


Остановите войну!
for scientists:


default search action
Muhammad Ali Babar
Ali Babar 0001
Person information

- affiliation: University of Adelaide, Australia
- affiliation (former): IT University of Copenhagen, Denmark
Other persons with the same name
- Ali Babar — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j87]Triet Huynh Minh Le
, Huaming Chen
, Muhammad Ali Babar
:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. ACM Comput. Surv. 55(5): 100:1-100:39 (2023) - [j86]Hussain Ahmad
, Isuru Dharmadasa
, Faheem Ullah
, Muhammad Ali Babar
:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ACM Comput. Surv. 55(9): 192:1-192:38 (2023) - [j85]Leonardo Horn Iwaya
, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the privacy of mental health apps. Empir. Softw. Eng. 28(1): 2 (2023) - [j84]Haifeng Shen
, Othman Asiry, Muhammad Ali Babar, Tomasz Bednarz
:
Evaluating the efficacy of using a novel gaze-based attentive user interface to extend ADHD children's attention span. Int. J. Hum. Comput. Stud. 169: 102927 (2023) - [j83]Bakheet Aljedaani
, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-users' knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers. J. Syst. Softw. 195: 111519 (2023) - [j82]Xin Zhou
, Shanshan Li, Lingli Cao
, He Zhang, Zijia Jia, Chenxing Zhong, Zhihao Shan, Muhammad Ali Babar:
Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry. J. Syst. Softw. 195: 111521 (2023) - [j81]Roland Croft
, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. IEEE Trans. Software Eng. 49(3): 1044-1063 (2023) - [i76]Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. CoRR abs/2301.05456 (2023) - [i75]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. CoRR abs/2301.08428 (2023) - 2022
- [j80]Liuyue Jiang
, Asangi Jayatilaka
, Mehwish Nasim
, Marthie Grobler
, Mansooreh Zahedi
, Muhammad Ali Babar
:
Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 10: 57525-57554 (2022) - [j79]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. ACM Comput. Surv. 54(3): 50:1-50:47 (2022) - [j78]Roland Croft
, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An empirical study of developers' discussions about security challenges of different programming languages. Empir. Softw. Eng. 27(1): 27 (2022) - [j77]Faheem Ullah, Muhammad Ali Babar, Aldeida Aleti:
Design and evaluation of adaptive system for big data cyber security analytics. Expert Syst. Appl. 207: 117948 (2022) - [j76]Roshan Namal Rajapakse
, Mansooreh Zahedi, Muhammad Ali Babar, Haifeng Shen
:
Challenges and solutions when adopting DevSecOps: A systematic review. Inf. Softw. Technol. 141: 106700 (2022) - [j75]Fangchao Tian, Peng Liang
, Muhammad Ali Babar:
Relationships between software architecture and source code in practice: An exploratory survey and interview. Inf. Softw. Technol. 141: 106705 (2022) - [j74]Nesara Dissanayake
, Asangi Jayatilaka
, Mansooreh Zahedi, Muhammad Ali Babar
:
Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 144: 106771 (2022) - [j73]Faheem Ullah
, Muhammad Ali Babar:
On the scalability of Big Data Cyber Security Analytics systems. J. Netw. Comput. Appl. 198: 103294 (2022) - [j72]Chadni Islam
, Muhammad Ali Babar, Roland Croft, Helge Janicke
:
SmartValidator: A framework for automatic identification and classification of cyber threat data. J. Netw. Comput. Appl. 202: 103370 (2022) - [j71]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A framework for automating deployment and evaluation of blockchain networks. J. Netw. Comput. Appl. 206: 103460 (2022) - [j70]Nesara Dissanayake
, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-29 (2022) - [j69]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. Proc. ACM Hum. Comput. Interact. 6(EICS): 172:1-172:28 (2022) - [c187]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman
:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. ECSA 2022: 49-65 - [c186]Nesara Dissanayake
, Asangi Jayatilaka
, Mansooreh Zahedi
, Muhammad Ali Babar
:
An Empirical Study of Automation in Software Security Patch Management. ASE 2022: 7:1-7:13 - [c185]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. MSR 2022: 435-447 - [c184]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. MSR 2022: 596-607 - [c183]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. MSR 2022: 621-633 - [c182]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks. QRS 2022: 299-310 - [c181]Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. SANER 2022: 338-348 - [c180]Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. SANER 2022: 420-431 - [c179]Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. SANER 2022: 1066-1077 - [i74]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds. CoRR abs/2201.01948 (2022) - [i73]Faheem Ullah, Imaduddin Mohammed, Muhammad Ali Babar:
A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment. CoRR abs/2201.01972 (2022) - [i72]Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. CoRR abs/2201.04736 (2022) - [i71]Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. CoRR abs/2201.07959 (2022) - [i70]Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar:
NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions. CoRR abs/2201.08066 (2022) - [i69]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development. CoRR abs/2201.09006 (2022) - [i68]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. CoRR abs/2202.09016 (2022) - [i67]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. CoRR abs/2203.04468 (2022) - [i66]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. CoRR abs/2203.05181 (2022) - [i65]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data. CoRR abs/2203.07603 (2022) - [i64]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. CoRR abs/2203.08417 (2022) - [i63]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A Framework for Automating Deployment and Evaluation of Blockchain Network. CoRR abs/2203.10647 (2022) - [i62]Chadni Islam, Victor Prokhorenko, Muhammad Ali Babar:
Runtime Software Patching: Taxonomy, Survey and Future Directions. CoRR abs/2203.12132 (2022) - [i61]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. CoRR abs/2205.07204 (2022) - [i60]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman
:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. CoRR abs/2206.10110 (2022) - [i59]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. CoRR abs/2209.01518 (2022) - [i58]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogGD: Detecting Anomalies from System Logs by Graph Neural Networks. CoRR abs/2209.07869 (2022) - [i57]Yaser Mansouri, Faheem Ullah, Shagun Dhingra, Muhammad Ali Babar:
Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases. CoRR abs/2209.09487 (2022) - [i56]Xiaoyu Xia, Sheik Mohammad Mostakim Fattah, Muhammad Ali Babar:
A Survey on UAV-enabled Edge Computing: Resource Management Perspective. CoRR abs/2210.06679 (2022) - [i55]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support. CoRR abs/2211.06953 (2022) - [i54]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach. CoRR abs/2211.07585 (2022) - [i53]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices. CoRR abs/2211.08916 (2022) - 2021
- [j68]Mingyu Guo, Guanhua Wang, Hideaki Hata
, Muhammad Ali Babar:
Revenue maximizing markets for zero-day exploits. Auton. Agents Multi Agent Syst. 35(2): 36 (2021) - [j67]Triet Huynh Minh Le
, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges. ACM Comput. Surv. 53(3): 62:1-62:38 (2021) - [j66]Shanshan Li, He Zhang, Zijia Jia, Chenxing Zhong, Cheng Zhang, Zhihao Shan, Jinfeng Shen, Muhammad Ali Babar:
Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Inf. Softw. Technol. 131: 106449 (2021) - [j65]Nguyen Khoi Tran, Muhammad Ali Babar
, Jonathan Boan:
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs. J. Netw. Comput. Appl. 173: 102844 (2021) - [j64]Yaser Mansouri
, Muhammad Ali Babar:
A review of edge computing: Features and resource virtualization. J. Parallel Distributed Comput. 150: 155-183 (2021) - [j63]Fangchao Tian, Tianlu Wang, Peng Liang
, Chong Wang
, Arif Ali Khan, Muhammad Ali Babar:
The impact of traceability on software maintenance and evolution: A mapping study. J. Softw. Evol. Process. 33(10) (2021) - [c178]Guanhua Wang, Runqi Guo, Yuko Sakurai, Muhammad Ali Babar, Mingyu Guo:
Mechanism Design for Public Projects via Neural Networks. AAMAS 2021: 1380-1388 - [c177]Triet Huynh Minh Le
, Roland Croft, David Hin, Muhammad Ali Babar:
A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites. EASE 2021: 109-118 - [c176]Nguyen Khoi Tran
, Muhammad Ali Babar
:
Taxonomy of Edge Blockchain Network Designs. ECSA 2021: 172-180 - [c175]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps. ESEM 2021: 6:1-6:12 - [c174]Roland Croft, Dominic Newlands, Ziyu Chen, Muhammad Ali Babar:
An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing. ESEM 2021: 8:1-8:12 - [c173]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. ICIS 2021 - [c172]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Steven Grainger:
Designing a Security Platform for Collaborating Autonomous Systems - An Experience Report. ICSA Companion 2021: 22-28 - [c171]Yongzheng Xie, Hongyu Zhang, Bo Zhang
, Muhammad Ali Babar, Sha Lu:
LogDP: Combining Dependency and Proximity for Log-Based Anomaly Detection. ICSOC 2021: 708-716 - [c170]Triet Huynh Minh Le
, David Hin, Roland Croft, Muhammad Ali Babar:
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning. ASE 2021: 717-729 - [c169]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le
, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. PRDC 2021: 47-56 - [c168]Nesara Dissanayake
, Mansooreh Zahedi
, Asangi Jayatilaka
, Muhammad Ali Babar
:
A grounded theory of the role of coordination in software security patch management. ESEC/SIGSOFT FSE 2021: 793-805 - [i52]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-Users' Knowledge and Perception about Security of Mobile Health Apps: An Empirical Study. CoRR abs/2101.10412 (2021) - [i51]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar, Haifeng Shen:
Challenges and solutions when adopting DevSecOps: A systematic review. CoRR abs/2103.08266 (2021) - [i50]Bushra Sabir, Muhammad Ali Babar, Raj Gaire:
ReinforceBug: A Framework to Generate Adversarial Textual Examples. CoRR abs/2103.08306 (2021) - [i49]Triet Huynh Minh Le, Bushra Sabir, Muhammad Ali Babar:
Automated Software Vulnerability Assessment with Concept Drift. CoRR abs/2103.11316 (2021) - [i48]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/2104.11906 (2021) - [i47]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A Grounded Theory of the Role of Coordination in Software Security Patch Management. CoRR abs/2106.03458 (2021) - [i46]Roland Croft, Dominic Newlands, Ziyu Chen, Muhammad Ali Babar:
An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing. CoRR abs/2107.01921 (2021) - [i45]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps. CoRR abs/2107.02096 (2021) - [i44]Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. CoRR abs/2107.08364 (2021) - [i43]Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages. CoRR abs/2107.13723 (2021) - [i42]Fangchao Tian, Peng Liang, Muhammad Ali Babar:
Relationships between Software Architecture and Source Code in Practice: An Exploratory Survey and Interview. CoRR abs/2108.01018 (2021) - [i41]Fangchao Tian, Tianlu Wang, Peng Liang, Chong Wang, Arif Ali Khan, Muhammad Ali Babar:
The Impact of Traceability on Software Maintenance and Evolution: A Mapping Study. CoRR abs/2108.02133 (2021) - [i40]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. CoRR abs/2108.04766 (2021) - [i39]Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar:
A Qualitative Study of Architectural Design Issues in DevOps. CoRR abs/2108.06705 (2021) - [i38]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning. CoRR abs/2108.08041 (2021) - [i37]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu
, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. CoRR abs/2109.04029 (2021) - [i36]Roland Croft, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. CoRR abs/2109.05740 (2021) - [i35]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption. CoRR abs/2109.07260 (2021) - [i34]Yongzheng Xie, Hongyu Zhang, Bo Zhang, Muhammad Ali Babar, Sha Lu:
LogDP: Combining Dependency and Proximity for Log-based Anomaly Detection. CoRR abs/2110.01927 (2021) - [i33]Faheem Ullah, Muhammad Ali Babar:
On the Scalability of Big Data Cyber Security Analytics Systems. CoRR abs/2112.00853 (2021) - [i32]Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, Muhammad Ali Babar, Laura Hartley, Winston Lewinsmith:
Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline. CoRR abs/2112.06356 (2021) - [i31]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. CoRR abs/2112.10354 (2021) - [i30]Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. CoRR abs/2112.10356 (2021) - [i29]Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. CoRR abs/2112.12595 (2021) - [i28]Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. CoRR abs/2112.12597 (2021) - 2020
- [j62]Victor Prokhorenko
, Muhammad Ali Babar:
Architectural Resilience in Cloud, Fog and Edge Systems: A Survey. IEEE Access 8: 28078-28095 (2020) - [j61]Leonardo Horn Iwaya
, Aakash Ahmad
, Muhammad Ali Babar:
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study. IEEE Access 8: 150081-150112 (2020) - [j60]Ahmad Mohsin
, Naeem Khalid Janjua
, Syed M. S. Islam
, Muhammad Ali Babar:
SAM-SoS: A Stochastic Software Architecture Modeling and Verification Approach for Complex System-of-Systems. IEEE Access 8: 177580-177603 (2020) - [j59]Yaser Mansouri, Victor Prokhorenko, Muhammad Ali Babar:
An automated implementation of hybrid cloud for performance evaluation of distributed databases. J. Netw. Comput. Appl. 167: 102740 (2020) - [j58]Jamal El Hachem, Vanea Chiprianov, Muhammad Ali Babar, Tarek Al Khalil, Philippe Aniorté
:
Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems. J. Syst. Softw. 162 (2020) - [j57]Mojtaba Shahin, Muhammad Ali Babar, Muhammad Aufeef Chauhan:
Architectural Design Space for Modelling and Simulation as a Service: A Review. J. Syst. Softw. 170: 110752 (2020) - [c167]Bakheet Aljedaani, Aakash Ahmad
, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective. APSEC 2020: 208-217 - [c166]Mansooreh Zahedi, Roshan Namal Rajapakse, Muhammad Ali Babar:
Mining Questions Asked about Continuous Software Engineering: A Case Study of Stack Overflow. EASE 2020: 41-50 - [c165]Chadni Islam, Muhammad Ali Babar, Surya Nepal
:
Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform. ECSA 2020: 165-181 - [c164]Mubin Ul Haque, Leonardo Horn Iwaya, Muhammad Ali Babar:
Challenges in Docker Development: A Large-scale Study Using Stack Overflow. ESEM 2020: 7:1-7:11 - [c163]Nguyen Khoi Tran, Muhammad Ali Babar:
Anatomy, Concept, and Design Space of Blockchain Networks. ICSA 2020: 125-134 - [c162]He Zhang, Xin Zhou, Xin Huang, Huang Huang
, Muhammad Ali Babar:
An evidence-based inquiry into the use of grey literature in software engineering. ICSE 2020: 1422-1434 - [c161]Mojtaba Shahin, Muhammad Ali Babar:
On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study. ICSSP 2020: 175-184 - [c160]Bakheet Aljedaani, Aakash Ahmad
, Mansooreh Zahedi, Muhammad Ali Babar:
Security Awareness of End-Users of Mobile Health Applications: An Empirical Study. MobiQuitous 2020: 125-136 - [c159]Triet Huynh Minh Le
, David Hin, Roland Croft, Muhammad Ali Babar:
PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning. MSR 2020: 350-361 - [c158]Qianwen Xu, Xiudi Chen, Shanshan Li, He Zhang, Muhammad Ali Babar, Nguyen Khoi Tran:
Blockchain-based Solutions for IoT: A Tertiary Study. QRS Companion 2020: 124-131 - [c157]Fangchao Tian, Fan Lu, Peng Liang
, Muhammad Ali Babar:
Automatic Identification of Architecture Smell Discussions from Stack Overflow. SEKE 2020: 451-456 - [i27]Triet Huynh Minh Le, Hao Chen, Muhammad Ali Babar:
Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges. CoRR abs/2002.05442 (2020) - [i26]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
A Multi-Vocal Review of Security Orchestration. CoRR abs/2002.09190 (2020) - [i25]Triet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar:
PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning. CoRR abs/2003.03741 (2020) - [i24]Mojtaba Shahin, Muhammad Ali Babar:
On the Role of Software Architecture in DevOps Transformation: An Industrial Case Study. CoRR abs/2003.06108 (2020) - [i23]Mojtaba Shahin, Muhammad Ali Babar, Muhammad Aufeef Chauhan:
Architectural Design Space for Modelling and Simulation as a Service: A Review. CoRR abs/2005.07883 (2020) - [i22]Bushra Sabir, Muhammad Ali Babar, Raj Gaire:
An Evasion Attack against ML-based Phishing URL Detectors. CoRR abs/2005.08454 (2020) - [i21]