default search action
Muhammad Ali Babar 0001
Person information
- affiliation: University of Adelaide, Australia
- affiliation (former): IT University of Copenhagen, Denmark
Other persons with the same name
- Ali Babar — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j110]Mingyu Guo, Diksha Goel, Guanhua Wang, Runqi Guo, Yuko Sakurai, Muhammad Ali Babar:
Mechanism design for public projects via three machine learning based approaches. Auton. Agents Multi Agent Syst. 38(1): 16 (2024) - [j109]Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Application of Learning-Based Approaches in Continuous Integration. IEEE Access 12: 135419-135450 (2024) - [j108]Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput. Secur. 140: 103754 (2024) - [j107]Xiaoyu Xia, Sheik Mohammad Mostakim Fattah, Muhammad Ali Babar:
A Survey on UAV-Enabled Edge Computing: Resource Management Perspective. ACM Comput. Surv. 56(3): 78:1-78:36 (2024) - [j106]Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. ACM Comput. Surv. 56(6): 151:1-151:38 (2024) - [j105]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Haifeng Shen:
KRIOTA: A framework for Knowledge-management of dynamic Reference Information and Optimal Task Assignment in hybrid edge-cloud environments to support situation-aware robot-assisted operations. Future Gener. Comput. Syst. 160: 489-504 (2024) - [j104]Victor Prokhorenko, Muhammad Ali Babar:
Offloaded Data Processing Energy Efficiency Evaluation. Informatica 35(3): 649-669 (2024) - [j103]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of distributed data processing frameworks in hybrid clouds. J. Netw. Comput. Appl. 224: 103837 (2024) - [j102]Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, Muhammad Ali Babar:
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. J. Syst. Softw. 208: 111899 (2024) - [j101]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogSD: Detecting Anomalies from System Logs through Self-Supervised Learning and Frequency-Based Masking. Proc. ACM Softw. Eng. 1(FSE): 2098-2120 (2024) - [j100]John Eidar Simensen, Coralie Esnoul, Eunkyoung Jee, Ali Babar, Triet Huynh Minh Le, Awais Rashid:
Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS/SVM - 2024). ACM SIGSOFT Softw. Eng. Notes 49(4): 18-21 (2024) - [j99]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
Design and Generation of a Set of Declarative APIs for Security Orchestration. IEEE Trans. Serv. Comput. 17(1): 127-141 (2024) - [c215]Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar:
An Investigation into Misuse of Java Security APIs by Large Language Models. AsiaCCS 2024 - [c214]Muhammad Ali Babar:
Evidence-Based Research for Supporting Software Security in Software Development: Methodological Challenges & Strategies. EASE 2024: 3 - [c213]Nguyen Khoi Tran, Samodha Pallewatta, Muhammad Ali Babar:
An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management. EASE 2024: 38-47 - [c212]Triet Huynh Minh Le, Muhammad Ali Babar, Tung Hoang Thai:
Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. EASE 2024: 679-685 - [c211]Samodha Pallewatta, Muhammad Ali Babar:
Towards Secure Management of Edge-Cloud IoT Microservices Using Policy as Code. ECSA 2024: 270-287 - [c210]Anh The Nguyen, Triet Huynh Minh Le, Muhammad Ali Babar:
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++. ESEM 2024: 72-83 - [c209]Triet Huynh Minh Le, Muhammad Ali Babar:
Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help? ESEM 2024: 119-130 - [c208]Triet Huynh Minh Le, Muhammad Ali Babar:
Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We? ESEM 2024: 131-142 - [c207]Sangwon Hyun, Mingyu Guo, Muhammad Ali Babar:
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities. ICST 2024: 117-128 - [c206]Yue Zhang, Rachel Meredith, Wilson Reeves, Julia Coriolano, Muhammad Ali Babar, Akond Rahman:
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests. MSR 2024: 192-196 - [c205]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. MSR 2024: 716-727 - [c204]Pemsith Mendis, Wilson Reeves, Muhammad Ali Babar, Yue Zhang, Akond Rahman:
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective. SEA4DQ@SIGSOFT FSE 2024: 2-5 - [c203]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. WWW 2024: 1779-1789 - [i106]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. CoRR abs/2401.11105 (2024) - [i105]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. CoRR abs/2401.13199 (2024) - [i104]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. CoRR abs/2402.07444 (2024) - [i103]Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar:
An Investigation into Misuse of Java Security APIs by Large Language Models. CoRR abs/2404.03823 (2024) - [i102]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking. CoRR abs/2404.11294 (2024) - [i101]Triet Huynh Minh Le, Muhammad Ali Babar, Tung Hoang Thai:
Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. CoRR abs/2404.17110 (2024) - [i100]Limeng Zhang, Rui Zhou, Qing Liu, Chengfei Liu, Muhammad Ali Babar:
Transaction Fee Estimation in the Bitcoin System. CoRR abs/2405.15293 (2024) - [i99]Ammar Sohail, Bojie Shen, Muhammad Aamir Cheema, Mohammed Eunus Ali, Anwaar Ulhaq, Muhammad Ali Babar, Asama Qureshi:
Beyond Data, Towards Sustainability: A Sydney Case Study on Urban Digital Twins. CoRR abs/2406.04902 (2024) - [i98]Beyza Eken, Samodha Pallewatta, Nguyen Khoi Tran, Ayse Tosun, Muhammad Ali Babar:
A Multivocal Review of MLOps Practices, Challenges and Open Issues. CoRR abs/2406.09737 (2024) - [i97]Samodha Pallewatta, Muhammad Ali Babar:
Towards Secure Management of Edge-Cloud IoT Microservices using Policy as Code. CoRR abs/2406.18813 (2024) - [i96]Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Application of Learning-based Approaches in Continuous Integration. CoRR abs/2406.19765 (2024) - [i95]Triet Huynh Minh Le, Muhammad Ali Babar:
Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help? CoRR abs/2407.10722 (2024) - [i94]Anh The Nguyen, Triet Huynh Minh Le, Muhammad Ali Babar:
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++. CoRR abs/2407.17053 (2024) - [i93]Triet Huynh Minh Le, Muhammad Ali Babar:
Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We? CoRR abs/2407.17803 (2024) - [i92]M. Mehdi Kholoosi, Muhammad Ali Babar, Roland Croft:
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality. CoRR abs/2408.00435 (2024) - [i91]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Fethi Rabhi:
SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting. CoRR abs/2408.12904 (2024) - 2023
- [j98]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Muhammad Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. Comput. Networks 234: 109935 (2023) - [j97]Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu:
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. Comput. Secur. 131: 103313 (2023) - [j96]Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. ACM Comput. Surv. 55(5): 100:1-100:39 (2023) - [j95]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ACM Comput. Surv. 55(9): 192:1-192:38 (2023) - [j94]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the privacy of mental health apps. Empir. Softw. Eng. 28(1): 2 (2023) - [j93]Haifeng Shen, Othman Asiry, Muhammad Ali Babar, Tomasz Bednarz:
Evaluating the efficacy of using a novel gaze-based attentive user interface to extend ADHD children's attention span. Int. J. Hum. Comput. Stud. 169: 102927 (2023) - [j92]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An empirical study on secure usage of mobile health apps: The attack simulation approach. Inf. Softw. Technol. 163: 107285 (2023) - [j91]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Resource Utilization of Distributed Databases in Edge-Cloud Environment. IEEE Internet Things J. 10(11): 9423-9437 (2023) - [j90]Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar:
NLP methods in host-based intrusion detection systems: A systematic review and future directions. J. Netw. Comput. Appl. 220: 103761 (2023) - [j89]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-users' knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers. J. Syst. Softw. 195: 111519 (2023) - [j88]Xin Zhou, Shanshan Li, Lingli Cao, He Zhang, Zijia Jia, Chenxing Zhong, Zhihao Shan, Muhammad Ali Babar:
Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry. J. Syst. Softw. 195: 111521 (2023) - [j87]Chadni Islam, Victor Prokhorenko, Ali Babar:
Runtime software patching: Taxonomy, survey and future directions. J. Syst. Softw. 200: 111652 (2023) - [j86]Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar:
A qualitative study of architectural design issues in DevOps. J. Softw. Evol. Process. 35(5) (2023) - [j85]Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. ACM Trans. Softw. Eng. Methodol. 32(1): 24:1-24:42 (2023) - [j84]Roland Croft, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. IEEE Trans. Software Eng. 49(3): 1044-1063 (2023) - [j83]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. IEEE Trans. Software Eng. 49(9): 4324-4348 (2023) - [j82]Limeng Zhang, Rui Zhou, Qing Liu, Jiajie Xu, Chengfei Liu, Muhammad Ali Babar:
Enhancing bitcoin transaction confirmation prediction: a hybrid model combining neural networks and XGBoost. World Wide Web (WWW) 26(6): 4173-4191 (2023) - [c202]Ahmed Dawoud, Geeta Mahala, Chadni Islam, Wolfgang Mayer, Aditya Ghose, Muhammad Ali Babar, Markus Stumptner, Georg Grossmann:
A Goal-Driven Approach to Support Decision-Making with Incomplete Information in Cyber Operations. CAiSE Forum 2023: 77-85 - [c201]M. Mehdi Kholoosi, Muhammad Ali Babar, Cemal Yilmaz:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. CNS 2023: 1-9 - [c200]Faheem Ullah, Muhammad Ali Babar:
Guidance Models for Designing Big Data Cyber Security Analytics Systems. ECSA 2023: 70-80 - [c199]Nguyen Khoi Tran, Muhammad Ali Babar, Julian Thorpe, Seth Leslie, Andrew Walters:
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain Platform for Tactical Edge Applications. ECSA 2023: 100-116 - [c198]Victor Prokhorenko, Chadni Islam, Muhammad Ali Babar:
Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu. ECSA 2023: 233-249 - [c197]Zarrin Tasnim Sworna, Anjitha Sreekumar, Chadni Islam, Muhammad Ali Babar:
Security Tools' API Recommendation Using Machine Learning. ENASE 2023: 27-38 - [c196]Mubin Ul Haque, Muhammad Ali Babar:
A Study on Early & Non-Intrusive Security Assessment for Container Images. ENASE 2023: 640-647 - [c195]Boyu Zhang, Hongyang Yang, Tianyu Zhou, Ali Babar, Xiao-Yang Liu:
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language Models. ICAIF 2023: 349-356 - [c194]Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar:
SoK: Machine Learning for Continuous Integration. AIOps@ICSE 2023: 8-13 - [c193]Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. ICSE 2023: 121-133 - [c192]Orvila Sarker, Hong Shen, Muhammad Ali Babar:
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. TrustCom 2023: 585-594 - [c191]Zarrin Tasnim Sworna, Muhammad Ali Babar, Anjitha Sreekumar:
IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIs. SANER 2023: 546-557 - [i90]Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. CoRR abs/2301.05456 (2023) - [i89]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. CoRR abs/2301.08428 (2023) - [i88]Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar:
SoK: Machine Learning for Continuous Integration. CoRR abs/2304.02829 (2023) - [i87]Mingyu Guo, Diksha Goel, Guanhua Wang, Yong Yang, Muhammad Ali Babar:
Cost Sharing Public Project with Minimum Release Delay. CoRR abs/2305.11657 (2023) - [i86]Mohammed Eunus Ali, Muhammad Aamir Cheema, Tanzima Hashem, Anwaar Ulhaq, Muhammad Ali Babar:
Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions. CoRR abs/2306.06600 (2023) - [i85]Zahra Mousavi, Chadni Islam, Muhammad Ali Babar, Alsharif Abuadbba, Kristen Moore:
Detecting Misuses of Security APIs: A Systematic Review. CoRR abs/2306.08869 (2023) - [i84]Bushra Sabir, Muhammad Ali Babar, Sharif Abuadbba:
Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT). CoRR abs/2307.01225 (2023) - [i83]Victor Prokhorenko, Chadni Islam, Muhammad Ali Babar:
Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu. CoRR abs/2307.04458 (2023) - [i82]M. Mehdi Kholoosi, Muhammad Ali Babar, Cemal Yilmaz:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. CoRR abs/2308.11862 (2023) - [i81]Orvila Sarker, Hong Shen, Muhammad Ali Babar:
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. CoRR abs/2310.00635 (2023) - [i80]Boyu Zhang, Hongyang Yang, Tianyu Zhou, Ali Babar, Xiao-Yang Liu:
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language Models. CoRR abs/2310.04027 (2023) - [i79]Nguyen Khoi Tran, Samodha Pallewatta, Muhammad Ali Babar:
Toward a Reference Architecture for Software Supply Chain Metadata Management. CoRR abs/2310.06300 (2023) - [i78]Sangwon Hyun, Mingyu Guo, Muhammad Ali Babar:
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities. CoRR abs/2312.06056 (2023) - 2022
- [j81]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 10: 57525-57554 (2022) - [j80]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. ACM Comput. Surv. 54(3): 50:1-50:47 (2022) - [j79]Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An empirical study of developers' discussions about security challenges of different programming languages. Empir. Softw. Eng. 27(1): 27 (2022) - [j78]Faheem Ullah, Muhammad Ali Babar, Aldeida Aleti:
Design and evaluation of adaptive system for big data cyber security analytics. Expert Syst. Appl. 207: 117948 (2022) - [j77]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar, Haifeng Shen:
Challenges and solutions when adopting DevSecOps: A systematic review. Inf. Softw. Technol. 141: 106700 (2022) - [j76]Fangchao Tian, Peng Liang, Muhammad Ali Babar:
Relationships between software architecture and source code in practice: An exploratory survey and interview. Inf. Softw. Technol. 141: 106705 (2022) - [j75]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 144: 106771 (2022) - [j74]Faheem Ullah, Muhammad Ali Babar:
On the scalability of Big Data Cyber Security Analytics systems. J. Netw. Comput. Appl. 198: 103294 (2022) - [j73]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A framework for automatic identification and classification of cyber threat data. J. Netw. Comput. Appl. 202: 103370 (2022) - [j72]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A framework for automating deployment and evaluation of blockchain networks. J. Netw. Comput. Appl. 206: 103460 (2022) - [j71]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-29 (2022) - [j70]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. Proc. ACM Hum. Comput. Interact. 6(EICS): 172:1-172:28 (2022) - [c190]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. ECSA 2022: 49-65 - [c189]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. ASE 2022: 7:1-7:13 - [c188]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. MSR 2022: 435-447 - [c187]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. MSR 2022: 596-607 - [c186]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. MSR 2022: 621-633 - [c185]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks. QRS 2022: 299-310 - [c184]Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. SANER 2022: 338-348 - [c183]Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. SANER 2022: 420-431 - [c182]Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. SANER 2022: 1066-1077 - [i77]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds. CoRR abs/2201.01948 (2022) - [i76]Faheem Ullah, Imaduddin Mohammed, Muhammad Ali Babar:
A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment. CoRR abs/2201.01972 (2022) - [i75]Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. CoRR abs/2201.04736 (2022) - [i74]Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. CoRR abs/2201.07959 (2022) - [i73]Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar:
NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions. CoRR abs/2201.08066 (2022) - [i72]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development. CoRR abs/2201.09006 (2022) - [i71]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. CoRR abs/2202.09016 (2022) - [i70]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. CoRR abs/2203.04468 (2022) - [i69]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. CoRR abs/2203.05181 (2022) - [i68]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data. CoRR abs/2203.07603 (2022) - [i67]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. CoRR abs/2203.08417 (2022) - [i66]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A Framework for Automating Deployment and Evaluation of Blockchain Network. CoRR abs/2203.10647 (2022) - [i65]Chadni Islam, Victor Prokhorenko, Muhammad Ali Babar:
Runtime Software Patching: Taxonomy, Survey and Future Directions. CoRR abs/2203.12132 (2022) - [i64]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. CoRR abs/2205.07204 (2022) - [i63]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. CoRR abs/2206.10110 (2022) - [i62]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. CoRR abs/2209.01518 (2022) - [i61]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogGD: Detecting Anomalies from System Logs by Graph Neural Networks. CoRR abs/2209.07869 (2022) - [i60]Yaser Mansouri, Faheem Ullah, Shagun Dhingra, Muhammad Ali Babar:
Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases. CoRR abs/2209.09487 (2022) - [i59]Xiaoyu Xia, Sheik Mohammad Mostakim Fattah, Muhammad Ali Babar:
A Survey on UAV-enabled Edge Computing: Resource Management Perspective. CoRR abs/2210.06679 (2022) - [i58]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support. CoRR abs/2211.06953 (2022) - [i57]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach. CoRR abs/2211.07585 (2022) - [i56]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices. CoRR abs/2211.08916 (2022) - 2021
- [j69]Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Ali Babar:
Revenue maximizing markets for zero-day exploits. Auton. Agents Multi Agent Syst. 35(2): 36 (2021) - [j68]Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges. ACM Comput. Surv. 53(3): 62:1-62:38 (2021) - [j67]Shanshan Li, He Zhang, Zijia Jia, Chenxing Zhong, Cheng Zhang, Zhihao Shan, Jinfeng Shen, Muhammad Ali Babar:
Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Inf. Softw. Technol. 131: 106449 (2021) - [j66]Nguyen Khoi Tran, Muhammad Ali Babar, Jonathan Boan:
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs. J. Netw. Comput. Appl. 173: 102844 (2021) - [j65]Yaser Mansouri, Muhammad Ali Babar:
A review of edge computing: Features and resource virtualization. J. Parallel Distributed Comput. 150: 155-183 (2021) - [j64]Fangchao Tian, Tianlu Wang, Peng Liang, Chong Wang, Arif Ali Khan, Muhammad Ali Babar:
The impact of traceability on software maintenance and evolution: A mapping study. J. Softw. Evol. Process. 33(10) (2021) - [j63]Leticia Duboc, Rami Bahsoon, Faisal Alrebeish, Carlos Joseph Mera-Gómez, Vivek Nallur, Rick Kazman, Philip Bianco, Ali Babar, Rajkumar Buyya:
Systematic Scalability Modeling of QoS-aware Dynamic Service Composition. ACM Trans. Auton. Adapt. Syst. 16(3-4): 1-39 (2021) - [c181]Guanhua Wang, Runqi Guo, Yuko Sakurai, Muhammad Ali Babar, Mingyu Guo:
Mechanism Design for Public Projects via Neural Networks. AAMAS 2021: 1380-1388 - [c180]Triet Huynh Minh Le, Roland Croft, David Hin, Muhammad Ali Babar:
A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites. EASE 2021: 109-118 - [c179]Nguyen Khoi Tran, Muhammad Ali Babar:
Taxonomy of Edge Blockchain Network Designs. ECSA 2021: 172-180 - [c178]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps. ESEM 2021: 6:1-6:12 - [c177]Roland Croft, Dominic Newlands, Ziyu Chen, Muhammad Ali Babar:
An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing. ESEM 2021: 8:1-8:12 - [c176]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. ICIS 2021 - [c175]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Steven Grainger:
Designing a Security Platform for Collaborating Autonomous Systems - An Experience Report. ICSA Companion 2021: 22-28 - [c174]Yongzheng Xie, Hongyu Zhang, Bo Zhang, Muhammad Ali Babar, Sha Lu:
LogDP: Combining Dependency and Proximity for Log-Based Anomaly Detection. ICSOC 2021: 708-716 - [c173]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning. ASE 2021: 717-729 - [c172]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. PRDC 2021: 47-56 - [c171]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A grounded theory of the role of coordination in software security patch management. ESEC/SIGSOFT FSE 2021: 793-805 - [i55]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-Users' Knowledge and Perception about Security of Mobile Health Apps: An Empirical Study. CoRR abs/2101.10412 (2021) - [i54]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar, Haifeng Shen:
Challenges and solutions when adopting DevSecOps: A systematic review. CoRR abs/2103.08266 (2021) - [i53]Bushra Sabir, Muhammad Ali Babar, Raj Gaire:
ReinforceBug: A Framework to Generate Adversarial Textual Examples. CoRR abs/2103.08306 (2021) - [i52]Triet Huynh Minh Le, Bushra Sabir, Muhammad Ali Babar:
Automated Software Vulnerability Assessment with Concept Drift. CoRR abs/2103.11316 (2021) - [i51]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/2104.11906 (2021) - [i50]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A Grounded Theory of the Role of Coordination in Software Security Patch Management. CoRR abs/2106.03458 (2021) - [i49]Roland Croft, Dominic Newlands, Ziyu Chen, Muhammad Ali Babar:
An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing. CoRR abs/2107.01921 (2021) - [i48]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps. CoRR abs/2107.02096 (2021) - [i47]Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. CoRR abs/2107.08364 (2021) - [i46]Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages. CoRR abs/2107.13723 (2021) - [i45]Fangchao Tian, Peng Liang, Muhammad Ali Babar:
Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview. CoRR abs/2108.01018 (2021) - [i44]Fangchao Tian, Tianlu Wang, Peng Liang, Chong Wang, Arif Ali Khan, Muhammad Ali Babar:
The Impact of Traceability on Software Maintenance and Evolution: A Mapping Study. CoRR abs/2108.02133 (2021) - [i43]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. CoRR abs/2108.04766 (2021) - [i42]Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar:
A Qualitative Study of Architectural Design Issues in DevOps. CoRR abs/2108.06705 (2021) - [i41]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning. CoRR abs/2108.08041 (2021) - [i40]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. CoRR abs/2109.04029 (2021) - [i39]Roland Croft, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. CoRR abs/2109.05740 (2021) - [i38]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption. CoRR abs/2109.07260 (2021) - [i37]Yongzheng Xie, Hongyu Zhang, Bo Zhang, Muhammad Ali Babar, Sha Lu:
LogDP: Combining Dependency and Proximity for Log-based Anomaly Detection. CoRR abs/2110.01927 (2021) - [i36]Faheem Ullah, Muhammad Ali Babar:
On the Scalability of Big Data Cyber Security Analytics Systems. CoRR abs/2112.00853 (2021) - [i35]Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, Muhammad Ali Babar, Laura Hartley, Winston Lewinsmith:
Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline. CoRR abs/2112.06356 (2021) - [i34]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. CoRR abs/2112.10354 (2021) - [i33]Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. CoRR abs/2112.10356 (2021) - [i32]Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. CoRR abs/2112.12595 (2021) - [i31]Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. CoRR abs/2112.12597 (2021) - 2020
- [j62]Victor Prokhorenko, Muhammad Ali Babar:
Architectural Resilience in Cloud, Fog and Edge Systems: A Survey. IEEE Access 8: 28078-28095 (2020) - [j61]Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar:
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study. IEEE Access 8: 150081-150112 (2020) - [j60]Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar:
SAM-SoS: A Stochastic Software Architecture Modeling and Verification Approach for Complex System-of-Systems. IEEE Access 8: 177580-177603 (2020) - [j59]Yaser Mansouri, Victor Prokhorenko, Muhammad Ali Babar:
An automated implementation of hybrid cloud for performance evaluation of distributed databases. J. Netw. Comput. Appl. 167: 102740 (2020) - [j58]Jamal El Hachem, Vanea Chiprianov, Muhammad Ali Babar, Tarek Al Khalil, Philippe Aniorté:
Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems. J. Syst. Softw. 162 (2020) - [j57]Mojtaba Shahin, Muhammad Ali Babar, Muhammad Aufeef Chauhan:
Architectural Design Space for Modelling and Simulation as a Service: A Review. J. Syst. Softw. 170: 110752 (2020) - [c170]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective. APSEC 2020: 208-217 - [c169]Mansooreh Zahedi, Roshan Namal Rajapakse, Muhammad Ali Babar:
Mining Questions Asked about Continuous Software Engineering: A Case Study of Stack Overflow. EASE 2020: 41-50 - [c168]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform. ECSA 2020: 165-181 - [c167]Mubin Ul Haque, Leonardo Horn Iwaya, Muhammad Ali Babar:
Challenges in Docker Development: A Large-scale Study Using Stack Overflow. ESEM 2020: 7:1-7:11 - [c166]Nguyen Khoi Tran, Muhammad Ali Babar:
Anatomy, Concept, and Design Space of Blockchain Networks. ICSA 2020: 125-134 - [c165]He Zhang, Xin Zhou, Xin Huang, Huang Huang, Muhammad Ali Babar:
An evidence-based inquiry into the use of grey literature in software engineering. ICSE 2020: 1422-1434 - [c164]Mojtaba Shahin, Muhammad Ali Babar:
On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study. ICSSP 2020: 175-184 - [c163]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
Security Awareness of End-Users of Mobile Health Applications: An Empirical Study. MobiQuitous 2020: 125-136 - [c162]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning. MSR 2020: 350-361 - [c161]Qianwen Xu, Xiudi Chen, Shanshan Li, He Zhang, Muhammad Ali Babar, Nguyen Khoi Tran:
Blockchain-based Solutions for IoT: A Tertiary Study. QRS Companion 2020: 124-131 - [c160]Fangchao Tian, Fan Lu, Peng Liang, Muhammad Ali Babar:
Automatic Identification of Architecture Smell Discussions from Stack Overflow. SEKE 2020: 451-456 - [i30]Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges. CoRR abs/2002.05442 (2020) - [i29]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
