The relatively recent public release of generative artificial intelligence (AI) systems has ignited a significant leap in awareness of the capabilities of AI. In parallel, there has been a recognition of AI system lim...
详细信息
Log files generated by software systems can be utilized as a valuable resource in data-driven approaches to improve the system health and stability. These files often contain valuable information about runtime executi...
详细信息
ISBN:
(纸本)9798350381566;9798350381559
Log files generated by software systems can be utilized as a valuable resource in data-driven approaches to improve the system health and stability. These files often contain valuable information about runtime execution, and their effective monitoring requires analyzing an increasingly large volume of data logs. In this paper, a graph mining technique for log parsing is presented, which is source agnostic to the system. This means that the technique can function regardless of the source of the logs, making it more scalable and reusable. Unlike the existing approaches that rely heavily on domain knowledge and regular expression patterns, the proposed approach uses graph models and semantic analysis to detect data patterns with minimal user input. This makes it easy to implement it in a variety of scenarios where application-based logs may differ significantly. The proposed parsing technique is evaluated over seven datasets. It achieves the best performance on the Thunderbird dataset, where the technique takes 3.87 seconds for 2000 logs, while obtaining precision, recall and F1 measure higher than 0.99.
A software Bill of Materials (SBOM) describes, in a structured, machine-readable format, the open-source and proprietary components that constitute a software product, including their licenses, versions, vendors, vuln...
详细信息
ISBN:
(纸本)9798350395693;9798350395686
A software Bill of Materials (SBOM) describes, in a structured, machine-readable format, the open-source and proprietary components that constitute a software product, including their licenses, versions, vendors, vulnerabilities, and dependency relationships. SBOMs enable practitioners to gain visibility into the software supply chain and monitor any risks associated with software security, licensing, and more. In this industry paper, we present the findings of 10 semi-structured interviews with practitioners with different roles in six different software companies operating in Italy, some of which being very large multinationals. The gathered information indicates that the adoption of SBOMs is low, yet the attention of the software industry to software supply chain-related challenges is high. A possible reason behind this outcome is that the software industry has limited knowledge of SBOMs and software supply chain regulations. Although some participants showed a growing interest in SBOMs, the Italian software industry seems to respond less promptly to this technology. We plan to use these results and those from past research to design a survey with practitioners to have a complete picture of SBOM usage in the software industry.
AI software is regarded as the key to the formation of new domain and new quality combat capabilities in the future. In response to the characteristics of randomness, autonomy, and learning of AI software, traditional...
详细信息
DAPSys software is a system software that will perform detection, analysis, and protection by providing features like graphical password authentication, VPN detection, traffic analysis by packetsniffing, RFID blocking...
详细信息
The proceedings contain 22 papers. The topics discussed include: responsive infrastructure with cybersecurity for automated high availability DevSecOps processes;natural language interface to database using the Dialog...
ISBN:
(纸本)9781728155555
The proceedings contain 22 papers. The topics discussed include: responsive infrastructure with cybersecurity for automated high availability DevSecOps processes;natural language interface to database using the DialogFlow voice recognition and text conversion api;cybersecurity in an industrial internet of things environment (IIoT): challenges for standards systems and evaluation models;verdict analysis and defect life cycle management in test automation environments;predictive industrial maintenance with a viable systems model and maintenance 4.0;detection of vegetation using unmanned aerial vehicles images: a systematic review;and application to control dog feeding using the arduino platform and GSM/GPRS technology.
software testing is an important part of the development cycle, yet it requires specialized expertise and substantial developer effort to adequately test software. Recent discoveries of the capabilities of large langu...
详细信息
ISBN:
(纸本)9798350329964
software testing is an important part of the development cycle, yet it requires specialized expertise and substantial developer effort to adequately test software. Recent discoveries of the capabilities of large language models (LLMs) suggest that they can be used as automated testing assistants, and thus provide helpful information and even drive the testing process. To highlight the potential of this technology, we present a taxonomy of LLM-based testing agents based on their level of autonomy, and describe how a greater level of autonomy can benefit developers in practice. An example use of LLMs as a testing assistant is provided to demonstrate how a conversational framework for testing can help developers. This also highlights how the often criticized "hallucination" of LLMs can be beneficial for testing. We identify other tangible benefits that LLM-driven testing agents can bestow, and also discuss potential limitations.
Quantum computing (QC) shows the potential to trigger a paradigm shift for numerous industries. As an emerging technology, methodological support for designing and developing QC-based applications is lacking. This pap...
详细信息
ISBN:
(纸本)9780998133171
Quantum computing (QC) shows the potential to trigger a paradigm shift for numerous industries. As an emerging technology, methodological support for designing and developing QC-based applications is lacking. This paper presents the results of a case study applying consortium research in order to perform a requirements engineering process for two QC-based applications in the manufacturing industry. The results show the differences between requirements engineering for QC applications and conventional software applications. The major findings point to the need for QC knowledge and best practices for a successful requirements engineering process and elaborate on the main differences between QC application- and software application requirements.
This study aims to evaluate the effectiveness of an emerging softwareengineering development method through AB testing experiments. As a commonly used online experimental method, AB testing is used to compare the per...
详细信息
The code repository stores all the code, configuration files, and historical versions of the enterprise, which is an essential tool in the software development process. However, it also brings unprecedented security t...
详细信息
暂无评论