Papers
2024
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
H Chen, MA Babar
ACM Computing Surveys 56 (6), 1-38
2024
Link
Evaluation of distributed data processing frameworks in hybrid clouds
F Ullah, S Dhingra, X Xia, MA Babar
Journal of Network and Computer Applications, 103837
2024
Link
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
O Sarker, A Jayatilaka, S Haggag, C Liu, MA Babar
Journal of Systems and Software 208, 111899
2024
Link
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions
A Jayatilaka, NAG Arachchilage, MA Babar
arXiv preprint arXiv:2401.13199
2024
Link
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study
THM Le, X Du, MA Babar
arXiv preprint arXiv:2401.11105
Link
2023
An empirical study on secure usage of mobile health apps: The attack simulation approach
B Aljedaani, A Ahmad, M Zahedi, MA Babar
Information and Software Technology 163, 107285
Link
Defending SDN against packet injection attacks using deep learning
AT Phu, B Li, F Ullah, TU Huque, R Naha, MA Babar, H Nguyen
Computer Networks 234, 109935
Link
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels
MM Kholoosi, MA Babar, C Yilmaz
arXiv preprint arXiv:2308.11862
Link
Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu
V Prokhorenko, C Islam, MA Babar
arXiv preprint arXiv:2307.04458
Link
Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
B Sabir, MA Babar, S Abuadbba
arXiv preprint arXiv:2307.01225
Link
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices
LH Iwaya, MA Babar, A Rashid
IEEE Transactions on Software Engineering
Link
Detecting Misuses of Security APIs: A Systematic Review
Z Mousavi, C Islam, MA Babar, A Abuadbba, K Moore
arXiv preprint arXiv:2306.08869
Link
Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions
ME Ali, MA Cheema, T Hashem, A Ulhaq, MA Babar
arXiv preprint arXiv:2306.06600
Link
Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions
M Eunus Ali, M Aamir Cheema, T Hashem, A Ulhaq, MA Babar
arXiv e-prints, arXiv: 2306.06600
Link
Mitigating ML Model Decay in Continuous Integration with Data Drift Detection: An Empirical Study
AK Arani, THM Le, M Zahedi, MA Babar
arXiv preprint arXiv:2305.12736
link
Systematic Literature Review on Application of Machine Learning in Continuous Integration
AK Arani, THM Le, M Zahedi, MA Babar
arXiv preprint arXiv:2305.12695
Link
Cost Sharing Public Project with Minimum Release Delay
M Guo, D Goel, G Wang, Y Yang, MA Babar
arXiv preprint arXiv:2305.11657
Link
A qualitative study of architectural design issues in DevOps
M Shahin, A Rezaei Nasab, M Ali Babar
Journal of Software: Evolution and Process 35 (5), e2379
Link
Apiro: A framework for automated security tools api recommendation
ZT Sworna, C Islam, MA Babar
ACM Transactions on Software Engineering and Methodology 32 (1), 1-42
Link
A review on c3i systems’ security: Vulnerabilities, attacks, and countermeasures
H Ahmad, I Dharmadasa, F Ullah, MA Babar
ACM Computing Surveys 55 (9), 1-38
Link
Resource Utilization of Distributed Databases in Edge-Cloud Environment
Y Mansouri, V Prokhorenko, F Ullah, MA Babar
IEEE Internet of Things Journal
Link
Understanding Socio-Technical Aspects of Software Security Patch Management
MA Babar
2023
Link
On the privacy of mental health apps: An empirical investigation and its implications for app development
LH Iwaya, MA Babar, A Rashid, C Wijayarathna
Empirical Software Engineering 28 (1), 2
Link
End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers
B Aljedaani, A Ahmad, M Zahedi, MA Babar
Journal of Systems and Software 195, 111519
Link
Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry
X Zhou, S Li, L Cao, H Zhang, Z Jia, C Zhong, Z Shan, MA Babar
Journal of Systems and Software 195, 111521
Link
2022
A survey on data-driven software vulnerability assessment and prioritization
THM Le, H Chen, MA Babar
ACM Computing Surveys 55 (5), 1-39
Link
Design and evaluation of adaptive system for big data cyber security analytics
F Ullah, MA Babar, A Aleti
Expert Systems with Applications 207, 117948
Link
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices
LH Iwaya, MA Babar, A Rashid
arXiv preprint arXiv:2211.08916
Link
Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support
RN Rajapakse, M Zahedi, MA Babar
arXiv preprint arXiv:2211.06953
Link
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector
N Dissanayake, M Zahedi, A Jayatilaka, MA Babar
Proceedings of the ACM on Human-Computer Interaction 6 (CSCW2), 1-29
Link
Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors
B Sabir, MA Babar, R Gaire, A Abuadbba
IEEE Transactions on Dependable and Secure Computing
Link
Systematic scalability modeling of QoS-aware dynamic service composition
L Duboc, R Bahsoon, F Alrebeish, C Mera-Gómez, V Nallur, R Kazman, ...
ACM Transactions on Autonomous and Adaptive Systems 16 (3-4), 1-39
Link
A Survey on UAV-enabled Edge Computing: Resource Management Perspective
X Xia, SMM Fattah, MA Babar
arXiv preprint arXiv:2210.06679
Link
Mechanism Design for Public Projects via Three Machine Learning Based Approaches
M Guo, D Goel, G Wang, R Guo, Y Sakurai, MA Babar
2022
Link
A framework for automating deployment and evaluation of blockchain networks
NK Tran, MA Babar, A Walters
Journal of Network and Computer Applications 206, 103460
Link
Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases
Y Mansouri, F Ullah, S Dhingra, MA Babar
arXiv preprint arXiv:2209.09487
Link
Post-operative Use of Abdominal Binders: Bound to Tradition?
IB Khalid, M Babar, I Ahmed
Journal of Cancer & Allied Specialties 8 (2), 463-463
Link
Mod2Dash: A Framework for Model-Driven Dashboards Generation
L Jiang, NK Tran, M Ali Babar
Proceedings of the ACM on Human-Computer Interaction 6 (EICS), 1-28
Link
SmartValidator: A framework for automatic identification and classification of cyber threat data
C Islam, MA Babar, R Croft, H Janicke
Journal of Network and Computer Applications 202, 103370
Link
Systematic literature review on cyber situational awareness visualizations
L Jiang, A Jayatilaka, M Nasim, M Grobler, M Zahedi, MA Babar
IEEE Access 10, 57525-57554
Link
Data preparation for software vulnerability prediction: A systematic literature review
R Croft, Y Xie, MA Babar
IEEE Transactions on Software Engineering 49 (3), 1044-1063
Link
Software security patch management-A systematic literature review of challenges, approaches, tools and practices
N Dissanayake, A Jayatilaka, M Zahedi, MA Babar
Information and Software Technology 144, 106771
Link
Runtime Software Patching: Taxonomy, Survey and Future Directions
C Islam, V Prokhorenko, MA Babar
arXiv preprint arXiv:2203.12132
Link
A Framework for Automating Deployment and Evaluation of Blockchain Networks
N Khoi Tran, MA Babar, A Walters
Muhammad Ali and Walters, Andrew, A Framework for Automating Deployment and …
Link
Toward energy‐efficient data management design for sustainable cities and societies
M Babar, S Javaid, A Saeed Khattak, A Ali
Transactions on Emerging Telecommunications Technologies 33 (2), e3821
Link
On the scalability of big data cyber security analytics systems
F Ullah, MA Babar
Journal of Network and Computer Applications 198, 103294
Link
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
LH Iwaya, MA Babar, A Rashid, C Wijayarathna
arXiv preprint arXiv:2201.09006
Link
NLP methods in host-based intrusion detection Systems: A systematic review and future directions
ZT Sworna, Z Mousavi, MA Babar
arXiv preprint arXiv:2201.08066
Link
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
H Chen, MA Babar
arXiv preprint arXiv:2201.04736
Link
A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment
F Ullah, I Mohammed, MA Babar
arXiv preprint arXiv:2201.01972
Link
Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds
F Ullah, S Dhingra, X Xia, MA Babar
arXiv preprint arXiv:2201.01948
Link
International Journal of Agriculture and Biosciences
W Khalid, HB Sajid, H Noor, M Babar, F Ullah, M Umar, MI ul Haq, N Tahir
Int J Agri Biosci 11 (3), 194-198
Link
Relationships between software architecture and source code in practice: An exploratory survey and interview
F Tian, P Liang, MA Babar
Information and Software Technology 141, 106705
Link
An empirical study of developers’ discussions about security challenges of different programming languages
R Croft, Y Xie, M Zahedi, MA Babar, C Treude
Empirical Software Engineering 27, 1-52
Link
Challenges and solutions when adopting DevSecOps: A systematic review
RN Rajapakse, M Zahedi, MA Babar, H Shen
Information and software technology 141, 106700
Link
2021
Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline
A Jayatilaka, N Beu, I Baetu, M Zahedi, MA Babar, L Hartley, ...
arXiv preprint arXiv:2112.06356
Link
Privacy-aware data forensics of VRUs using machine learning and big data analytics
M Babar, MU Tariq, AS Almasoud, MD Alshehri
Security and Communication Networks 2021, 1-9
Link
The impact of traceability on software maintenance and evolution: A mapping study
F Tian, T Wang, P Liang, C Wang, AA Khan, MA Babar
Journal of Software: Evolution and Process 33 (10), e2374
Link
Revenue maximizing markets for zero-day exploits
M Guo, G Wang, H Hata, MA Babar
Autonomous Agents and Multi-Agent Systems 35 (2), 36
Link
Evaluation of distributed databases in hybrid clouds and edge computing: Energy, bandwidth, and storage consumption
Y Mansouri, V Prokhorenko, F Ullah, MA Babar
arXiv preprint arXiv:2109.07260
Link
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors
A Jayatilaka, NAG Arachchilage, MA Babar
arXiv preprint arXiv:2108.04766
Link
Challenges with developing secure mobile health applications: Systematic review
B Aljedaani, MA Babar
JMIR mHealth and uHealth 9 (6), e15654
Link
Machine learning for detecting data exfiltration: A review
B Sabir, F Ullah, MA Babar, R Gaire
ACM Computing Surveys (CSUR) 54 (3), 1-47
Link
A review of edge computing: Features and resource virtualization
Y Mansouri, MA Babar
Journal of Parallel and Distributed Computing 150, 155-183
Link
Challenges and solutions when adopting DevSecOps: A systematic review
RN Rajapakse, M Zahedi, MA Babar, H Shen
arXiv preprint arXiv:2103.08266
Link
ReinforceBug: A framework to generate adversarial textual examples
B Sabir, MA Babar, R Gaire
arXiv preprint arXiv:2103.08306
Link
Understanding and addressing quality attributes of microservices architecture: A Systematic literature review
S Li, H Zhang, Z Jia, C Zhong, C Zhang, Z Shan, J Shen, MA Babar
Information and software technology 131, 106449
Link
End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers
B Aljedaani, A Ahmad, M Zahedi, MA Babar
arXiv preprint arXiv:2101.10412
Link
Effect or Program Constructs on Code Readability and Predicting Code Readability Using Statistical Modeling
A Batool, MB Bashir, M Babar, A Sohail, N Ejaz
Foundations of Computing and Decision Sciences 46 (2), 127-145
Link
End-users’ knowledge and perception about security of mobile health apps: An empirical study
B Aljedaani, A Ahmad, M Zahedi, MA Babar
arXiv preprint ArXiv:2101.10412 v3
Link
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs
NK Tran, MA Babar, J Boan
Journal of Network and Computer Applications 173, 102844
Link
2020
Architectural design space for modelling and simulation as a service: A review
M Shahin, MA Babar, MA Chauhan
Journal of Systems and Software 170, 110752
Link
An automated implementation of hybrid cloud for performance evaluation of distributed databases
Y Mansouri, V Prokhorenko, MA Babar
Journal of Network and Computer Applications 167, 102740
Link
Sam-sos: A stochastic software architecture modeling and verification approach for complex system-of-systems
A Mohsin, NK Janjua, SMS Islam, MA Babar
IEEE Access 8, 177580-177603
Link
Security and privacy for mHealth and uHealth systems: a systematic mapping study
LH Iwaya, A Ahmad, MA Babar
IEEE Access 8, 150081-150112
Link
The impact of distance on performance and scalability of distributed database systems in hybrid clouds
Y Mansouri, MA Babar
arXiv preprint arXiv:2007.15826
Link
Deep learning for source code modeling and generation: Models, applications, and challenges
THM Le, H Chen, MA Babar
ACM Computing Surveys (CSUR) 53 (3), 1-38
Link
Reliability and robustness analysis of machine learning based phishing url detectors
B Sabir, MA Babar, R Gaire, A Abuadbba
arXiv preprint arXiv:2005.08454
Link
An evasion attack against ml-based phishing url detectors
B Sabir, MA Babar, R Gaire
arXiv e-prints, arXiv: 2005.08454
Link
Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems
JEL Hachem, V Chiprianov, MA Babar, TAL Khalil, P Aniorte
Journal of Systems and Software 162, 110484
Link
Architectural resilience in cloud, fog and edge systems: A survey
V Prokhorenko, MA Babar
IEEE Access 8, 28078-28095
Link
Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites
THM Le, R Croft, D Hin, MA Babar
CoRR abs/2008.04176
Link
Code readability management of high-level programming languages: a comparative study
MU Tariq, MB Bashir, M Babar, A Sohail
International Journal of Advanced Computer Science and Applications 11 (3)
Link
2019
A review on requirements engineering for internet of things (loT) applications
S Kaleem, S Ahmad, M Babar, V Akre, A Raian, F Ullah
2019 Sixth HCT Information Technology Trends (ITT), 269-275 4 2019
Link
Game theoretical modelling of network/cybersecurity
A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott
IEEE Access 7, 154167-154179 17 2019
Link
Ethnographic research in software engineering: a critical review and checklist
H Zhang, X Huang, X Zhou, H Huang, MA Babar
Proceedings of the 2019 27th ACM joint meeting on European software … 18 2019
Link
Gathering cyber threat intelligence from Twitter using novelty classification
BD Le, G Wang, M Nasim, A Babar
arXiv preprint arXiv:1907.01755 43 2019
Link
Internet of things search engine
NK Tran, QZ Sheng, MA Babar, L Yao, WE Zhang, S Dustdar
Communications of the ACM 62 (7), 66-73 19 2019
Link
An empirical study of architecting for continuous delivery and deployment
M Shahin, M Zahedi, MA Babar, L Zhu
Empirical Software Engineering 24, 1061-1108 58 2019
Link
An empirical study of the effectiveness of software architecture evaluation meetings
MA Babar, H Shen, S Biffl, D Winkler
IEEE Access 7, 79069-79084 5 2019
Link
Architectural tactics for big data cybersecurity analytics systems: a review
F Ullah, MA Babar
Journal of Systems and Software 151, 81-118 89 2019
Link
A multi-vocal review of security orchestration
C Islam, MA Babar, S Nepal
ACM Computing Surveys (CSUR) 52 (2), 1-45 70 2019
Link
Welcome message from the general chair and program co-chairs
MA Babar, S Ali, V Garousi
PervasiveHealth: Pervasive Computing Technologies for Healthcare 2019
Link
An architecture-driven adaptation approach for big data cyber security analytics
F Ullah, MA Babar
2019 IEEE International Conference on Software Architecture (ICSA), 41-50 8 2019
Link
Special issue on architecting for hyper connectivity and hyper virtualization
B Tekinerdogan, U Zdun, MA Babar
Journal of Systems and Software 149, 531-532 2019
Link
Agile approaches for teaching and learning software architecture design processes and methods
MA Chauhan, CW Probst, MA Babar
Agile and Lean Concepts for Teaching and Learning: Bringing Methodologies … 2 2019
Link
Conference
2023
A Goal-Driven Approach to Support Decision-Making with Incomplete Information in Cyber Operations
A Dawoud, G Mahala, C Islam, W Mayer, A Ghose, MA Babar, ...
International Conference on Advanced Information Systems Engineering, 77-85
Link
Data quality for software vulnerability datasets
R Croft, MA Babar, MM Kholoosi
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)
Link
IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools’ APIs
ZT Sworna, MA Babar, A Sreekumar
2023 IEEE International Conference on Software Analysis, Evolution and …
Link
Sok: Machine learning for continuous integration
AK Arani, M Zahedi, THM Le, MA Babar
2023 IEEE/ACM International Workshop on Cloud Intelligence & AIOps (AIOps)
Link
SoK: Machine Learning for Continuous Integration
A Kazemi Arani, M Zahedi, THM Le, MA Babar
arXiv e-prints, arXiv: 2304.02829
Link
A Study on Early & Non-Intrusive Security Assessment for Container Images
MU Haque, MA Babar
ENASE, 640-647
link
2022
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks
Y Xie, H Zhang, MA Babar
2022 IEEE 22nd International Conference on Software Quality, Reliability and …
Link
Mining software repositories for security: data quality issues lessons from trenches (keynote)
M Ali Babar
Proceedings of the 1st International Workshop on Mining Software …
Link
An Empirical Study of Automation in Software Security Patch Management
N Dissanayake, A Jayatilaka, M Zahedi, MA Babar
Proceedings of the 37th IEEE/ACM International Conference on Automated …
Link
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems
N Khoi Tran, B Sabir, MA Babar, N Cui, M Abolhasan, J Lipman
European Conference on Software Architecture, 49-65
Link
On the use of fine-grained vulnerable code statements for software vulnerability assessment models
THM Le, MA Babar
Proceedings of the 19th International Conference on Mining Software …
Link
Noisy label learning for security defects
R Croft, MA Babar, H Chen
Proceedings of the 19th International Conference on Mining Software …
Link
LineVD: Statement-level vulnerability detection using graph neural networks
D Hin, A Kan, H Chen, MA Babar
Proceedings of the 19th International Conference on Mining Software …
Link
An investigation into inconsistency of software vulnerability severity across data sources
R Croft, MA Babar, L Li
2022 IEEE International Conference on Software Analysis, Evolution and …
Link
Well begun is half done: An empirical study of exploitability & impact of base-image vulnerabilities
MU Haque, MA Babar
2022 IEEE International Conference on Software Analysis, Evolution and …
Link
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
MU Haque, MM Kholoosi, MA Babar
2022 IEEE International Conference on Software Analysis, Evolution and …
Link
2021
Automated security assessment for the internet of things
X Duan, M Ge, THM Le, F Ullah, S Gao, X Lu, MA Babar
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing …
Link
An empirical study of rule-based and learning-based approaches for static application security testing
R Croft, D Newlands, Z Chen, MA Babar
Proceedings of the 15th ACM/IEEE international symposium on empirical …
Link
An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps
RN Rajapakse, M Zahedi, MA Babar
Proceedings of the 15th ACM/IEEE International Symposium on Empirical …
Link
Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning
THM Le, D Hin, R Croft, MA Babar
2021 36th IEEE/ACM International Conference on Automated Software …
Link
Taxonomy of edge blockchain network designs
NK Tran, MA Babar
European Conference on Software Architecture, 172-180
Link
A grounded theory of the role of coordination in software security patch management
N Dissanayake, M Zahedi, A Jayatilaka, MA Babar
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …
Link
A large-scale study of security vulnerability support on developer q&a websites
THM Le, R Croft, D Hin, MA Babar
Evaluation and assessment in software engineering, 109-118
Link
Designing a security platform for collaborating autonomous systems-an experience report
MA Chauhan, MA Babar, S Grainger
2021 IEEE 18th International Conference on Software Architecture Companion …
Link
Logdp: Combining dependency and proximity for log-based anomaly detection
Y Xie, H Zhang, B Zhang, MA Babar, S Lu
Service-Oriented Computing: 19th International Conference, ICSOC 2021 …
Link
2020
Blockchain-based solutions for IoT: A tertiary study
Q Xu, X Chen, S Li, H Zhang, MA Babar, NK Tran
2020 IEEE 20th International Conference on Software Quality, Reliability and …
Link
Security awareness of end-users of mobile health applications: an empirical study
B Aljedaani, A Ahmad, M Zahedi, M Ali Babar
MobiQuitous 2020-17th EAI International Conference on Mobile and Ubiquitous …
Link
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
B Aljedaani, A Ahmad, M Zahedi, MA Babar
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 208-217
Link
Challenges in docker development: A large-scale study using stack overflow
MU Haque, LH Iwaya, MA Babar
Proceedings of the 14th ACM/IEEE International Symposium on Empirical …
Link
Puminer: Mining security posts from developer question and answer websites with pu learning
THM Le, D Hin, R Croft, MA Babar
Proceedings of the 17th International Conference on Mining Software …
Link
An evidence-based inquiry into the use of grey literature in software engineering
H Zhang, X Zhou, X Huang, H Huang, MA Babar
Proceedings of the ACM/IEEE 42nd International Conference on Software …
Link
On the role of software architecture in DevOps transformation: An industrial case study
M Shahin, MA Babar
Proceedings of the International Conference on Software and System Processes …
Link
Mining questions asked about continuous software engineering: A case study of stack overflow
M Zahedi, RN Rajapakse, MA Babar
Proceedings of the 24th International Conference on Evaluation and …
Link
Anatomy, concept, and design space of blockchain networks
NK Tran, MA Babar
2020 IEEE International Conference on Software Architecture (ICSA), 125-134
Link
Internet of things based smart community design and planning using Hadoop-based big data analytics
M Babar, W Iqbal, S Kaleem
Advances in Information and Communication: Proceedings of the 2019 Future of …
Link
Automatic Identification of Architecture Smell Discussions from Stack Overflow.
F Tian, F Lu, P Liang, MA Babar
SEKE, 451-456
Link
Architecture-centric support for integrating security tools in a security orchestration platform
C Islam, MA Babar, S Nepal
Software Architecture: 14th European Conference, ECSA 2020, L'Aquila, Italy …
Link
2019
Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation
F Ullah, MA Babar
2019 20th International Conference on Parallel and Distributed Computing … 3 2019
Link
A Framework for Internet of Things Search Engines Engineering
NK Tran, MA Babar, QZ Sheng, J Grundy
2019 26th Asia-Pacific Software Engineering Conference (APSEC), 228-235 1 2019
Link
QuickAdapt: scalable adaptation for Big Data cyber security analytics
F Ullah, MA Babar
2019 24th international conference on engineering of complex computer … 6 2019
Link
Automated software vulnerability assessment with concept drift
THM Le, B Sabir, MA Babar
2019 IEEE/ACM 16th International Conference on Mining Software Repositories … 36 2019
Link
An ontology-driven approach to automating the process of integrating security software systems
C Islam, MA Babar, S Nepal
2019 IEEE/ACM International Conference on Software and System Processes … 11 2019
Link
How developers discuss architecture smells? an exploratory study on stack overflow
F Tian, P Liang, MA Babar
2019 IEEE international conference on software architecture (ICSA), 91-100 31 2019
Link
Automated interpretation and integration of security tools using semantic knowledge
C Islam, MA Babar, S Nepal
Advanced Information Systems Engineering: 31st International Conference … 17 2019
Link