A Multi-Vocal Review of Security Orchestration. CoRR abs/2002.09190 (2020) - [i28]Guanhua Wang, Runqi Guo, Yuko Sakurai, Ali Babar, Mingyu Guo:
Mechanism Design for Public Projects via Neural Networks. CoRR abs/2002.11382 (2020) - [i27]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning. CoRR abs/2003.03741 (2020) - [i26]Mojtaba Shahin, Muhammad Ali Babar:
On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study. CoRR abs/2003.06108 (2020) - [i25]Mojtaba Shahin, Muhammad Ali Babar, Muhammad Aufeef Chauhan:
Architectural Design Space for Modelling and Simulation as a Service: A Review. CoRR abs/2005.07883 (2020) - [i24]Bushra Sabir, Muhammad Ali Babar, Raj Gaire:
An Evasion Attack against ML-based Phishing URL Detectors. CoRR abs/2005.08454 (2020) - [i23]Yaser Mansouri, Victor Prokhorenko, Muhammad Ali Babar:
An Automated Implementation of Hybrid Cloud for Performance Evaluation of Distributed Databases. CoRR abs/2006.02833 (2020) - [i22]Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar:
Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study. CoRR abs/2006.12069 (2020) - [i21]Mingyu Guo, Yong Yang, Muhammad Ali Babar:
Cost Sharing Security Information with Minimal Release Delay. CoRR abs/2006.14177 (2020) - [i20]Mingyu Guo, Hideaki Hata, Ali Babar:
Revenue Maximizing Markets for Zero-Day Exploits. CoRR abs/2006.14184 (2020) - [i19]Mingyu Guo, Hideaki Hata, Ali Babar:
Optimizing Affine Maximizer Auctions via Linear Programming: an Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. CoRR abs/2006.14185 (2020) - [i18]Bakheet Aljedaani, Muhammad Ali Babar:
Challenges in Developing Secure Mobile Health Applications, A Systematic Review. CoRR abs/2007.10876 (2020) - [i17]Yaser Mansouri, Muhammad Ali Babar:
The Impact of Distance on Performance and Scalability of Distributed Database Systems in Hybrid Clouds. CoRR abs/2007.15826 (2020) - [i16]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers Perspective. CoRR abs/2008.03034 (2020) - [i15]Triet Huynh Minh Le, Roland Croft, David Hin, Muhammad Ali Babar:
Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites. CoRR abs/2008.04176 (2020) - [i14]Mubin Ul Haque, Leonardo Horn Iwaya, Muhammad Ali Babar:
Challenges in Docker Development: A Large-scale Study Using Stack Overflow. CoRR abs/2008.04467 (2020) - [i13]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
Security Awareness of End-Users of Mobile Health Applications: An Empirical Study. CoRR abs/2008.13009 (2020) - [i12]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
Software Security Patch Management - A Systematic Literature Review of Challenges, Approaches, Tools and Practices. CoRR abs/2012.00544 (2020) - [i11]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration. CoRR abs/2012.09344 (2020)
2010 – 2019
- 2019
- [j56]Muhammad Ali Babar, Haifeng Shen, Stefan Biffl, Dietmar Winkler:
An Empirical Study of the Effectiveness of Software Architecture Evaluation Meetings. IEEE Access 7: 79069-79084 (2019) - [j55]Azhar Iqbal, Lachlan J. Gunn, Mingyu Guo, Muhammad Ali Babar, Derek Abbott:
Game Theoretical Modelling of Network/Cybersecurity. IEEE Access 7: 154167-154179 (2019) - [j54]Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar:
Internet of things search engine. Commun. ACM 62(7): 66-73 (2019) - [j53]Giannis Tziakouris, Rami Bahsoon, Muhammad Ali Babar:
A Survey on Self-Adaptive Security for Large-scale Open Environments. ACM Comput. Surv. 51(5): 100:1-100:42 (2019) - [j52]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
A Multi-Vocal Review of Security Orchestration. ACM Comput. Surv. 52(2): 37:1-37:45 (2019) - [j51]Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu:
An empirical study of architecting for continuous delivery and deployment. Empir. Softw. Eng. 24(3): 1061-1108 (2019) - [j50]Bedir Tekinerdogan, Uwe Zdun, Muhammad Ali Babar:
Special issue on architecting for hyper connectivity and hyper virtualization. J. Syst. Softw. 149: 531-532 (2019) - [j49]Faheem Ullah, Muhammad Ali Babar:
Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review. J. Syst. Softw. 151: 81-118 (2019) - [c159]Nguyen Khoi Tran, Muhammad Ali Babar, Quan Z. Sheng, John C. Grundy:
A Framework for Internet of Things Search Engines Engineering. APSEC 2019: 228-235 - [c158]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
Automated Interpretation and Integration of Security Tools Using Semantic Knowledge. CAiSE 2019: 513-528 - [c157]Ba Dung Le, Guanhua Wang, Mehwish Nasim, Muhammad Ali Babar:
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification. CW 2019: 316-323 - [c156]Faheem Ullah, Muhammad Ali Babar:
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics. ICECCS 2019: 81-86 - [c155]Faheem Ullah, Muhammad Ali Babar:
An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics. ICSA 2019: 41-50 - [c154]Fangchao Tian, Peng Liang, Muhammad Ali Babar:
How Developers Discuss Architecture Smells? An Exploratory Study on Stack Overflow. ICSA 2019: 91-100 - [c153]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
An ontology-driven approach to automating the process of integrating security software systems. ICSSP 2019: 54-63 - [c152]Triet Huynh Minh Le, Bushra Sabir, Muhammad Ali Babar:
Automated software vulnerability assessment with concept drift. MSR 2019: 371-382 - [c151]Faheem Ullah, Muhammad Ali Babar:
Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation. PDCAT 2019: 146-153 - [c150]He Zhang, Xin Huang, Xin Zhou, Huang Huang, Muhammad Ali Babar:
Ethnographic research in software engineering: a critical review and checklist. ESEC/SIGSOFT FSE 2019: 659-670 - [i10]Azhar Iqbal, Mingyu Guo, Lachlan J. Gunn, Muhammad Ali Babar, Derek Abbott:
Game theoretical modelling of network/cyber security [Review paper]. CoRR abs/1901.08426 (2019) - [i9]Ba Dung Le, Guanhua Wang, Mehwish Nasim, Muhammad Ali Babar:
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification. CoRR abs/1907.01755 (2019) - 2018
- [j48]Claudia P. Ayala, Anh Nguyen Duc, Xavier Franch, Martin Höst, Reidar Conradi, Daniela S. Cruzes, Muhammad Ali Babar:
System requirements-OSS components: matching and mismatch resolution practices - an empirical study. Empir. Softw. Eng. 23(6): 3073-3128 (2018) - [j47]Wei Zhang, Yun Yang, Xiao Liu, Cheng Zhang, Xuejun Li, Rongbin Xu, Futian Wang, Muhammad Ali Babar:
Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization. Int. J. Comput. Intell. Syst. 11(1): 894-910 (2018) - [j46]Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, Muhammad Ali Babar, Awais Rashid:
Data exfiltration: A review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 101: 18-54 (2018) - [j45]Zheng Li, Rajiv Ranjan, Liam O'Brien, He Zhang, Muhammad Ali Babar, Albert Y. Zomaya, Lizhe Wang:
On the Communication Variability Analysis of the NeCTAR Research Cloud System. IEEE Syst. J. 12(2): 1506-1517 (2018) - [c149]Mansooreh Zahedi, Muhammad Ali Babar, Brenton Cooper:
An empirical investigation of transferring research to software technology innovation: a case of data-driven national security software. ESEM 2018: 10:1-10:10 - [c148]Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An Empirical Study of Security Issues Posted in Open Source Projects. HICSS 2018: 1-10 - [c147]Xin Huang, He Zhang, Xin Zhou, Muhammad Ali Babar, Song Yang:
Synthesizing qualitative research in software engineering: a critical review. ICSE 2018: 1207-1218 - [c146]Mingyu Guo, Yong Yang, Muhammad Ali Babar:
Cost Sharing Security Information with Minimal Release Delay. PRIMA 2018: 177-193 - [c145]Yongrui Xu, Peng Liang, Muhammad Ali Babar:
Automatically exploiting implicit design knowledge when solving the class responsibility assignment problem. SANER 2018: 197-209 - [i8]Faheem Ullah, Muhammad Ali Babar:
Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review. CoRR abs/1802.03178 (2018) - [i7]Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu:
An Empirical Study of Architecting for Continuous Delivery and Deployment. CoRR abs/1808.08796 (2018) - [i6]Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao, Wei Emma Zhang, Schahram Dustdar:
Internet of Things Search Engine: Concepts, Classification, and Open Issues. CoRR abs/1812.02930 (2018) - 2017
- [j44]Mojtaba Shahin, Muhammad Ali Babar, Liming Zhu:
Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices. IEEE Access 5: 3909-3943 (2017) - [j43]Chen Gao, Kaiqi Jin, Haifeng Shen, Muhammad Ali Babar:
Are you a human or a humanoid: Predictive user modelling through behavioural analysis of online gameplay data. Adv. Eng. Informatics 33: 410-424 (2017) - [j42]Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao:
Searching the Web of Things: State of the Art, Challenges, and Solutions. ACM Comput. Surv. 50(4): 55:1-55:34 (2017) - [j41]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Quan Z. Sheng:
A Reference Architecture for provisioning of Tools as a Service: Meta-model, Ontologies and Design Elements. Future Gener. Comput. Syst. 69: 41-65 (2017) - [j40]Farshid Anvari, Deborah Richards, Michael Hitchens, Muhammad Ali Babar, Hien Minh Thi Tran, Peter Busch:
An empirical investigation of the influence of persona with personality traits on conceptual design. J. Syst. Softw. 134: 324-339 (2017) - [j39]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Boualem Benatallah:
Architecting cloud-enabled systems: a systematic survey of challenges and solutions. Softw. Pract. Exp. 47(4): 599-644 (2017) - [j38]Rashina Hoda, Muhammad Ali Babar, Yogeshwar Shastri, Humaa Yaqoob:
Socio-Cultural Challenges in Global Software Engineering Education. IEEE Trans. Educ. 60(3): 173-182 (2017) - [c144]Liming Dong, Bohan Liu, Zheng Li, Ou Wu, Muhammad Ali Babar, Bingbing Xue:
A Mapping Study on Mining Software Process. APSEC 2017: 51-60 - [c143]Abdullah Alfazi, Quan Z. Sheng, Ali Babar, Wenjie Ruan, Yongrui Qin:
Toward Unified Cloud Service Discovery for Enhanced Service Identification. ASSRI 2017: 149-163 - [c142]Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar, Liming Zhu:
Adopting Continuous Delivery and Deployment: Impacts on Team Structures, Collaboration and Responsibilities. EASE 2017: 384-393 - [c141]Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar:
Security Support in Continuous Deployment Pipeline. ENASE 2017: 57-68 - [c140]Mojtaba Shahin, Muhammad Ali Babar, Mansooreh Zahedi, Liming Zhu:
Beyond Continuous Delivery: An Empirical Investigation of Continuous Deployment Challenges. ESEM 2017: 111-120 - [c139]Hideaki Hata, Mingyu Guo, Muhammad Ali Babar:
Understanding the Heterogeneity of Contributors in Bug Bounty Programs. ESEM 2017: 223-228 - [c138]Jamal El Hachem, Tarek Al Khalil, Vanea Chiprianov, Muhammad Ali Babar, Philippe Aniorté:
A Model Driven Method to Design and Analyze Secure Architectures of Systems-of-Systems. ICECCS 2017: 166-169 - [c137]Mingyu Guo, Hideaki Hata, Muhammad Ali Babar:
Optimizing Affine Maximizer Auctions via Linear Programming: An Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. PRIMA 2017: 280-292 - [c136]Nguyen Khoi Tran, Quan Z. Sheng, Muhammad Ali Babar, Lina Yao:
A Kernel-Based Approach to Developing Adaptable and Reusable Sensor Retrieval Systems for the Web of Things. WISE (1) 2017: 315-329 - [p2]Muhammad Aufeef Chauhan, Muhammad Ali Babar:
Using Reference Architectures for Design and Evaluation of Web of Things Systems✶: A Case of Smart Homes Domain. Managing the Web of Things 2017: 205-228 - [i5]Aakash Ahmad, Muhammad Ali Babar:
Software Architectures for Robotics Systems: A Systematic Mapping Study. CoRR abs/1701.05453 (2017) - [i4]Davide Falessi, Muhammad Ali Babar, Giovanni Cantone, Philippe Kruchten:
Applying empirical software engineering to software architecture: challenges and lessons learned. CoRR abs/1701.06000 (2017) - [i3]Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar:
Security Support in Continuous Deployment Pipeline. CoRR abs/1703.04277 (2017) - [i2]Mojtaba Shahin, Muhammad Ali Babar, Liming Zhu:
Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices. CoRR abs/1703.07019 (2017) - [i1]Hideaki Hata, Mingyu Guo, Muhammad Ali Babar:
Understanding the Heterogeneity of Contributors in Bug Bounty Programs. CoRR abs/1709.06224 (2017) - 2016
- [j37]Mansooreh Zahedi, Mojtaba Shahin, Muhammad Ali Babar:
A systematic review of knowledge sharing challenges and practices in global software development. Int. J. Inf. Manag. 36(6): 995-1019 (2016) - [j36]Mansooreh Zahedi, Muhammad Ali Babar:
Why does site visit matter in global software development: A knowledge-based perspective. Inf. Softw. Technol. 80: 36-56 (2016) - [j35]Rafael Capilla, Anton Jansen, Antony Tang, Paris Avgeriou, Muhammad Ali Babar:
10 years of software architecture knowledge management: Practice and future. J. Syst. Softw. 116: 191-205 (2016) - [j34]Aakash Ahmad, Muhammad Ali Babar:
Software architectures for robotic systems: A systematic mapping study. J. Syst. Softw. 122: 16-39 (2016) - [c135]Wei Emma Zhang, Quan Z. Sheng, Ermyas Abebe, Muhammad Ali Babar, Andi Zhou:
Mining Source Code Topics Through Topic Model and Words Embedding. ADMA 2016: 664-676 - [c134]Jamal El Hachem, Zi Yang Pang, Vanea Chiprianov, Muhammad Ali Babar, Philippe Aniorté:
Model Driven Software Security Architecture of Systems-of-Systems. APSEC 2016: 89-96 - [c133]Chen Gao, Haifeng Shen, Muhammad Ali Babar:
Concealing jitter in Multi-Player Online Games through predictive behaviour modeling. CSCWD 2016: 62-67 - [c132]Jamal El Hachem, Vanea Chiprianov, Muhammad Ali Babar, Philippe Aniorté:
Towards methodological support for secure architectures of software-intensive systems-of-systems. SiSoS@ECSA 2016: 9:1-9:6 - [c131]Mojtaba Shahin, Muhammad Ali Babar, Liming Zhu:
The Intersection of Continuous Deployment and Architecting Process: Practitioners' Perspectives. ESEM 2016: 44:1-44:10 - [c130]Abdulwahab Ali Almazroi, Haifeng Shen, Kung-Keat Teoh, Muhammad Ali Babar:
Cloud for e-Learning: Determinants of Its Adoption by University Students in a Developing Country. ICEBE 2016: 71-78 - [c129]Paolo Tell, Muhammad Ali Babar:
An Empirical Evaluation of an Activity-Based Infrastructure for Supporting Cooperation in Software Engineering. ICGSE 2016: 34-43 - [c128]Andrew Cain, Muhammad Ali Babar:
Reflections on applying constructive alignment with formative feedback for teaching introductory programming and software architecture. ICSE (Companion Volume) 2016: 336-345 - [c127]Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar:
Discovering "unknown known" security requirements. ICSE 2016: 866-876 - [c126]Mingyu Guo, Hideaki Hata, Muhammad Ali Babar:
Revenue Maximizing Markets for Zero-Day Exploits. PRIMA 2016: 247-260 - [c125]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Christian W. Probst:
A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. PROFES 2016: 111-126 - [e13]Bedir Tekinerdogan, Uwe Zdun, Muhammad Ali Babar:
Software Architecture - 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 - December 2, 2016, Proceedings. Lecture Notes in Computer Science 9839, 2016, ISBN 978-3-319-48991-9 [contents] - [e12]Khalil Drira, Flávio Oquendo, Muhammad Ali Babar, Axel Legay:
Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, SiSoS@ECSA 2016, Copenhagen, Denmark, November 29-29, 2016. ACM 2016 [contents] - 2015
- [j33]Peng Zhang, Yanbo Han, Muhammad Ali Babar:
A dataflow optimisation mechanism for service-oriented cloud workflow. Int. J. Comput. Sci. Eng. 10(1/2): 15-31 (2015) - [c124]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Quan Z. Sheng:
A Reference Architecture for a Cloud-Based Tools as a Service Workspace. SCC 2015: 475-482 - [c123]You Zhou, He Zhang, Xin Huang, Song Yang, Muhammad Ali Babar, Hao Tang:
Quality assessment of systematic reviews in software engineering: a tertiary study. EASE 2015: 14:1-14:14 - [c122]Mojtaba Shahin, Muhammad Ali Babar:
Improving the Quality of Architecture Design Through Peer-Reviews and Recombination. ECSA 2015: 70-86 - [c121]Farshid Anvari, Deborah Richards, Michael Hitchens, Muhammad Ali Babar:
Effectiveness of Persona with Personality Traits on Conceptual Design. ICSE (2) 2015: 263-272 - [c120]Muhammad Ali Babar, Hye-Young Paik, Malolan Chetlur, Michael Bauer, Amir Molzam Sharifloo:
7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems (PESOS 2015). ICSE (2) 2015: 987-988 - [c119]Wei Zhang, Yun Yang, Junchao Xiao, Xiao Liu, Muhammad Ali Babar:
Ant colony algorithm based scheduling for handling software project delay. ICSSP 2015: 52-56 - [c118]Yongrui Xu, Peng Liang, Muhammad Ali Babar:
Introducing Learning Mechanism for Class Responsibility Assignment Problem. SSBSE 2015: 311-317 - [e11]Fei-Ching Diana Kuo, Stuart Marshall, Haifeng Shen, Markus Stumptner, Muhammad Ali Babar:
Proceedings of the 24th Australasian Software Engineering Conference, ASWEC 2015, Volume II, Adelaide, SA, Australia, September 28 - October 1, 2015. ACM 2015, ISBN 978-1-4503-3796-0 [contents] - [e10]Jian Lv, He Jason Zhang, Muhammad Ali Babar:
Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering, EASE 2015, Nanjing, China, April 27-29, 2015. ACM 2015, ISBN 978-1-4503-3350-4 [contents] - [e9]Muhammad Ali Babar, Hye-Young Paik, Malolan Chetlur, Michael Bauer, Amir Molzam Sharifloo:
7th IEEE/ACM International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, PESOS 2015, Florence, Italy, May 23, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7058-5 [contents] - 2014
- [j32]Muhammad Ali Babar, Christian Lescher:
Global software engineering: Identifying challenges is important and providing solutions is even better. Inf. Softw. Technol. 56(1): 1-5 (2014) - [j31]June M. Verner, Muhammad Ali Babar, Narciso Cerpa, Tracy Hall, Sarah Beecham:
Factors that motivate software engineering teams: A four country empirical study. J. Syst. Softw. 92: 115-127 (2014) - [j30]Mojtaba Shahin, Peng Liang, Muhammad Ali Babar:
A systematic review of software architecture visualization techniques. J. Syst. Softw. 94: 161-185 (2014) - [j29]Xin Peng, Muhammad Ali Babar, Christof Ebert:
Collaborative Software Development Platforms for Crowdsourcing. IEEE Softw. 31(2): 30-36 (2014) - [j28]Klaas-Jan Stol, Paris Avgeriou, Muhammad Ali Babar, Yan Lucas, Brian Fitzgerald:
Key factors for adopting inner source. ACM Trans. Softw. Eng. Methodol. 23(2): 18:1-18:35 (2014) - [c117]Mansooreh Zahedi, Muhammad Ali Babar:
Knowledge sharing for common understanding of technical specifications through artifactual culture. EASE 2014: 11:1-11:10 - [c116]Jane Cleland-Huang, Muhammad Ali Babar, Mehdi Mirakhorli:
An inverted classroom experience: engaging students in architectural thinking for agile projects. ICSE Companion 2014: 364-371 - [c115]Mansooreh Zahedi, Muhammad Ali Babar:
Towards an understanding of enabling process knowing in global software development: a case study. ICSSP 2014: 30-39 - [c114]Aakash Ahmad, Muhammad Ali Babar:
Towards a pattern language for self-adaptation of cloud-based architectures. WICSA Companion 2014: 1:1-1:6 - [c113]Aakash Ahmad, Muhammad Ali Babar:
A framework for architecture-driven migration of legacy systems to cloud-enabled software. WICSA Companion 2014: 7:1-7:8 - [c112]Muhammad Aufeef Chauhan, Muhammad Ali Babar:
Towards a Reference Architecture to Provision Tools as a Service for Global Software Development. WICSA 2014: 167-170 - [c111]Lianping Chen, Muhammad Ali Babar:
Towards an Evidence-Based Understanding of Emergence of Architecture through Continuous Refactoring in Agile Software Development. WICSA 2014: 195-204 - [c110]Matthias Galster, Muhammad Ali Babar:
Empirical Study of Architectural Knowledge Management Practices. WICSA 2014: 239-242 - [e8]Muhammad Ali Babar, Hye-Young Paik, Malolan Chetlur, Michael Bauer:
Proceedings of the 6th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, PESOS 2014, Hyderabad, India, May 31, 2014. ACM 2014, ISBN 978-1-4503-2841-8 [contents] - 2013
- [j27]He Zhang, Muhammad Ali Babar:
Systematic reviews in software engineering: An empirical investigation. Inf. Softw. Technol. 55(7): 1341-1354 (2013) - [j26]Lianping Chen, Muhammad Ali Babar, Bashar Nuseibeh:
Characterizing Architecturally Significant Requirements. IEEE Softw. 30(2): 38-45 (2013) - [j25]Muhammad Ali Babar, Ian Gorton, Flávio Oquendo:
Building European software architecture community: how far have we come? Softw. Syst. Model. 12(2): 435-438 (2013) - [c109]Paolo Tell, Muhammad Ali Babar, John Grundy:
A Preliminary User Evaluation of an Infrastructure to Support Activity-Based Computing in Global Software Development (ABC4GSD). ICGSE 2013: 100-109 - [c108]Muhammad Ali Babar, Mansooreh Zahedi:
Understanding Structures and Affordances of Extended Teams in Global Software Development. ICGSE 2013: 226-235 - [c107]Shilpi Jain, Muhammad Ali Babar, Jude Fernandez:
Conducting empirical studies in industry: balancing rigor and relevance. CESI@ICSE 2013: 9-14 - [c106]Mansooreh Zahedi, Muhammad Ali Babar:
Exploring social structures in Extended Team Model. CHASE@ICSE 2013: 105-108 - [c105]Muhammad Ali Babar:
Tales of empirically understanding and providing process support for migrating to clouds. MESOCA 2013: 74 - [c104]Muhammad Ali Babar, Marlon Dumas, Arnor Solberg:
NordiCloud 2013: a Nordic and Baltic gathering for supporting cloud computing and internet technologies. NordiCloud 2013: 1-5 - [c103]Muhammad Ali Babar:
Perspectives and reflections on cloud computing and internet technologies from NordiCloud 2012. NordiCloud 2013: 72-79 - [e7]Arnor Solberg, Muhammad Ali Babar, Marlon Dumas, Carlos E. Cuesta:
Second Nordic Symposium on Cloud Computing & Internet Technologies, NordiCloud '13, Oslo, Norway, September 1-3, 2013. ACM International Conference Proceeding Series 826, ACM 2013, ISBN 978-1-4503-2307-9 [contents] - 2012
- [j24]Rafael Capilla, Muhammad Ali Babar, Oscar Pastor:
Quality requirements engineering for systems and software architecting: methods, approaches, and tools. Requir. Eng. 17(4): 255-258 (2012) - [j23]Bedir Tekinerdogan, Semih Cetin, Muhammad Ali Babar, Patricia Lago, Juho Mäkiö:
Architecting in global software engineering. ACM SIGSOFT Softw. Eng. Notes 37(1): 1-7 (2012) - [j22]Muhammad Ali Babar:
A framework for groupware-supported software architecture evaluation process in global software development. J. Softw. Maintenance Res. Pract. 24(2): 207-229 (2012) - [j21]Patricia Lago, Henry Muccini, Muhammad Ali Babar:
An empirical study of learning by osmosis in global software engineering. J. Softw. Evol. Process. 24(6): 693-706 (2012) - [c102]Muhammad Aufeef Chauhan, Muhammad Ali Babar:
Towards Process Support for Migrating Applications to Cloud Computing. CDC 2012: 80-87 - [c101]Paolo Tell, Muhammad Ali Babar:
Activity Theory Applied to Global Software Engineering: Theoretical Foundations and Implications for Tool Builders. ICGSE 2012: 21-30 - [c100]Claudia P. Ayala, Daniela S. Cruzes, Anh Nguyen Duc, Reidar Conradi, Xavier Franch, Martin Höst, Muhammad Ali Babar:
OSS Integration Issues and Community Support: An Integrator Perspective. OSS 2012: 129-143 - [c99]Muhammad Ali Babar, Parastoo Mohagheghi, Åke Edlund, Sébastien Mosser, Tommi Mikkonen, Peep Küngas:
Nordic Symposium on Cloud Computing and Internet Technologies (NordiCloud). WICSA/ECSA Companion Volume 2012: 1-4 - [c98]Muhammad Aufeef Chauhan, Muhammad Ali Babar:
Cloud infrastructure for providing tools as a service: quality attributes and potential solutions. WICSA/ECSA Companion Volume 2012: 5-13 - [e6]Tomi Männistö, Muhammad Ali Babar, Carlos E. Cuesta, Juha Erik Savolainen:
2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, WICSA/ECSA 2012, Helsinki, Finland, August 20-24, 2012 - Companion Volume. ACM International Conference Proceeding Series 704, ACM 2012, ISBN 978-1-4503-1568-5 [contents] - 2011
- [j20]Muhammad Ali Babar, Patricia Lago, Arie van Deursen:
Empirical research in software architecture: opportunities, challenges, and approaches. Empir. Softw. Eng. 16(5): 539-543 (2011) - [j19]Lianping Chen, Muhammad Ali Babar:
A systematic review of evaluation of variability management approaches in software product lines. Inf. Softw. Technol. 53(4): 344-362 (2011) - [j18]He Zhang, Muhammad Ali Babar, Paolo Tell:
Identifying relevant studies in software engineering. Inf. Softw. Technol. 53(6): 625-637 (2011) - [j17]Klaas-Jan Stol, Muhammad Ali Babar, Paris Avgeriou, Brian Fitzgerald:
A comparative study of challenges in integrating Open Source Software and Inner Source Software. Inf. Softw. Technol. 53(12): 1319-1336 (2011) - [j16]Jacek Rosik, Andrew Le Gear, Jim Buckley, Muhammad Ali Babar, Dave Connolly:
Assessing architectural drift in commercial software development: a case study. Softw. Pract. Exp. 41(1): 63-86 (2011) - [c97]Muhammad Aufeef Chauhan, Muhammad Ali Babar:
Migrating Service-Oriented System to Cloud Computing: An Experience Report. IEEE CLOUD 2011: 404-411 - [c96]He Zhang, Muhammad Ali Babar, Xu Bai, Juan Li, Liguo Huang:
An empirical assessment of a systematic search process for systematic reviews. EASE 2011: 56-65 - [c95]Klaas-Jan Stol, Paris Avgeriou, Muhammad Ali Babar:
Design and Evaluation of a Process for Identifying Architecture Patterns in Open Source Software. ECSA 2011: 147-163 - [c94]He Zhang, Muhammad Ali Babar:
An Empirical Investigation of Systematic Reviews in Software Engineering. ESEM 2011: 87-96 - [c93]Paolo Tell, Muhammad Ali Babar:
Requirements for an Infrastructure to Support Activity-Based Computing in Global Software Development. ICGSE Workshops 2011: 62-69 - [c92]Paolo Tell, Muhammad Ali Babar:
Supporting activity based computing paradigm in global software development. ASE 2011: 508-511 - [c91]Klaas-Jan Stol, Muhammad Ali Babar, Paris Avgeriou:
The Importance of Architectural Knowledge in Integrating Open Source Software. OSS 2011: 142-158 - [c90]Goetz Botterweck, Natsuko Noda, Deepak Dhungana, Rick Rabiser, Muhammad Ali Babar, Sholom Cohen, Kyo Chul Kang, Tomoji Kishi:
Joint Workshop of the Third International Workshop on Model-Driven Approaches in Software Product Line Engineering and the Third Workshop on Scalable Modeling Techniques for Software Product Lines (MAPLE/SCALE 2011). SPLC 2011: 340 - 2010
- [j15]Davide Falessi, Muhammad Ali Babar, Giovanni Cantone, Philippe Kruchten:
Applying empirical software engineering to software architecture: challenges and lessons learned. Empir. Softw. Eng. 15(3): 250-276 (2010) - [j14]Muhammad Sarmad Ali, Muhammad Ali Babar, Lianping Chen, Klaas-Jan Stol:
A systematic review of comparative evidence of aspect-oriented programming. Inf. Softw. Technol. 52(9): 871-887 (2010) - [j13]Mahmood Niazi, Muhammad Ali Babar, June M. Verner:
Software Process Improvement barriers: A cross-cultural comparison. Inf. Softw. Technol. 52(11): 1204-1216 (2010) - [j12]Antony Tang, Paris Avgeriou, Anton Jansen, Rafael Capilla, Muhammad Ali Babar:
A comparative study of architecture knowledge management tools. J. Syst. Softw. 83(3): 352-370 (2010) - [j11]Pekka Abrahamsson, Muhammad Ali Babar, Philippe Kruchten:
Agility and Architecture: Can They Coexist?. IEEE Softw. 27(2): 16-22 (2010) - [j10]Muhammad Ali Babar, Lianping Chen, Forrest Shull:
Managing Variability in Software Product Lines. IEEE Softw. 27(3): 89-91 (2010) - [c89]Hongyu Pei Breivold, Muhammad Aufeef Chauhan, Muhammad Ali Babar:
A Systematic Review of Studies of Open Source Software Evolution. APSEC 2010: 356-365 - [c88]Lianping Chen, Muhammad Ali Babar, Haiqi Liang:
Model-Centered Customizable Architectural Design Decisions Management. Australian Software Engineering Conference 2010: 23-32 - [c87]Lianping Chen, Muhammad Ali Babar, He Zhang:
Towards an Evidence-Based Understanding of Electronic Data Sources. EASE 2010 - [c86]Klaas-Jan Stol, Paris Avgeriou, Muhammad Ali Babar:
Identifying Architectural Patterns Used in Open Source Software: Approaches and Challenges. EASE 2010 - [c85]He Zhang, Muhammad Ali Babar:
On Searching Relevant Studies in Software Engineering. EASE 2010 - [c84]Lianping Chen, Muhammad Ali Babar:
Supporting Customizable Architectural Design Decision Management. ECBS 2010: 232-240 - [c83]Siming Kou, Muhammad Ali Babar, Amit Sangroya:
Modeling security for service oriented applications. ECSA Companion Volume 2010: 294-301 - [c82]Nour Ali, Rukmani Nellipaiappan, Rajalaxmi Chandran, Muhammad Ali Babar:
Model driven support for the Service Oriented Architecture modeling language. PESOS 2010: 8-14 - [c81]Klaas-Jan Stol, Muhammad Ali Babar:
A Comparison Framework for Open Source Software Evaluation Methods. OSS 2010: 389-394 - [c80]Lianping Chen, Muhammad Ali Babar:
Variability Management in Software Product Lines: An Investigation of Contemporary Industrial Challenges. SPLC 2010: 166-180 - [c79]Muhammad Ali Babar, Sholom Cohen, Kyo Chul Kang, Tomoji Kishi, Frank van der Linden, Natsuko Noda, Klaus Pohl:
2nd Workshop on Scalable Modeling Techniques for Software Product Lines (SCALE 2010). SPLC 2010: 529 - [e5]Muhammad Ali Babar, Ian Gorton:
Software Architecture, 4th European Conference, ECSA 2010, Copenhagen, Denmark, August 23-26, 2010. Proceedings. Lecture Notes in Computer Science 6285, Springer 2010, ISBN 978-3-642-15113-2 [contents] - [e4]Ian Gorton, Carlos E. Cuesta, Muhammad Ali Babar:
Software Architecture, 4th European Conference, ECSA 2010, Copenhagen, Denmark, August 23-26, 2010. Companion Volume. ACM International Conference Proceeding Series, ACM 2010, ISBN 978-1-4503-0179-4 [contents] - [e3]Muhammad Ali Babar, Matias Vierimaa, Markku Oivo:
Product-Focused Software Process Improvement, 11th International Conference, PROFES 2010, Limerick, Ireland, June 21-23, 2010. Proceedings. Lecture Notes in Business Information Processing 6156, Springer 2010, ISBN 978-3-642-13791-4 [contents] - [e2]Markku Oivo, Muhammad Ali Babar, Matias Vierimaa:
Proceedings of the 11th International Conference on Product Focused Software, PROFES '10, Limerick, Ireland, June 21-23, 2010, volume 2: Short Papers, Doctoral Symposium and Workshops. ACM 2010, ISBN 978-1-4503-0281-4 [contents]
2000 – 2009
- 2009
- [j9]Muhammad Ali Babar, Ian Gorton:
Software Architecture Review: The State of Practice. Computer 42(7): 26-32 (2009) - [j8]Mahmood Niazi, Muhammad Ali Babar:
Identifying high perceived value practices of CMMI level 2: An empirical study. Inf. Softw. Technol. 51(8): 1231-1243 (2009) - [j7]Muhammad Ali Babar, Patricia Lago:
Design decisions and design rationale in software architecture. J. Syst. Softw. 82(8): 1195-1197 (2009) - [c78]Emam Hossain, Muhammad Ali Babar, Hye-young Paik, June M. Verner:
Risk Identification and Mitigation Processes for Using Scrum in Global Software Development: A Conceptual Framework. APSEC 2009: 457-464 - [c77]Lianping Chen, Muhammad Ali Babar, Ciarán Cawley:
A Status Report on the Evaluation of Variability Management Approaches. EASE 2009 - [c76]Muhammad Ali Babar, He Zhang:
Systematic literature reviews in software engineering: Preliminary results from interviews with researchers. ESEM 2009: 346-355 - [c75]Muhammad Sarmad Ali, Muhammad Ali Babar, Klaus Schmid:
A Comparative Survey of Economic Models for Software Product Lines. EUROMICRO-SEAA 2009: 275-278 - [c74]Nour Ali, Muhammad Ali Babar:
Modeling Service Oriented Architectures of Mobile Applications by Extending SoaML with Ambients. EUROMICRO-SEAA 2009: 442-449 - [c73]Emam Hossain, Muhammad Ali Babar, June M. Verner:
How Can Agile Practices Minimize Global Software Development Co-ordination Risks? EuroSPI 2009: 81-92 - [c72]Muhammad Ali Babar:
A Framework for Supporting the Software Architecture Evaluation Process in Global Software Development. ICGSE 2009: 93-102 - [c71]Emam Hossain, Muhammad Ali Babar, Hye-young Paik:
Using Scrum in Global Software Development: A Systematic Literature Review. ICGSE 2009: 175-184 - [c70]Aman-ul-haq, Muhammad Ali Babar:
Tool support for automating architectural knowledge extraction. SHARK@ICSE 2009: 49-56 - [c69]Deva Kumar Deeptimahanti, Muhammad Ali Babar:
An Automated Tool for Generating UML Models from Natural Language Requirements. ASE 2009: 680-682 - [c68]Klaas-Jan Stol, Muhammad Ali Babar:
Reporting Empirical Research in Open Source Software: The State of Practice. OSS 2009: 156-169 - [c67]Muhammad Ali Babar, Björn Lundell, Frank van der Linden:
A Joint Workshop of QACOS and OSSPL. OSS 2009: 357-358 - [c66]Jacek Rosik, Jim Buckley, Muhammad Ali Babar:
Design Requirements for an Architecture Consistency Tool. PPIG 2009: 16 - [c65]Emam Hossain, Muhammad Ali Babar, June M. Verner:
Towards a Framework for Using Agile Approaches in Global Software Development. PROFES 2009: 126-140 - [c64]Lianping Chen, Muhammad Ali Babar, Nour Ali:
Variability management in software product lines: a systematic review. SPLC 2009: 81-90 - [c63]Muhammad Ali Babar, Tuomas Ihme, Minna Pikkarainen:
An industrial case of exploiting product line architectures in agile software development. SPLC 2009: 171-179 - [c62]Muhammad Ali Babar:
An exploratory study of architectural practices and challenges in using agile software development approaches. WICSA/ECSA 2009: 81-90 - [c61]Muhammad Ali Babar, Pekka Abrahamsson:
Architecture-Centric Methods and Agile Approaches. XP 2009: 232-233 - [p1]Muhammad Ali Babar:
Supporting the Software Architecture Process with Knowledge Management. Software Architecture Knowledge Management 2009: 69-86 - [e1]Muhammad Ali Babar, Torgeir Dingsøyr, Patricia Lago, Hans van Vliet:
Software Architecture Knowledge Management. Springer 2009, ISBN 978-3-642-02373-6 [contents] - 2008
- [j6]Muhammad Ali Babar, Barbara A. Kitchenham, D. Ross Jeffery:
Comparing distributed and face-to-face meetings for software architecture evaluation: A controlled experiment. Empir. Softw. Eng. 13(1): 39-62 (2008) - [j5]Barbara A. Kitchenham, Hiyam Al-Kilidar, Muhammad Ali Babar, Mike Berry, Karl Cox, Jacky Keung, Felicia Kurniawati, Mark Staples, He Zhang, Liming Zhu:
Evaluating guidelines for reporting empirical software engineering studies. Empir. Softw. Eng. 13(1): 97-121 (2008) - [j4]Mahmood Niazi, Muhammad Ali Babar, Nolin Mark Katugampola:
Demotivators of software process improvement: an empirical investigation. Softw. Process. Improv. Pract. 13(3): 249-264 (2008) - [c60]Odd Petter N. Slyngstad, Reidar Conradi, Muhammad Ali Babar, Viktor Clerc, Hans van Vliet:
Risks and Risk Management in Software Architecture Evolution: An Industrial Survey. APSEC 2008: 101-108 - [c59]Muhammad Ali Babar, Mari Tainlassi, Björn Lundell:
Message from the QACOS 2008 Workshop Organizers. COMPSAC 2008: 1211 - [c58]Muhammad Ali Babar, Mari Tainlassi, Björn Lundell:
QACOS 2008 Workshop Organization. COMPSAC 2008: 1212 - [c57]Faheem Ahmed, Luiz Fernando Capretz, Muhammad Ali Babar:
A Model of Open Source Software-Based Product Line Development. COMPSAC 2008: 1215-1220 - [c56]Muhammad Ali Babar:
Assessment of a Framework for Designing and Evaluating Security Sensitive Architecture. EASE 2008 - [c55]Stefan Biffl, Muhammad Ali Babar, Dietmar Winkler:
Impact of Experience and Team Size on the Quality of Scenarios for Architecture Evaluation. EASE 2008 - [c54]Muhammad Ali Babar, Andrew Northway, Ian Gorton, Paul Heuer, Thong Nguyen:
Introducing Tool Support for Managing Architectural Knowledge: An Experience Report. ECBS 2008: 105-113 - [c53]Rafael Capilla, Muhammad Ali Babar:
On the Role of Architectural Design Decisions in Software Product Line Engineering. ECSA 2008: 241-255 - [c52]Jacek Rosik, Andrew Le Gear, Jim Buckley, Muhammad Ali Babar:
An industrial case study of architecture conformance. ESEM 2008: 80-89 - [c51]Dietmar Winkler, Stefan Biffl, Muhammad Ali Babar:
An empirical investigation of scenarios gained and lost in architecture evaluation meetings. ESEM 2008: 348-350 - [c50]Muhammad Ali Babar, Mahmood Niazi:
Implementing Software Process Improvement Initiatives: An Analysis of Vietnamese Practitioners' Views. ICGSE 2008: 67-76 - [c49]Patricia Lago, Henry Muccini, Muhammad Ali Babar:
Developing a Course on Designing Software in Globally Distributed Teams. ICGSE 2008: 249-253 - [c48]Jack Downey, Muhammad Ali Babar:
On identifying the skills needed for software architects. LMSA@ICSE 2008: 1-6 - [c47]Muhammad Ali Babar:
The application of knowledge-sharing workspace paradigm for software architecture processes. SHARK 2008: 45-48 - [c46]Mahmood Niazi, Charles Hickman, Rashid Ahmad, Muhammad Ali Babar:
A Model for Requirements Change Management: Implementation of CMMI Level 2 Specific Practice. PROFES 2008: 143-157 - [c45]Odd Petter N. Slyngstad, Jingyue Li, Reidar Conradi, Muhammad Ali Babar:
Identifying and Understanding Architectural Risks in Software Evolution: An Empirical Study. PROFES 2008: 400-414 - [c44]Mahmood Niazi, Muhammad Ali Babar, Suhaimi Ibrahim:
An Empirical Study Identifying High Perceived Value Practices of CMMI Level 2. PROFES 2008: 427-441 - [c43]Yan Liu, Muhammad Ali Babar, Ian Gorton:
Middleware Architecture Evaluation for Dependable Self-managing Systems. QoSA 2008: 189-204 - [c42]Muhammad Ali Babar, Rafael Capilla:
Capturing and Using Quality Attributes Knowledge in Software Architecture Evaluation Process. MARK@RE 2008: 53-62 - [c41]Hesham Shokry, Muhammad Ali Babar:
Dynamic Software Product Line Architectures Using Service-Based Computing for Automotive Systems. SPLC (2) 2008: 53-58 - [c40]Klaus Schmid, Muhammad Ali Babar, Paul Grünbacher, Makoto Nonaka:
The Second International Workshop on Management and Economics of Software Product Lines (MESPUL08). SPLC 2008: 386 - [c39]Muhammad Ali Babar, Pekka Abrahamsson:
Architecture-Centric Methods and Agile Approaches. XP 2008: 242-243 - 2007
- [j3]Muhammad Ali Babar, June M. Verner, Phong Thanh Nguyen:
Establishing and maintaining trust in software outsourcing relationships: An empirical investigation. J. Syst. Softw. 80(9): 1438-1449 (2007) - [c38]Muhammad Ali Babar:
Evaluating Product Line Architectures: Methods and Techniques. APSEC 2007: 13 - [c37]Muhammad Ali Babar, Makoto Nonaka:
The First International Workshop on Management and Economics of Software Product Lines (MESPUL07). APSEC 2007: 555-556 - [c36]Muhammad Ali Babar, Barbara A. Kitchenham:
Assessment of a Framework for Comparing Software Architecture Analysis Methods. EASE 2007 - [c35]Mahmood Niazi, Muhammad Ali Babar:
Motivators of Software Process Improvement: An Analysis of Vietnamese Practitioners' Views. EASE 2007 - [c34]Muhammad Ali Babar, Barbara A. Kitchenham:
The Impact of Group Size on Software Architecture Evaluation: A Controlled Experiment. ESEM 2007: 420-429 - [c33]Muhammad Ali Babar, Dietmar Winkler, Stefan Biffl:
Evaluating the Usefulness and Ease of Use of a Groupware Tool for the Software Architecture Evaluation Process. ESEM 2007: 430-439 - [c32]Muhammad Ali Babar, Remco C. de Boer, Torgeir Dingsøyr, Rik Farenhorst:
Architectural Knowlege Management Strategies: Approaches in Research and Industry. SHARK/ADI@ICSE 2007: 2 - [c31]Muhammad Ali Babar, Ian Gorton:
A Tool for Managing Software Architecture Knowledge. SHARK/ADI@ICSE 2007: 11 - [c30]Muhammad Ali Babar, Ian Gorton:
Architecture Knowledge Management: Challenges, Approaches, and Tools. ICSE Companion 2007: 170-171 - [c29]Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mark Staples:
Project Delay Variability Simulation in Software Product Line Development. ICSP 2007: 283-294 - [c28]Mahmood Niazi, Muhammad Ali Babar:
De-motivators of Software Process Improvement: An Analysis of Vietnamese Practitioners' Views. PROFES 2007: 118-131 - [c27]Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mark Staples:
Project Cost Overrun Simulation in Software Product Line Development. PROFES 2007: 330-344 - [c26]Muhammad Ali Babar, Len Bass, Ian Gorton:
Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation. QoSA 2007: 90-107 - [c25]Ian Gorton, Muhammad Ali Babar:
Architecture Knowledge Management: Concepts, Technologies, Challenges. WICSA 2007: 31 - 2006
- [j2]Muhammad Ali Babar, Barbara A. Kitchenham, Liming Zhu, Ian Gorton, D. Ross Jeffery:
An empirical study of groupware support for distributed software architecture evaluation process. J. Syst. Softw. 79(7): 912-925 (2006) - [j1]Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han:
A survey of architecture design rationale. J. Syst. Softw. 79(12): 1792-1804 (2006) - [c24]Muhammad Ali Babar, Barbara A. Kitchenham, Piyush Maheshwari:
The Value of Architecturally Significant Information Extracted from Patterns for Architecture Evaluation: A Controlled Experiment. ASWEC 2006: 379-390 - [c23]Muhammad Ali Babar, Barbara A. Kitchenham, Piyush Maheshwari:
Assessing the Value of Architectural Information Extracted from Patterns for Architecting. EASE 2006 - [c22]Phong Thanh Nguyen, Muhammad Ali Babar, June M. Verner:
Trust in Software Outsourcing Relationships: An Analysis of Vietnamese Practitioners' Views. EASE 2006 - [c21]Phong Thanh Nguyen, Muhammad Ali Babar, June M. Verner:
Critical factors in establishing and maintaining trust in software outsourcing relationships. ICSE 2006: 624-627 - [c20]Muhammad Ali Babar, Barbara A. Kitchenham, Ian Gorton:
Towards a distributed software architecture evaluation process: a preliminary assessment. ICSE 2006: 845-848 - [c19]Barbara A. Kitchenham, Hiyam Al-Kilidar, Muhammad Ali Babar, Mike Berry, Karl Cox, Jacky Keung, Felicia Kurniawati, Mark Staples, He Zhang, Liming Zhu:
Evaluating guidelines for empirical software engineering studies. ISESE 2006: 38-47 - [c18]Muhammad Ali Babar, Barbara A. Kitchenham, D. Ross Jeffery:
Distributed versus face-to-face meetings for architecture evalution: a controlled experiment. ISESE 2006: 252-261 - [c17]Muhammad Ali Babar, Stefan Biffl:
Eliciting better quality architecture evaluation scenarios: a controlled experiment on top-down vs. bottom-up. ISESE 2006: 307-315 - [c16]Muhammad Ali Babar, Antony Tang, Ian Gorton, Jun Han:
Industrial Perspective on the Usefulness of Design Rationale for Software Maintenance: A Survey. QSIC 2006: 201-208 - 2005
- [c15]Tariq Al-Naeem, Ian Gorton, Muhammad Ali Babar, Fethi A. Rabhi, Boualem Benatallah:
A quality-driven systematic approach for architecting distributed software applications. ICSE 2005: 244-253 - [c14]Muhammad Ali Babar, Ian Gorton, D. Ross Jeffery:
Capturing and Using Software Architecture Knowledge for Architecture-Based Software Development. QSIC 2005: 169-176 - [c13]Cat Kutay, Muhammad Ali Babar:
Teaching Three Quality Assurance Techniques in Tandem - Lessons Learned. QSIC 2005: 307-312 - [c12]Muhammad Ali Babar, Mahmood Niazi, D. Ross Jeffery:
Assessing a Framework of Comparing Architecture Review Methods Using CMMI. SEKE 2005: 400-403 - [c11]Muhammad Ali Babar, Xiaowen Wang, Ian Gorton:
Supporting Security Sensitive Architecture Design. QoSA/SOQUA 2005: 140-154 - [c10]Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun Han:
A Survey of the Use and Documentation of Architecture Design Rationale. WICSA 2005: 89-98 - 2004
- [c9]Muhammad Ali Babar, Barbara A. Kitchenham, Liming Zhu, D. Ross Jeffery:
An Exploratory Study of Groupware Support for Distributed Software Architecture Evaluation Process. APSEC 2004: 222-229 - [c8]Muhammad Ali Babar:
Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures. APSEC 2004: 574-578 - [c7]Muhammad Ali Babar, Ian Gorton:
Comparison of Scenario-Based Software Architecture Evaluation Methods. APSEC 2004: 600-607 - [c6]Muhammad Ali Babar, Didar Zowghi:
Developing a Requirements Management Toolset: Lessons Learned. Australian Software Engineering Conference 2004: 10-19 - [c5]Muhammad Ali Babar, Liming Zhu, D. Ross Jeffery:
A Framework for Classifying and Comparing Software Architecture Evaluation Methods. Australian Software Engineering Conference 2004: 309-319 - [c4]Ming Huo, June M. Verner, Liming Zhu, Muhammad Ali Babar:
Software Quality and Agile Method. COMPSAC 2004: 520-525 - [c3]Liming Zhu, Muhammad Ali Babar, D. Ross Jeffery:
Distilling Scenarios from Patterns for Software Architecture Evaluation - A Position Paper. EWSA 2004: 225-229 - [c2]Liming Zhu, Muhammad Ali Babar, D. Ross Jeffery:
Mining Patterns to Support Software Architecture Evaluation. WICSA 2004: 25-36 - 2003
- [c1]Muhammad Ali Babar:
An Experience of Applying Architecture-based Approach to Build a Component-based Requirements Management Toolset. COMPSAC 2003: 550-556
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint