Products

Solutions

Education & Training

Services & Support

Partners

Company

{{search ? 'Close':'Search'}}

Publications

Teams working together and getting results

Our published papers are a result of our collaboration with the academic community. This close collaboration allows us to learn from the experts in academia, to share and create ideas together, and to position ourselves as thought leaders in the area.

2018

Mining Accurate Message Formats for Service APIs
Authors: Md Araft Hossain, Steven C. Versteeg, Jun Han, Muhammad Ashad Kabir, Jiaojiao Jiang, Jean-Guy Schneider
Publisher: In Proceedings of IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER '18), (pp. 266-276). IEEE

Privacy Preserving Distributed Deep Learning and its Application in Credit Card Fraud Detection
Authors: Yang Wang, Stephen Adams, Peter Beling, Steven L. Greenspan, Serguei Mankovskii, Sridhar Rajagopalan, Maria C. Velez-Rojas, Steven Boker, Daniel Brown
Publisher: In Proceedings of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (to appear)

Protocol and Tools for Conducting Agile Software Engineering Research in an Industrial-Academic Setting: A Preliminary Study
Authors: Katarzyna Biesialska, Xavier Franch, Victor Muntés-Mulero
Publisher: In Proceedings of IEEE/ACM 6th International Workshop on Conducting Empirical Studies in Industry (CESI '18), (pp. 29-32). ACM

Model-Based Trust Assessment for Internet of Things Networks
Authors: Stephen Adams, Peter Beling, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
Publisher: In Proceedings of the 2nd IEEE International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2018) (to appear)

GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing
Authors: Thilini Bhagya, Jens Dietrich, Hans Guesgen, Steven C. Versteeg
Publisher: In Proceedings of IEEE International Conference on Web Services (ICWS 2018) (to appear)

Technical Debt tracking: Current state of practice - A survey and multiple case study in 15 large organizations
Authors: Antonio Martini, Terese Besker, Jan Bosch
Publisher: Science of Computer Programming, Elsevier, 163 (Oct. 2018), (pp. 42-61)

Identifying and Prioritizing Architectural Debt through Architectural Smells: A Case Study in a Large Software Company
Authors: Antonio Martini, Francesca Arcelli Fontana, Andrea Biaggi, Riccardo Roveda
Publisher: In Proceedings of the 12th European Conference on Software Architecture (ECSA18) (to appear)

Technical Debt Cripples Software Developer Productivity - A longitudinal study on developers’ daily software development work
Authors: Terese Besker, Antonio Martini, Jan Bosch
Publisher: In Proceedings of ACM/IEEE International Conference on Technical Debt (TechDebt '18), (pp. 105-114). ACM

Early Termination of Failed HPC Jobs Through Machine and Deep Learning
Authors: Michał Zasadziński, Victor Muntés-Mulero, Marc Solé, David Carrera, Thomas Ludwig
Publisher: In Proceedings of the 24th International European Conference On Parallel And Distributed Computing (Euro-Par 2018) (to appear)

Next Stop “NoOps": Enabling Cross-System Diagnostics Through Graph-based Composition of Logs and Metrics
Authors: Michał Zasadziński, Marc Solé, Alvaro Brandon, Victor Muntés-Mulero, David Carrera
Publisher: In Proceedings of the 20th IEEE International Conference on Cluster Computing (IEEE Cluster 2018) (to appear)

ENACT: Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems
Authors: Nicolas Ferry, Arnor Solberg, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Thierry Winter, Victor Muntés-Mulero, Andreas Metzger, Erkuden Rios Velasco, Amaia Castelruiz Aguirre
Publisher: In Proceedings of the 1st International Workshop on Software Engineering Aspects of Continuous Development and new Paradigms of Software Production and Deployment (DEVOPS 2018) (to appear)

Embracing Technical Debt, from a Startup Company Perspective
Authors: Terese Besker, Antonio Martini, Kelly Blincoe, Rumesh Edirisooriya Lokuge, Jan Bosch
Publisher: In Proceedings of the 34th IEEE International Conference on Software Maintenance and Evolution (ICSME 2018) (to appear)

Improving business alignment of co-located research projects
Authors: Dorica Munell, David Sanchez-Charles, Pablo Romero, Juan Perez
Publisher: UIIN Conference

2017

Using machine learning to optimize parallelism in big data applications
Authors: Álvaro Brandón Hernández, María S. Perez, Smrati Gupta, Victor Muntés-Mulero
Publisher: Future Generation Computer Systems, Elsevier, 86 (Sep. 2018), (pp. 1076-1092)

Reducing Event Variability in Logs by Clustering of Word Embeddings
Authors: David Sánchez-Charles, Josep Carmona, Victor Muntés-Mulero, Marc Solé 
Publisher: In Proceedings of BPM 2017: Business Process Management Workshops, (pp. 191-203). Springer

Provenance and Privacy
Authors: Vicenç Torra, Guillermo Navarro-Arribas, David Sánchez-CharlesVictor Muntés-Mulero
Publisher: In Proceedings of the International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2017). Springer

From Incident to Insight: Incident Responders and Software Innovation
Authors: Robert Biddle, Judith Brown, Steven L. Greenspan
Publisher: IEEE Software

Survey on Models and Techniques for Root-Cause Analysis
Authors: Marc Solé, Victor Muntés-Mulero, Annie Ibrahim Rana, Giovani Estrada
Publisher: arXiv

Model-Driven Development and Operation of Multi-Cloud Applications: The MODAClouds Approach
Authors: Smrati Gupta, Peter B. Matthews, Victor Muntés-Mulero, Jacek Dominiak
Publisher: Model-Driven Development and Operation of Multi-Cloud Applications (1st ed). Springer

Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges
Authors: Zeinab Farahmandpour, Steven C. Versteeg, Jun Han, Anand Kameswaran
Publisher: In Proceedings of ACM/IEEE 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE 2017), (pp. 32-35). IEEE

Security-centric evaluation framework for IT services
Authors: Smrati Gupta, Jaume Ferrarons-Llagostera, Jacek Dominiak, Victor Muntés-Mulero, Peter B. Matthews, Erkuden Rios
Publisher: In Proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing (GPC 2017), (pp. 736-747). Springer

Actor Based Root Cause Analysis in a Distributed Environment
Authors: Michał Zasadziński, Victor Muntés-Mulero, Marc Solé
Publisher: In Proceedings of IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2017), (pp. 14-17). IEEE

A Deep-Reinforcement Learning Approach for Software-Defined Networking Routing Optimization
Authors: Giorgio Stampa, Marta Arias, David Sánchez-Charles, Victor Muntés-Mulero, Albert Cabellos
Publisher: arXiv preprint    

Knowledge-Defined Networking
Authors: Albert Mestres, Alberto Rodriguez-Natal, Josep Carner, Pere Barlet-Ros, Eduard Alarcón, Marc Solé, Victor Muntés-Mulero, David Meyer, Sharon Barkai, Mike J Hibbett, Giovani Estrada, Khaldun Ma‘ruf, Florin Coras, Vina Ermagan, Albert Cabellos et al 
Publisher: SIGCOMM Comput. Commun. Rev. 47, 3 (Sep. 2017), (pp. 2-10)

2016

Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study
Authors: Li Sun, Steven C. Versteeg, Serdar Boztas, Asha Rao
Publisher: arXiv

A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems
Authors: Jian Yu, Jun Han, Jean-Guy Schneider, Cameron Hine, Steven C. Versteeg
Publisher: The Computer Journal, 60, 1 (Jan. 2017), (pp. 27–44)

Enterprise Software Service Emulation: Constructing Large-Scale Testbeds
Authors: Cameron Hine, Jean-Guy Schneider, Jun Han, Steven C. Versteeg
Publisher: In Proceedings of the International Workshop on Continuous Software Evolution and Delivery (CSED '16), (pp. 56-62). ACM

Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis
Authors: Steven C. Versteeg, Miao Du, John Bird, Jean-Guy Schneider, John Grundy, Jun Han
Publisher: In Proceedings of the International Workshop on Continuous Software Evolution and Delivery (CSED '16), (pp. 49-55). ACM

Opaque service virtualisation: a practical tool for emulating endpoint systems
Authors: Steven C. Versteeg, Miao Du, Jean-Guy Schneider, John Grundy, Jun Han, Menka Goyal
Publisher: In Proceedings of the 38th International Conference on Software Engineering (ICSE'16), (pp. 202-211). ACM

Incident response teams in IT operations centers: the T-TOCs model of team functionality
Authors:  Judith M. Brown, Steven L. Greenspan, Robert Biddle
Publisher: Cognition, Technology & Work, 18, 4 (Nov. 2016), (pp. 695–716)

Clustering Software Developer Repository Accesses with the Cophenetic Distance
Authors: David Sánchez-Charles, Josep Carmona, Victor Muntés-Mulero, Marc Solé 
Publisher: In Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016)

Improving Process Model Precision by Loop Unrolling
Authors: David Sánchez-Charles, Marc Solé, Josep Carmona, Victor Muntés-Mulero
Publisher: In Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016)

Anomaly Detection Guidelines for Data Streams in Big Data
Authors: Annie Ibrahim Rana, Giovani Estrada, Marc SoléVictor Muntés-Mulero
Publisher: In Proceedings of the 3rd International Conference on Soft Computing & Machine Intelligence (ISCMI 2016), (pp. 94 – 98). IEEE

Fast Root Cause Analysis on Distributed Systems by Composing Precompiled Bayesian Networks
Authors: Michał Zasadziński, Victor Muntés-Mulero, Marc Solé, David Carrera
Publisher: In Proceedings of the International Conference on Machine Learning and Data Analysis (ICMLDA 2016)

Process Model Comparison Based on Cophenetic Distance
Authors: David Sánchez-Charles, Victor Muntés-Mulero, Josep Carmona, Marc Solé
Publisher: In Proceedings of BPM 2016: Business Process Management Forum, (pp. 141-158). Springer

Scoring Cloud Services through Digital Ecosystem Community Analysis
Authors: Jaume Ferrarons, Smrati Gupta, Victor Muntés-Mulero, Josep-Lluis Larriba-Pey, Peter B. Matthews
Publisher: In Proceedings of the International Conference on Electronic Commerce and Web Technologies (EC-Web 2016), (pp. 142-153). Springer

Game theoretical analysis of rate adaptation protocols conciliating QoS and QoE
Authors: Smrati Gupta, E. Veronica Belmega, M. Ángeles Vazquez-Castro
Publisher: EURASIP Journal on Wireless Communications and Networking, Springer, 75 (Mar. 2016)

2015

From Network Traces to System Responses: Opaquely Emulating Software Services
Authors: Miao Du, Steven C. Versteeg, Jean-Guy Schneider, John Grundy, Jun Han
Publisher: arXiv

Generalized Suffix Tree Based Multiple Sequence Alignment for Service Virtualization
Authors: Jean-Guy Schneider, Peter Mandile, Steven C. Versteeg
Publisher: In Proceedings of the 24th Australasian Software Engineering Conference (ASWEC 2015), (pp. 48-57). IEEE

Risk-Driven Framework for Decision Support in Cloud Service Selection
Authors: Smrati Gupta, Victor Muntés-Mulero, Peter B. Matthews, Jacek Dominiak, Aida Omerovic, Jordi Aranda, Stepan Seycek
Publisher: In Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2015), (pp. 545-554). IEEE

CrowdWON: A Modelling Language for Crowd Processes Based on Workflow Nets
Authors: David Sánchez-Charles, Victor Muntés-Mulero, Marc Solé, Jordi Nin
Publisher: In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI'15), (pp. 1284-1290). ACM

Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions
Authors: Rajkumar Buyya, Kotagiri Ramamohanarao, Chris Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steve Versteeg
Publisher: Parallel and Distributed Systems (ICPADS), 2015 IEEE 21st International Conference on

