922 results on '"Muhammad Ali Babar"'
Search Results
52. An Experience Report on the Design and Implementation of an Ad-hoc Blockchain Platform for Tactical Edge Applications.
53. Guidance Models for Designing Big Data Cyber Security Analytics Systems.
54. Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu.
55. Security Tools' API Recommendation Using Machine Learning.
56. A Study on Early & Non-Intrusive Security Assessment for Container Images.
57. IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIs.
58. Sustainability in 6G Networks: Vision and Directions.
59. A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality.
60. SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting.
61. A Multivocal Review of MLOps Practices, Challenges and Open Issues.
62. Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions.
63. Beyond Data, Towards Sustainability: A Sydney Case Study on Urban Digital Twins.
64. Transaction Fee Estimation in the Bitcoin System.
65. APIRO: A Framework for Automated Security Tools API Recommendation.
66. Enhancing bitcoin transaction confirmation prediction: a hybrid model combining neural networks and XGBoost.
67. Resource Utilization of Distributed Databases in Edge-Cloud Environment.
68. Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review.
69. Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices.
70. A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures.
71. A Survey on Data-driven Software Vulnerability Assessment and Prioritization.
72. Evidence-Based Research for Supporting Software Security in Software Development: Methodological Challenges & Strategies.
73. Lens-Based Beamformer for Low-Complexity Millimeter-Wave Cellular Systems
74. LineVD: Statement-level Vulnerability Detection using Graph Neural Networks.
75. On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models.
76. Noisy Label Learning for Security Defects.
77. An Empirical Study of Automation in Software Security Patch Management.
78. LogGD: Detecting Anomalies from System Logs with Graph Neural Networks.
79. ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems.
80. Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities.
81. KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration.
82. An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources.
83. On the Impact of Spillover Losses in 28 GHz Rotman Lens Arrays for 5G Applications
84. Miniaturized Microwave Devices and Antennas for Wearable, Implantable and Wireless Applications
85. Mechanism design for public projects via three machine learning based approaches.
86. Evaluation of distributed data processing frameworks in hybrid clouds.
87. Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
88. A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness.
89. Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector.
90. Mod2Dash: A Framework for Model-Driven Dashboards Generation.
91. Systematic Literature Review on Cyber Situational Awareness Visualizations.
92. Machine Learning for Detecting Data Exfiltration: A Review.
93. METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities.
94. Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT).
95. Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions.
96. Detecting Misuses of Security APIs: A Systematic Review.
97. Cost Sharing Public Project with Minimum Release Delay.
98. Toward a Reference Architecture for Software Supply Chain Metadata Management.
99. A qualitative study of architectural design issues in DevOps.
100. An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.