SQL and NoSQL database software architecture performance analysis and assessments—a systematic literature review
The competent software architecture plays a crucial role in the difficult task of big data
processing for SQL and NoSQL databases. SQL databases were created to organize data …
processing for SQL and NoSQL databases. SQL databases were created to organize data …
Application programming interface (API) research: A review of the past to inform the future
The purpose of this study is to perform a synthesis of API research. The study took stock of
literature from academic journals on APIs with their associated themes, frameworks …
literature from academic journals on APIs with their associated themes, frameworks …
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …
it requires summarizing the execution behavior and semantics of the function in human …
The blockchain imitation game
The use of blockchains for automated and adversarial trading has become commonplace.
However, due to the transparent nature of blockchains, an adversary is able to observe any …
However, due to the transparent nature of blockchains, an adversary is able to observe any …
Systematic literature review on security risks and its practices in secure software development
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …
process of creating and developing software that assures the integrity, confidentiality, and …
MTD, where art thou? A systematic review of moving target defense techniques for IoT
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …
their security lags behind the state of the art of non-IoT systems. Moving target defense …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
[PDF][PDF] Security threat and vulnerability assessment and measurement in secure software development
Security is critical to the success of software, particularly in today's fast-paced, technology-
driven environment. It ensures that data, code, and services maintain their CIA …
driven environment. It ensures that data, code, and services maintain their CIA …
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …
the communities is what security strength the technique can achieve. Nowadays, this …
Measuring software obfuscation quality–a systematic literature review
Software obfuscation techniques are increasingly being used to prevent attackers from
exploiting security flaws and launching successful attacks. With research on software …
exploiting security flaws and launching successful attacks. With research on software …