yet supporting the generation of modeling operations. To fill the gap, we propose a conceptual framework that combines modeling event logs, intelligent modeling assistants, and the generation of modeling operations using LLMs. In particular, the architecture comprises modeling components that help the designer specify the system, record its operation within a graphical modeling environment, and automatically recommend relevant operations. In addition, we generate a completely new dataset of modeling events by telling on the most prominent LLMs currently available. As a proof of concept, we instantiate the proposed framework using a set of existing modeling tools employed in industrial use cases within different European projects. To assess the proposed methodology, we first evaluate the capability of the examined LLMs to generate realistic modeling operations by relying on well-founded distance metrics. then, we evaluate the recommended operations by considering real-world industrial modeling artifacts. Our findings demonstrate that LLMs can generate modeling events even though the overall accuracy is higher when considering human-based operations. In this respect, we see generative AI tools as an alternative when the modeling operations are not available to train traditional IMAs specifically conceived to support industrial practitioners.
the availability of Large Language Models (LLMs) which can generate code, has made it possible to create tools that improve developer productivity. Integrated development environments or IDEs which developers use to w...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
the availability of Large Language Models (LLMs) which can generate code, has made it possible to create tools that improve developer productivity. Integrated development environments or IDEs which developers use to write software are often used as an interface to interact with LLMs. Although many such tools have been released, almost all of them focus on general-purpose programming languages. Domain-specific languages, such as those crucial for Information Technology (IT) automation, have not received much attention. Ansible is one such YAML-based IT automation-specific language. Ansible Lightspeed is an LLM-based service designed explicitly to generate Ansible YAML, given natural language prompt. In this paper, we present the design and implementation of the Ansible Lightspeed service. We then evaluate its utility to developers using diverse indicators, including extended utilization, analysis of user edited suggestions, as well as user sentiments analysis. the evaluation is based on data collected for 10,696 real users including 3,910 returning users. the code for Ansible Lightspeed service and the analysis framework is made available for others to use. To our knowledge, our study is the first to involve thousands of users of code assistants for domain-specific languages. We are also the first code completion tool to present N-Day user retention figures, which is 13.66% on Day 30. We propose an improved version of user acceptance rate, called Strong Acceptance rate, where a suggestion is considered accepted only if less than 50% of it is edited and these edits do not change critical parts of the suggestion. By focusing on Ansible, Lightspeed is able to achieve a strong acceptance rate of 49.08% for multi-line Ansible task suggestions. With our findings we provide insights into the effectiveness of small, dedicated models in a domain-specific context. We hope this work serves as a reference for softwareengineering and machine learning researchers exploring code c
Personas, a user characterisation, have been widely used in requirements engineering (RE) to enhance the understanding of end-users and their needs. However, the persona generation process is time-consuming and demand...
详细信息
this paper explores the integration of Multi-Agent Systems (MAS) and Large Language Models (LLMs) for auto-matic code generation, addressing the limitations of traditional manual coding. By conducting a comprehensive ...
详细信息
Due to the increasing amount of software and hardware in connected and autonomous cars, the attack surface is growing, which increases the risk of security attacks. Researchers proposed machine learning or deep learni...
详细信息
ISBN:
(纸本)9798400717017
Due to the increasing amount of software and hardware in connected and autonomous cars, the attack surface is growing, which increases the risk of security attacks. Researchers proposed machine learning or deep learning techniques to identify threats in in-vehicle networks. However, using these techniques is not enough to support the automotive industry since new processes or techniques must be conceptualized to make automotive systems more secure. therefore, this research work presents a methodology, Quantum-based Automotive threat Intelligence and Countermeasures (QUANTICAR), that integrates quantum optimization for CAN bus Intrusion Detection and the National Vulnerability Database (NVD) to understand the automotive attacks. In the first phase, QUANTICAR identifies the different types of attacks and then, based on the specific attack class, extracts new knowledge using the NVD. this contributes not only to improving attack detection but also to developing an Automotive knowledge Base that can support developers and security experts in the secure development of automotive components in compliance with ISO/SAE 21434.
Regression testing becomes expensive in terms of time when changes are often made. In order to simplify testing, supervised/unsupervised binary classification software Defect Prediction (SDP) techniques may rule out n...
详细信息
作者:
Yang, ShuoLi, HongruGuo, JianECNU
MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU
Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU
Xinjiang Teachers Coll Shanghai Peoples R China ECNU
Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
Withthe increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
Withthe increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. this paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad withthe ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.
In recent years, DevOps, the unification of development and operation workflows, has become a trend for the industrial software development lifecycle. Security activities turned into an essential field of application ...
详细信息
ISBN:
(纸本)9798400702174
In recent years, DevOps, the unification of development and operation workflows, has become a trend for the industrial software development lifecycle. Security activities turned into an essential field of application for DevOps principles as they are a fundamental part of secure software development in the industry. A common practice arising from this trend is the automation of security tests that analyze a software product from several perspectives. To effectively improve the security of the analyzed product, the identified security findings must be managed and looped back to the project team for stakeholders to take action. this management must cope with several challenges ranging from low data quality to a consistent prioritization of findings while following DevOps aims. To manage security findings withthe same efficiency as other activities in DevOps projects, a methodology for the management of industrial security findings minding DevOps principles is essential. In this paper, we propose a methodology for the management of security findings in industrial DevOps projects, summarizing our research in this domain and presenting the resulting artifact. As an instance of the methodology, we developed the Security Flama, a semantic knowledge base for the automated management of security findings. To analyze the impact of our methodology on industrial practice, we performed a case study on two DevOps projects of a multinational industrial enterprise. the results emphasize the importance of using such an automated methodology in industrial DevOps projects, confirm our approach's usefulness and positive impact on the studied projects, and identify the communication strategy as a crucial factor for usability in practice.
暂无评论