Timing attacks are considered one of the most damaging side-channel atta...
Transformer-based text classifiers like BERT, Roberta, T5, and GPT-3 hav...
Security Application Programming Interfaces (APIs) play a vital role in
...
The use of learning-based techniques to achieve automated software
vulne...
Mobile applications, mobile apps for short, have proven their usefulness...
In this paper, we present a Fragmented Hybrid Cloud (FHC) that provides ...
Large-scale Machine Learning (ML) based Software Systems are increasingl...
The construction of an interactive dashboard involves deciding on what
i...
Runtime software patching aims to minimize or eliminate service downtime...
Blockchain network deployment and evaluation have become prevalent due t...
Many studies have developed Machine Learning (ML) approaches to detect
S...
A wide variety of Cyber Threat Information (CTI) is used by Security
Ope...
Current machine-learning based software vulnerability detection methods ...
Data-driven software engineering processes, such as vulnerability predic...
Numerous security attacks that resulted in devastating consequences can ...
An increasing number of mental health services are offered through mobil...
The rapid development of Machine Learning (ML) has demonstrated superior...
Distributed data processing platforms (e.g., Hadoop, Spark, and Flink) a...
Distributed data processing frameworks (e.g., Hadoop, Spark, and Flink) ...
Container technology, (e.g., Docker) is being widely adopted for deployi...
Container Orchestrator (CO) is a vital technology for managing clusters ...
Software Vulnerability (SV) severity assessment is a vital task for info...
The dynamics of cyber threats are increasingly complex, making it more
c...
Evaluating the effectiveness of security awareness and training programs...
A benchmark study of modern distributed databases is an important source...
Software Vulnerability Prediction (SVP) is a data-driven technique for
s...
Internet of Things (IoT) based applications face an increasing number of...
It is increasingly suggested to identify Software Vulnerabilities (SVs) ...
Given programming languages can provide different types and levels of
se...
Software Vulnerabilities (SVs) are increasing in complexity and scale, p...
Background: Static Application Security Testing (SAST) tools purport to
...
Software Engineering researchers are increasingly using Natural Language...
Context: DevOps has become one of the fastest growing software developme...
Mobile health applications (mHealth apps for short) are being increasing...
Context: Software security patch management purports to support the proc...
Mobile systems offer portable and interactive computing, empowering user...
Docker technology has been increasingly used among software developers i...
Detection and mitigation of Security Vulnerabilities (SVs) are integral ...
Mobile apps exploit embedded sensors and wireless connectivity of a devi...
The increasing need for managing big data has led the emergence of advan...
Mobile health (mHealth) applications (apps) have gained significant
popu...
An increased adoption of mobile health (mHealth) and ubiquitous health
(...
A Hybrid cloud is an integration of resources between private and public...
Background: Over the year, Machine Learning Phishing URL classification
...
Modelling and Simulation as a Service (MSaaS) is a promising approach to...
Development and Operations (DevOps), a particular type of Continuous Sof...
Security is an increasing concern in software development. Developer Que...
Organizations use diverse types of security solutions to prevent
cyberat...
Deep Learning (DL) techniques for Natural Language Processing have been
...
Game theory is an established branch of mathematics that offers a rich s...