Skip to main content

Showing 1–24 of 24 results for author: Sabetzadeh, M

.
  1. arXiv:2405.11141  [pdf, other

    cs.CR cs.SE

    Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study

    Authors: Negin Ayoughi, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: Intrusion detection systems are crucial for network security. Verification of these systems is complicated by various factors, including the heterogeneity of network platforms and the continuously changing landscape of cyber threats. In this paper, we use automata learning to derive state machines from network-traffic data with the objective of supporting behavioural verification of intrusion dete… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  2. arXiv:2405.01695  [pdf, other

    cs.SE

    Requirements-driven Slicing of Simulink Models Using LLMs

    Authors: Dipeeka Luitel, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Model slicing is a useful technique for identifying a subset of a larger model that is relevant to fulfilling a given requirement. Notable applications of slicing include reducing inspection effort when checking design adequacy to meet requirements of interest and when conducting change impact analysis. In this paper, we present a method based on large language models (LLMs) for extracting model s… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: This paper will appear at the 11th International Workshop on Artificial Intelligence and Requirements Engineering (AIRE'24)

  3. arXiv:2404.14356  [pdf, other

    cs.SE

    Rethinking Legal Compliance Automation: Opportunities with Large Language Models

    Authors: Shabnam Hassani, Mehrdad Sabetzadeh, Daniel Amyot, Jain Liao

    Abstract: As software-intensive systems face growing pressure to comply with laws and regulations, providing automated support for compliance analysis has become paramount. Despite advances in the Requirements Engineering (RE) community on legal compliance analysis, important obstacles remain in develo** accurate and generalizable compliance automation solutions. This paper highlights some observed limita… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: Accepted for publication at the RE@Next! track of RE 2024

  4. arXiv:2404.11542  [pdf, other

    cs.SE

    A Lean Simulation Framework for Stress Testing IoT Cloud Systems

    Authors: Jia Li, Behrad Moeini, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of Things connects a plethora of smart devices globally across various applications like smart cities, autonomous vehicles and health monitoring. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. This paper addresses a specific yet important need in simulation-based testing for I… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to the IEEE Transactions on Software Engineering. arXiv admin note: text overlap with arXiv:2208.06954

  5. arXiv:2403.08798  [pdf, other

    cs.DC

    Self-adaptive, Requirements-driven Autoscaling of Microservices

    Authors: João Paulo Karol Santos Nunes, Shiva Nejati, Mehrdad Sabetzadeh, Elisa Yumi Nakagawa

    Abstract: Microservices architecture offers various benefits, including granularity, flexibility, and scalability. A crucial feature of this architecture is the ability to autoscale microservices, i.e., adjust the number of replicas and/or manage resources. Several autoscaling solutions already exist. Nonetheless, when employed for diverse microservices compositions, current solutions may exhibit suboptimal… ▽ More

    Submitted 1 February, 2024; originally announced March 2024.

    Comments: This paper has been accepted at the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2024)

  6. arXiv:2401.01508  [pdf, other

    cs.SE

    Practical Guidelines for the Selection and Evaluation of Natural Language Processing Techniques in Requirements Engineering

    Authors: Mehrdad Sabetzadeh, Chetan Arora

    Abstract: [Context and Motivation] Natural Language Processing (NLP) is now a cornerstone of requirements automation. One compelling factor behind the growing adoption of NLP in Requirements Engineering (RE) is the prevalent use of natural language (NL) for specifying requirements in industry. NLP techniques are commonly used for automatically classifying requirements, extracting important information, e.g.… ▽ More

    Submitted 2 May, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

    Comments: This article will appear as Chapter 15 in a book titled "Handbook of Natural Language Processing for Requirements Engineering", to be published by Springer

  7. arXiv:2312.05631  [pdf, other

    cs.SE

    Test Generation Strategies for Building Failure Models and Explaining Spurious Failures

    Authors: Baharin Aliashrafi Jodat, Abhishek Chandar, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Test inputs fail not only when the system under test is faulty but also when the inputs are invalid or unrealistic. Failures resulting from invalid or unrealistic test inputs are spurious. Avoiding spurious failures improves the effectiveness of testing in exercising the main functions of a system, particularly for compute-intensive (CI) systems where a single test execution takes significant time… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: This paper is accepted at the ACM Transactions on Software Engineering and Methodology (TOSEM) in December 2023

  8. arXiv:2308.03784  [pdf, other

    cs.SE

    Improving Requirements Completeness: Automated Assistance through Large Language Models

    Authors: Dipeeka Luitel, Shabnam Hassani, Mehrdad Sabetzadeh

    Abstract: Natural language (NL) is arguably the most prevalent medium for expressing systems and software requirements. Detecting incompleteness in NL requirements is a major challenge. One approach to identify incompleteness is to compare requirements with external sources. Given the rise of large language models (LLMs), an interesting question arises: Are LLMs useful external sources of knowledge for dete… ▽ More

    Submitted 14 February, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: This article has been accepted at the Requirements Engineering Journal (REJ), REFSQ'23 Special Issue. arXiv admin note: text overlap with arXiv:2302.04792

  9. arXiv:2306.00316  [pdf, other

    cs.SE

    Using Genetic Programming to Build Self-Adaptivity into Software-Defined Networks

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Self-adaptation solutions need to periodically monitor, reason about, and adapt a running system. The adaptation step involves generating an adaptation strategy and applying it to the running system whenever an anomaly arises. In this article, we argue that, rather than generating individual adaptation strategies, the goal should be to adapt the control logic of the running system in such a way th… ▽ More

    Submitted 15 August, 2023; v1 submitted 31 May, 2023; originally announced June 2023.

    Comments: Accepted for publication by ACM Transactions on Autonomous and Adaptive Systems (TAAS) (in Aug 2023). arXiv admin note: substantial text overlap with arXiv:2205.04352

  10. arXiv:2303.09617  [pdf, ps, other

    cs.SE cs.AI

    Measuring Improvement of F$_1$-Scores in Detection of Self-Admitted Technical Debt

    Authors: William Aiken, Paul K. Mvula, Paula Branco, Guy-Vincent Jourdan, Mehrdad Sabetzadeh, Herna Viktor

    Abstract: Artificial Intelligence and Machine Learning have witnessed rapid, significant improvements in Natural Language Processing (NLP) tasks. Utilizing Deep Learning, researchers have taken advantage of repository comments in Software Engineering to produce accurate methods for detecting Self-Admitted Technical Debt (SATD) from 20 open-source Java projects' code. In this work, we improve SATD detection… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  11. arXiv:2302.04793  [pdf, other

    cs.SE

    AI-based Question Answering Assistance for Analyzing Natural-language Requirements

    Authors: Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh

    Abstract: By virtue of being prevalently written in natural language (NL), requirements are prone to various defects, e.g., inconsistency and incompleteness. As such, requirements are frequently subject to quality assurance processes. These processes, when carried out entirely manually, are tedious and may further overlook important quality issues due to time and budget pressures. In this paper, we propose… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

    Comments: This paper has been accepted at the 45th International Conference on Software Engineering (ICSE 2023)

  12. arXiv:2302.04792  [pdf, other

    cs.SE

    Using Language Models for Enhancing the Completeness of Natural-language Requirements

    Authors: Dipeeka Luitel, Shabnam Hassani, Mehrdad Sabetzadeh

    Abstract: [Context and motivation] Incompleteness in natural-language requirements is a challenging problem. [Question/problem] A common technique for detecting incompleteness in requirements is checking the requirements against external sources. With the emergence of language models such as BERT, an interesting question is whether language models are useful external sources for finding potential incomplete… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

    Comments: This paper has been accepted at the 29th International Working Conference on Requirement Engineering: Foundation for Software Quality (REFSQ 2023)

  13. arXiv:2212.08726  [pdf, other

    cs.SE

    Learning Non-robustness using Simulation-based Testing: a Network Traffic-sha** Case Study

    Authors: Baharin Aliashrafi Jodat, Shiva Nejati, Mehrdad Sabetzadeh, Patricio Saavedra

    Abstract: An input to a system reveals a non-robust behaviour when, by making a small change in the input, the output of the system changes from acceptable (passing) to unacceptable (failing) or vice versa. Identifying inputs that lead to non-robust behaviours is important for many types of systems, e.g., cyber-physical and network systems, whose inputs are prone to perturbations. In this paper, we propose… ▽ More

    Submitted 22 January, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: This paper is accepted at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST 2023)

  14. arXiv:2209.04052  [pdf, ps, other

    cs.SE

    Early Verification of Legal Compliance via Bounded Satisfiability Checking

    Authors: Nick Feng, Lina Marsso, Mehrdad Sabetzadeh, Marsha Chechik

    Abstract: Legal properties involve reasoning about data values and time. Metric first-order temporal logic (MFOTL) provides a rich formalism for specifying legal properties. While MFOTL has been successfully used for verifying legal properties over operational systems via runtime monitoring, no solution exists for MFOTL-based verification in early-stage system development captured by requirements. Given a l… ▽ More

    Submitted 27 May, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

  15. arXiv:2208.06954  [pdf, other

    cs.SE

    A Domain-Specific Language for Simulation-Based Testing of IoT Edge-to-Cloud Solutions

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen

    Abstract: The Internet of things (IoT) is increasingly prevalent in domains such as emergency response, smart cities and autonomous vehicles. Simulation plays a key role in the testing of IoT systems, noting that field testing of a complete IoT product may be infeasible or prohibitively expensive. In this paper, we propose a domain-specific language (DSL) for generating edge-to-cloud simulators. An edge-to-… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

  16. arXiv:2206.10227  [pdf, other

    cs.SE cs.CL

    TAPHSIR: Towards AnaPHoric Ambiguity Detection and ReSolution In Requirements

    Authors: Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh

    Abstract: We introduce TAPHSIR, a tool for anaphoric ambiguity detection and anaphora resolution in requirements. TAPHSIR facilities reviewing the use of pronouns in a requirements specification and revising those pronouns that can lead to misunderstandings during the development process. To this end, TAPHSIR detects the requirements which have potential anaphoric ambiguity and further attempts interpreting… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  17. arXiv:2206.10218  [pdf, other

    cs.SE

    WikiDoMiner: Wikipedia Domain-specific Miner

    Authors: Saad Ezzini, Sallam Abualhaija, Mehrdad Sabetzadeh

    Abstract: We introduce WikiDoMiner, a tool for automatically generating domain-specific corpora by crawling Wikipedia. WikiDoMiner helps requirements engineers create an external knowledge resource that is specific to the underlying domain of a given requirements specification (RS). Being able to build such a resource is important since domain-specific datasets are scarce. WikiDoMiner generates a corpus by… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  18. arXiv:2205.04352  [pdf, other

    cs.SE

    Learning Self-adaptations for IoT Networks: A Genetic Programming Approach

    Authors: Jia Li, Shiva Nejati, Mehrdad Sabetzadeh

    Abstract: Internet of Things (IoT) is a pivotal technology in application domains that require connectivity and interoperability between large numbers of devices. IoT systems predominantly use a software-defined network (SDN) architecture as their core communication backbone. This architecture offers several advantages, including the flexibility to make IoT networks self-adaptive through software programmab… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  19. arXiv:2106.05688  [pdf, other

    cs.CR cs.AI cs.SE

    AI-enabled Automation for Completeness Checking of Privacy Policies

    Authors: Orlando Amaral, Sallam Abualhaija, Damiano Torre, Mehrdad Sabetzadeh, Lionel C. Briand

    Abstract: Technological advances in information sharing have raised concerns about data protection. Privacy policies contain privacy-related requirements about how the personal data of individuals will be handled by an organization or a software system (e.g., a web service or an app). In Europe, privacy policies are subject to compliance with the General Data Protection Regulation (GDPR). A prerequisite for… ▽ More

    Submitted 5 October, 2021; v1 submitted 10 June, 2021; originally announced June 2021.

  20. arXiv:2007.12046  [pdf, other

    cs.SE

    Model Driven Engineering for Data Protection and Privacy: Application and Experience with GDPR

    Authors: Damiano Torre, Mauricio Alferez, Ghanem Soltana, Mehrdad Sabetzadeh, Lionel Briand

    Abstract: In Europe and indeed worldwide, the General Data Protection Regulation (GDPR) provides protection to individuals regarding their personal data in the face of new technological developments. GDPR is widely viewed as the benchmark for data protection and privacy regulations that harmonizes data privacy laws across Europe. Although the GDPR is highly beneficial to individuals, it presents significant… ▽ More

    Submitted 23 July, 2020; originally announced July 2020.

  21. arXiv:2005.01355  [pdf, other

    cs.SE cs.CL

    On Systematically Building a Controlled Natural Language for Functional Requirements

    Authors: Alvaro Veizaga, Mauricio Alferez, Damiano Torre, Mehrdad Sabetzadeh, Lionel Briand

    Abstract: [Context] Natural language (NL) is pervasive in software requirements specifications (SRSs). However, despite its popularity and widespread use, NL is highly prone to quality issues such as vagueness, ambiguity, and incompleteness. Controlled natural languages (CNLs) have been proposed as a way to prevent quality problems in requirements documents, while maintaining the flexibility to write and co… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

  22. arXiv:2001.11245  [pdf

    cs.SE

    An Automated Framework for the Extraction of Semantic Legal Metadata from Legal Texts

    Authors: Amin Sleimi, Nicolas Sannier, Mehrdad Sabetzadeh, Lionel Briand, Marcello Ceci, John Dann

    Abstract: Semantic legal metadata provides information that helps with understanding and interpreting legal provisions. Such metadata is therefore important for the systematic analysis of legal requirements. However, manually enhancing a large legal corpus with semantic metadata is prohibitively expensive. Our work is motivated by two observations: (1) the existing requirements engineering (RE) literature d… ▽ More

    Submitted 30 January, 2020; originally announced January 2020.

  23. Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach

    Authors: Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, Chetan Arora, Frank Zimmer

    Abstract: The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situat… ▽ More

    Submitted 15 May, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: This paper has been accepted at IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020)

  24. Practical Constraint Solving for Generating System Test Data

    Authors: Ghanem Soltana, Mehrdad Sabetzadeh, Lionel C. Briand

    Abstract: The ability to generate test data is often a necessary prerequisite for automated software testing. For the generated data to be fit for its intended purpose, the data usually has to satisfy various logical constraints. When testing is performed at a system level, these constraints tend to be complex and are typically captured in expressive formalisms based on first-order logic. Motivated by impro… ▽ More

    Submitted 15 May, 2020; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Published in ACM Transactions on Software Engineering and Methodology (TOSEM)