Skip to main content

Showing 101–113 of 113 results for author: Babar, A

.
  1. arXiv:1907.01755  [pdf, other

    cs.CR cs.LG stat.ML

    Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

    Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar

    Abstract: Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real time. Gathering Cyber threat intelligence from social media sites is a time consuming task for security analysts that c… ▽ More

    Submitted 4 September, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

    Comments: ACCEPTED by the 2019 International Conference on Cyberworlds (CW2019)

  2. Game theoretical modelling of network/cybersecurity

    Authors: Azhar Iqbal, Lachlan J. Gunn, Mingyu Guo, M. Ali Babar, Derek Abbott

    Abstract: Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers in security problems who compete for limited and shared resources. This article presents a review of the literature in the area of game theoretical modelling of network/cybersecurity.

    Submitted 19 October, 2019; v1 submitted 24 January, 2019; originally announced January 2019.

    Comments: Revised, 21 pages, to appear in IEEE Access

    Journal ref: IEEE Access, Vol. 7, pp 154167-154179 (2019)

  3. Internet of Things Search Engine: Concepts, Classification, and Open Issues

    Authors: Nguyen Khoi Tran, Quan Z. Sheng, M. Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar

    Abstract: This article focuses on the complicated yet still relatively immature area of the Internet of Things Search Engines (IoTSE). It introduces related concepts of IoTSE and a model called meta-path to describe and classify IoTSE systems based on their functionality. Based on these concepts, we have organized the research and development efforts on IoTSE into eight groups and presented the representati… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: Accepted for publication in Communications of the ACM

  4. arXiv:1808.08796  [pdf

    cs.SE

    An Empirical Study of Architecting for Continuous Delivery and Deployment

    Authors: Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu

    Abstract: Recently, many software organizations have been adopting Continuous Delivery and Continuous Deployment (CD) practices to develop and deliver quality software more frequently and reliably. Whilst an increasing amount of the literature covers different aspects of CD, little is known about the role of software architecture in CD and how an application should be (re-) architected to enable and support… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

    Comments: To appear in Empirical Software Engineering

  5. arXiv:1802.03178  [pdf

    cs.CR cs.SE

    Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review

    Authors: Faheem Ullah, M. Ali Babar

    Abstract: Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies. Whilst a plethora of Big Data Cybersecurity Analytic Systems have been reported in the literature, there is a lack of a systematic and comprehensive review of the literature from an architectural perspective.… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

  6. Periodic orbits around a spherically symmetric naked singularity

    Authors: Gulmina Zaman Babar, Adil Zaman Babar, Yen-Kheng Lim

    Abstract: The motion of time-like test particles in the Fisher/Janis-Newman-Winicour (F/JNW) spacetime is studied with the Hamiltonian formulation of the geodesic equations. The spacetime is characterised by its mass parameter $r_g$ and scalar field parameter $ν$. The innermost bound and stable circular orbits are calculated and the effective potential is analysed. Consistent with numerical results in earli… ▽ More

    Submitted 26 October, 2017; originally announced October 2017.

    Comments: 14 pages, 7 figures

    Journal ref: Phys. Rev. D, 96 084052 (2017)

  7. arXiv:1709.06224  [pdf, other

    cs.SE

    Understanding the Heterogeneity of Contributors in Bug Bounty Programs

    Authors: Hideaki Hata, Mingyu Guo, M. Ali Babar

    Abstract: Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open source projects, rely on external parties to perform the security assessment of their software for reward. However, there is relatively little empirical knowledge about the characteristics of bug bounty program contributors. Aim: This paper aims to understand those contribu… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

    Comments: 6 pages, ESEM 2017

  8. Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices

    Authors: Mojtaba Shahin, Muhammad Ali Babar, Liming Zhu

    Abstract: Context: Continuous practices, i.e., continuous integration, delivery, and deployment, are the software development industry practices that enable organizations to frequently and reliably release new features and products. With the increasing interest in and literature on continuous practices, it is important to systematically review and synthesize the approaches, tools, challenges, and practices… ▽ More

    Submitted 20 March, 2017; originally announced March 2017.

  9. arXiv:1703.04277  [pdf

    cs.SE cs.CR

    Security Support in Continuous Deployment Pipeline

    Authors: Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP components run in an environment that has several interfaces to the Internet, these components are v… ▽ More

    Submitted 13 March, 2017; originally announced March 2017.

  10. Applying empirical software engineering to software architecture: challenges and lessons learned

    Authors: Davide Falessi, Muhammad Ali Babar, Giovanni Cantone, Philippe Kruchten

    Abstract: In the last 15 years, software architecture has emerged as an important software engineering field for managing the development and maintenance of large, software- intensive systems. Software architecture community has developed numerous methods, techniques, and tools to support the architecture process (analysis, design, and review). Historically, most advances in software architecture have been… ▽ More

    Submitted 21 January, 2017; originally announced January 2017.

    Journal ref: Empirical Software Engineering Journal, 15(3): pp. 250-276, 2010

  11. Software Architectures for Robotics Systems: A Systematic Map** Study

    Authors: Aakash Ahmad, Muhammad Ali Babar

    Abstract: Software architecture related issues are important for robotic systems. Architecture centric development and evolution of software for robotic systems has been attracting researchers attention for more than two decades. The objective of this work is to systematically identify, taxonomically classify and holistically map existing solutions, research progress and trends that influence architecture-d… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Journal ref: Journal of Systems and Software, 122, pp. 16-39 (2016)

  12. arXiv:1606.02509  [pdf

    cs.CY cs.CR

    Exploring Practitioner Perspectives of Sourcing Risks: Towards the Development of an Integrated Risk and Control Framework

    Authors: Deborah Bunker, Catherine Hardy, Abdul Babar, Ken Stevens

    Abstract: Outsourcing of information and communication technologies (ICT) and related services is an established and growing industry. Recent trends, such as the move toward multi-sourcing have increased the complexity and risk of these outsourcing arrangements. There is a critical research need to identify the risks faced by both the organisations that outsource ICT and the vendors that provide it in this… ▽ More

    Submitted 8 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/185

  13. arXiv:1303.0405  [pdf

    cs.NI

    mSCTP Based Decentralized Mobility Framework

    Authors: Waqas Ahmed Imtiaz, Muhammad Afaq, Muhammad Asmatullah Khan Babar

    Abstract: To conceive the full potential of wireless IP services, Mobile Nodes (MNs) must be able to roam seamlessly across different networks. Mobile Stream Control Transmission Protocol (mSCTP) is a transport layer solution, which unlike Mobile IP (MIP), provides seamless mobility with minimum delay and negligible packet loss. However, mSCTP fails to locate the current IP address of the mobile node when C… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: 7 Pages, Journal

    Journal ref: International Journal of Advanced Computer Science and Applications, Vol. 2, No.9, 2011, Page 106-112