- Software Engineering Research
- Software Engineering Techniques and Practices
- Software System Performance and Reliability
- Software Reliability and Analysis Research
- Software Testing and Debugging Techniques
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Advanced Malware Detection Techniques
- Advanced Software Engineering Methodologies
- Autonomous Vehicle Technology and Safety
- Systems Engineering Methodologies and Applications
- Information and Cyber Security
- Web Applications and Data Management
- Natural Language Processing Techniques
- Safety Systems Engineering in Autonomy
- Information Technology Governance and Strategy
- Text and Document Classification Technologies
- Artificial Intelligence in Healthcare
- Sustainable Supply Chain Management
- Mobile and Web Applications
- Software-Defined Networks and 5G
Universiti Putra Malaysia
2017-2025
Technical University of Munich
2018-2020
Leiden University
2012-2014
The evaluation, importance and variation nature of multiple security privacy properties are the main issues that make benchmarking blockchain-based IoT healthcare Industry 4.0 systems fall under multi-criteria decision-making (MCDM) problem. In this article, one recent MCDM weighting methods called fuzzy weighted with zero inconsistency (FWZIC) is effective for evaluation criteria subjectively without any issues. However, considering advantages spherical sets in providing a wide range...
The migration of monolithic applications to the cloud is a popular trend, with microservice architecture being commonly targeted architectural pattern. motivation behind this often rooted in challenges associated maintaining legacy and need adapt rapidly changing business requirements. To ensure that microservices sound decision for enhancing maintainability, designers must carefully consider underlying factors driving software migration. This study proposes set metrics evaluating...
There is a range of techniques available to reverse engineer software designs from source code. However, these approaches generate highly detailed representations. The condensing engineered representations into more high-level design information would enhance the understandability diagrams. This paper describes an automated approach for diagrams that look as if they are constructed forward designed UML models. To this end, we propose machine learning approach. training set consists class and...
E-health Industry 4.0 systems ranking based on Blockchain is a multi-criteria decision-making (MCDM) problem, considering the multiple evaluation properties, their significance, and data variety. The final closeness between sample ideal solutions also constitutes an optimisation problem. To authors’ knowledge, no study has provided multi-privacy security approach solution for Blockchain. Consequently, this proposes discusses systems, utilising SFS-FWZIC method to address significance of...
A class diagram of a software system enhances our ability to understand design. However, this is often unavailable. Developers usually reconstruct the by reverse engineering it from source code. Unfortunately, resultant very cluttered; making difficult learn anything valuable it. Thus, would be beneficial if we are able condense reverse- engineered contain only important classes depicting overall design system. Such make program understanding much easier. can important, for example, its...
Graphical modelling of various aspects software and systems is a common part development. UML the de-facto standard for types models. To be able to research UML, academia needs have corpus For building such database, an automated system that has ability classify class diagram images would very beneficial, since large portion diagrams (UML CDs) available as on Internet. In this study, we propose 23 image-features investigate use these features purpose classifying CD images. We analyse...
Static Code Analysis Tools are a popular aid to monitor and control the quality of software systems. Still, these tools only provide large number measurements that have be interpreted by developers in order obtain insights about actual software. In cooperation with professional analysts, we manually inspected source code from three different projects evaluated its maintainability. We then trained machine learning algorithms predict human maintainability evaluation program classes based on...
Software requirement specification (SRS) document is the most crucial in software development process. All subsequent steps are influenced by this document. However, issues requirement, such as ambiguity or incomplete may lead to misinterpretation of requirements which consequently, influence testing activities and higher risk time cost overrun project. Finding defects initial phase since defect that found late more expensive than if it was early. This study describes an automated approach...
UML Class diagrams are commonly used to describe the designs of systems. Such can be guide construction software. In practice, we have identified two main types using UML: (i) FwCD refers hand-made as part forward-looking development process; (ii) RECD those that reverse engineered from source code; Recently, empirical studies in Software Engineering started looking at open projects. This enables automated extraction and analysis large sets project-data. For researching effects modeling...
Software quality models describe decompositions of characteristics. However, in practice, there is a gap between models, measurements, and assessment activities. As first step bridging the gap, this paper presents novel structured framework to perform assessments. Together with our industrial partner, we applied two case studies present lessons learned. Among others, found that results from automated tools can be misleading. Manual inspections still need conducted find hidden issues,...
Many recent studies have shown that various multi-objective evolutionary algorithms been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. Most them either focused on solving newly re-formulated problems or proposing new approaches, while a number performed reviews and comparative performance proposed algorithms. To evaluate such performance, it is necessary to consider metrics play important roles during evaluation comparison investigated based...
Modern system architecture may increase the maintainability of and promote sustainability system. Nowadays, more organizations are looking towards microservice due to its positive impact on business which can be translated into delivering quality products market faster than ever before. On top that, native support DevOps is also desirable. However, transforming legacy modern challenging. As manual modernization inefficient time-intensive significant amount effort required, software architect...
Class diagrams play an important role in software development. However, some cases, these contain a lot of information. This makes it hard for maintainers to use them understand system. In this paper, we aim discover how simplify class such way that they make systems easier understand. To end, performed survey analyze what type information developers find include or exclude order diagram. involved 32 with 75% the participants having more than 5 years experience diagrams. As result, found...
A large fraction of the time consumed in software development and maintenance is spent on understanding software, which indicates it a critical activity. Software documentation, including architecture design an important aid comprehension. However, keeping documentation up to date with evolving source code often challenging absence or more comprehensive design-level not uncommon. As solution, may be recovered using reverse engineering techniques. existing methods produce complete diagrams...
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped. This work mainly aims solve IT-related challenge of insufficient knowledge bases tools for security practitioners monitor mitigate Injection with AI/ML techniques. The study uses a mixed-methods approach evaluate how well different ML algorithms identify by combining algorithmic evaluation...
Intelligent systems based on artificial intelligence techniques are increasing and recently being accepted in the automotive domain. In competition of automobile makers to provide fully automated vehicles, it is perceived that will profoundly influence electric electronic architecture future. However, while such highly advanced functions, safety risk increases as AI-based may produce uncertain output behaviour. this paper, we devise a run-time monitoring framework for focusing autonomous...
In this paper, we report on a machine learning approach to condensing class diagrams. The goal of the algorithm is learn identify what classes are most relevant include in diagram, as opposed full reverse engineering all classes. This paper focuses building classifier that based names addition design metrics, and compare earlier work metrics only. We assess our condensation method by comparing condensed diagrams were made during original forward design. Our results show combining text with...