Mining software logs for goal-driven root cause analysis, Chapter 18 – Mining Software Logs for Goal-Driven Root Cause Analysis
Authors: Hamzeh Zawawy, Serge Mankovski, Kostas Kontogiannis, John Mylopoulos
Publisher: Elsevier

On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks
Authors: Amin M. Khan, Felix Freitag, Smrati Gupta, Victor Muntés-Mulero, Jacek Dominiak, Peter Matthews.
Publisher: AINA 2015: 634-641

Representing flexible role-based access control policies using objects and defeasible reasoning
Authors: Reza Basseda, Tiantian Gao, Michael Kifer, Steven Greenspan, Charley Chell
Publisher: Springer, Cham.

Earlier Publications

2014

Data is the new currency
Authors: Carrie Gates, Peter Matthews
Publisher: In Proceedings of the 2014 New Security Paradigms Workshop. ACM.

Detecting Discontinuities in Large Scale Systems
Authors: Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: IEEE

Efficient Graph Based Approach to Large Scale Role Engineering.
Authors: Dana Zhang, Kotagiri Ramamohanarao, Rui Zhang, Steve Versteeg
Publisher: Trans. Data Privacy 7 (1), 1-26

Formulating Cost-Effective Monitoring Strategies for Service-Based Systems
Authors: Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider, Steve Versteeg
Publisher: IEEE Transactions on Software Engineering 40 (5), 461-482

Graph anonymization via metric embed-dings: Using classical anonymization for graphs
Authors: Arnau Padrol, Victor Muntés-Mulero
Publisher: Intell. Data Anal. 18(3): 365-388

SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments
Authors: Linlin Wu, Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: IEEE Transactions on Services Computing 7 (3), 465-485

Using genetic algorithms for attribute grouping in multivariate microaggregation
Authors: Jordi Balasch-Masoliver, Victor Muntés-Mulero, Jordi Nin
Publisher: Intelligent Data Analysis, vol. 18, no. 5, pp. 819-836, 2014. IOS Press

Worker ranking determination in crowdsourcing platforms using aggregation functions
Authors: David Sanchez-Charles, Jordi Nin, Marc Solé, Victor Muntés-Mulero
Publisher: FUZZ-IEEE 2014: 1801-1808.

2013

A Business Protocol Unit Testing Framework for Web Service Composition
Authors: Jian Yu, Jun Han, Steven O. Gunarso, Steve Versteeg
Publisher: International Conference on Advanced Information Systems Engineering, 17-34

A framework for ranking of cloud computing services
Authors: Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: Future Generation Computer Systems 29 (4), 1012-1023

A Logical Foundation For Troubleshooting Agents
Authors: Basseda, Reza, Paul Fodor, Steven Greenspan
Publisher: In Proceedings of KICSS'2013, pp. 46-56

Automated SLA Negotiation Framework for Cloud Computing
Authors: Linlin Wu, Saurabh Kumar Garg, Rajkumar Buyya, Chao Chen, Steve Versteeg
Publisher: Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International ...

CAPRI: a tool for mining complex line patterns in large log data
Authors: Farhana Zulkernine, Patrick Martin, Wendy Powley, Sima Soltani, Serge Mankovski, Mark Addleman
Publisher: In Proceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous
Source Mining: Algorithms, Systems, Programming Models and Applications (BigMine '13).

Classification of malware based on integrated static and dynamic features
Authors: Rafiqul Islam, Ronghua Tian, Lynn M. Batten, Steve Versteeg
Publisher: Journal of Network and Computer Applications 36 (2), 646-656

Complex activities in an operations center: a case study and model for engineering interaction
Authors: Judith M. Brown, Steven Greenspan, Robert L. Biddle.
Publisher: In Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems (EICS '13).

Data Management and Risk Modelling in Cloud Computing Maintenance
Authors: Peter Matthews, Victor Muntes.
Publisher: CA Technology Exchange - CA Labs Research, 4(1):42-48,

Developing Troubleshooting Systems Using Ontologies
Authors: Reza Basseda, Michael Kifer, John P. Kane, Steven Greenspan, Paul I. Fodor
Publisher: Web Intelligence (WI) and Intelligent Agent Technologies (IAT)13

Eliciting risk, quality and cost aspects in multi-cloud environments
Authors: Victor Muntés, Peter Matthews, Aida Omerovic, Alexander Gunka.
Publisher: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING

Forgive and forget: return to obscurity
Authors: Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan
Publisher: In Proceedings of the 2013 New Security Paradigms Workshop (NSPW '13).

Generating service models by trace subsequence substitution
Authors: Miao Du, Jean-Guy Schneider, Cameron Hine, John Grundy, Steve Versteeg
Publisher: In Proceedings of the 9th international ACM Sigsoft conference on Quality of ...

Heuristics for Evaluating IT Security Management Tools
Authors: Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov
Publisher: Human–Computer Interaction

Information behaving badly
Authors: Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun
Publisher: In Proceedings of the 2013 New Security Paradigms Workshop. ACM.

Interaction Traces Mining for Efficient System Responses Generation
Authors: Miao Du, Steve Versteeg, Jean-Guy Schneider, Jun Han, John Grundy
Publisher: 2nd International Workshop on Software Mining (SoftMine)

Less is more: Architecture documentation for agile development
Authors: Irit Hadar, Sofia Sherman, Ethan Hadar, John J. Harrison
Publisher: In Cooperative and Human Aspects of Software Engineering (CHASE), 2013 6th International Workshop on. IEEE.

Looking beyond the Single Pane of Glass: Visualization and Perspective in Enterprise Network
Authors: Maria C. Velez-Rojas, Serge Mankovski, Michael Roberts, Steven Greenspan, Esin Kırış
Publisher: Lecture Notes in Computer Science

Predicting bug-fixing time: an empirical study of commercial software projects
Authors: Hongyu Zhang, Liang Gong, Steve Versteeg
Publisher: In Proceedings of the 2013 international conference on software engineering ...

Reflecting on visualization for cyber security
Authors: Carrie Gates, Sophie Engle
Publisher: In Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE.

Regression-based utilization prediction algorithms: an empirical investigation.
Authors: Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: ACM, CASCON

Software Engineering for Self-Adaptive Systems: A Second Research Roadmap
Authors: Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley Schmerl, Gabriel Tamura, Norha M. Villegas, Thomas Vogel, Danny Weyns, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy BrunBojan Cukic, Ron Desmarais, S
Publisher: Springer, Lecture Notes in Computer Science

Storm prediction in a cloud.
Authors: Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: IEEE, CSE

Supporting the development and operation of multi-cloud applications: The modaclouds approach
Authors: Elisabetta Di Nitto, Marcos Aurelio Almeida da Silva, Danilo Ardagna, Giuliano Casale, Ciprian Dorin Craciun, Nicolas Ferry, Victor Muntés-Mulero, Arnor Solberg
Publisher: 5th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Timisoara, 2013

The day-in-the-life scenario: A technique for capturing user experience in complex work environments
Authors: Ravina Samaroo, Judith M. Brown, Robert Biddle, Steven Greenspan
Publisher: Emerging Technologies for a Smarter World (CEWIT)

Towards a Method for Decision Support in Multi-cloud Environments
Authors: Aida Omerovic, Victor Muntés-Mulero, Peter Matthews, Alexander Gunka.
Publisher: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization

Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems
Authors: Gabriel Tamura, Norha M. Villegas, Hausi A. Müller, João Pedro Sousa Basil, Becker Gabor, Karsai, Serge Mankovski, Mauro Pezzè, Wilhelm Schäfer, Ladan Tahvildari, Kenny Wong
Publisher: Springer

2012

A virtual deployment testing environment for enterprise software systems
Authors: Jian Yu, Jun Han, Jean-Guy Schneider, Cameron Hine, Steve Versteeg
Publisher: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures

Analysis of User Behaviour in Accessing a Source Code Repository
Authors: Li Sun, Serdar Boztas, K Horadam, A Rao, Steve Versteeg
Publisher: CA Labs Research

Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience.
Authors: Ian J. Davis, Michael W. Godfrey, Richard C. Holt, Serge Mankovski, Nick Minchenko
Publisher: IEEE, CSMR

Collaborating Through Shared Displays and Interacting Devices
Authors: Steven Greenspan
Publisher: CA Technology Exchange: Post-PC Era

Context-Aware Machine Translation for Software Localization
Authors: Víctor Muntés, Patricia Paladini, Cristina España-Bonet, Lluís Màrquez
Publisher: In Proceedings of the 16th Annual Conference of the European Association for Machine Translation (EAMT12)

Crowdsourcing for Industrial Problems
Authors: Victor Muntés-Mulero, Patricia Paladini, Jawad Manzoor, Andrea Gritti, Josep-Lluís Larriba-Pey, Frederik Mijnhardt
Publisher: In Proceedings of the 1st International Workshop on Citizen Sensor Networks

Efficient Graph Management Based on Bitmap Indices
Authors: Norbert Martínez-Bazan, M. Ángel Águila-Lorente, Victor Muntés-Mulero, David Dominguez-Sal, Sergio Gómez-Villamor, Josep-L. Larriba-Pey
Publisher: ACM

Efficient microaggregation techniques for large numerical data volumes.
Authors: Marc Solé, Victor Muntés-Mulero, Jordi Nin.
Publisher: International Journal of Information Security August 2012, Volume 11, Issue 4, pp 253–267

Emulation of Cloud-Scale Environments for Scalability Testing
Authors: Steve Versteeg, Cameron Hine, Jean-Guy Schneider, Jun Han
Publisher: Quality Software (QSIC), 2012 12th International Conference on, 201-209

Introducing STRATOS: A cloud broker service
Authors: Przemyslaw Pawluk, Bradley Simmons, Michael Smit, Marin Litoiu, Serge Mankovski
Publisher: In Proceedings of IEEE Fifth International Conference on Cloud Computing

Multiplying the Potential of Crowdsourcing with Machine Translation
Authors: Victor Muntés-Mulero, Patricia Paladini, Marc Solé, Jawad Manzoor
Publisher: Procs. of the Conference of the Association of Machine Translation of the Americas (AMTA)

Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems
Authors: Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steve Versteeg
Publisher: Services Computing (SCC), 2012 IEEE Ninth International Conference on, 178-185

Probabilistic critical path identification for cost-effective monitoring of service-based web applications
Authors: Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steve Versteeg
Publisher: In Proceedings of the 21st International Conference on World Wide Web, 523-524

Quokka: visualising interactions of enterprise software environment emulators
Authors: Cameron Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg
Publisher: In Proceedings of the 27th IEEE/ACM International Conference on Automated ...

Solving big data challenges for enterprise application performance management
Authors: Tilmann Rabl, Sergio Gómez-Villamor, Mohammad Sadoghi, Victor Muntés-Mulero, Hans-Arno Jacobsen, Serge Mankovskii
Publisher: PVLDB 5(12):1724-1735, 2012.

The Human in the Center: Agile decision-making in complex operations and command center
Authors: Reza Basseda, Tiantian Gao Michael Kifer, Steven Greenspan, Charley Chell
Publisher: The Human in the Center: Agile decision-making in complex operations and command center

Towards a Training-Oriented Adaptive Decision Guidance and Support System
Authors: Farhana H. Zulkernine, Patrick Martin, Sima Soltani, Wendy Powley, Serge Mankovski, Mark Addleman
Publisher: IEEE

2011

Attribution requirements for next generation internets
Authors: Jeffrey Hunker, Carrie Gates, Matt Bishop
Publisher: In Technologies for Homeland Security (HST), 2011 IEEE International Conference on. IEEE.

Concrete- and abstract-based access control
Authors: Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Publisher: Springer

Do you KnowDis? a user study of a knowledge discovery tool for organizations
Authors: Sven Laqua, M. Angela Sasse, Steven Greenspan, