Decomposition of monolith applications into microservices architectures: A systematic review

Y Abgaz, A McCarren, P Elger, D Solan… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Microservices architecture has gained significant traction, in part owing to its potential to
deliver scalable, robust, agile, and failure-resilient software products. Consequently, many …

Automated grading and feedback tools for programming education: A systematic review

M Messer, NCC Brown, M Kölling, M Shi - ACM Transactions on …, 2024 - dl.acm.org
We conducted a systematic literature review on automated grading and feedback tools for
programming education. We analysed 121 research papers from 2017 to 2021 inclusive and …

Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning

P Bhat, S Behal, K Dutta - Computers & Security, 2023 - Elsevier
The enormous popularity of Android in the smartphone market has gained the attention of
malicious actors as well. Also, considering its open system architecture, malicious attacks …

A systematic survey of program comprehension through dynamic analysis

B Cornelissen, A Zaidman… - IEEE Transactions …, 2009 - ieeexplore.ieee.org
Program comprehension is an important activity in software maintenance, as software must
be sufficiently understood before it can be properly modified. The study of a program's …

Tracking down software bugs using automatic anomaly detection

S Hangal, MS Lam - Proceedings of the 24th international conference …, 2002 - dl.acm.org
This paper introduces DIDUCE, a practical and effective tool that aids programmers in
detecting complex program errors and identifying their root causes. By instrumenting a …

Locating features in source code

T Eisenbarth, R Koschke… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Understanding the implementation of a certain feature of a system requires identification of
the computational units of the system that contribute to this feature. In many cases, the …

Testing: a roadmap

MJ Harrold - Proceedings of the Conference on the Future of …, 2000 - dl.acm.org
Testing is an important process that is performed to support quality assurance. Testing
activities support quality assurance by gathering information about the nature of the software …

Dynamic neural program embedding for program repair

K Wang, R Singh, Z Su - arxiv preprint arxiv:1711.07163, 2017 - arxiv.org
Neural program embeddings have shown much promise recently for a variety of program
analysis tasks, including program synthesis, program repair, fault localization, etc. However …

Smartphone security and privacy: a survey on APTs, sensor-based attacks, side-channel attacks, google play attacks, and defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …