SQL and NoSQL database software architecture performance analysis and assessments—a systematic literature review

W Khan, T Kumar, C Zhang, K Raj, AM Roy… - Big Data and Cognitive …, 2023 - mdpi.com
The competent software architecture plays a crucial role in the difficult task of big data
processing for SQL and NoSQL databases. SQL databases were created to organize data …

Application programming interface (API) research: A review of the past to inform the future

J Ofoeda, R Boateng, J Effah - International Journal of Enterprise …, 2019 - igi-global.com
The purpose of this study is to perform a synthesis of API research. The study took stock of
literature from academic journals on APIs with their associated themes, frameworks …

Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X Jin, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …

The blockchain imitation game

K Qin, S Chaliasos, L Zhou, B Livshits, D Song… - 32nd USENIX Security …, 2023 - usenix.org
The use of blockchains for automated and adversarial trading has become commonplace.
However, due to the transparent nature of blockchains, an adversary is able to observe any …

Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …

MTD, where art thou? A systematic review of moving target defense techniques for IoT

RE Navas, F Cuppens, NB Cuppens… - IEEE internet of …, 2020 - ieeexplore.ieee.org
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

[PDF][PDF] Security threat and vulnerability assessment and measurement in secure software development

M Humayun, N Jhanjhi… - Comput. Mater …, 2022 - pdfs.semanticscholar.org
Security is critical to the success of software, particularly in today's fast-paced, technology-
driven environment. It ensures that data, code, and services maintain their CIA …

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

H Xu, Y Zhou, J Ming, M Lyu - Cybersecurity, 2020 - Springer
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …

Measuring software obfuscation quality–a systematic literature review

SA Ebad, AA Darem, JH Abawajy - IEEE Access, 2021 - ieeexplore.ieee.org
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …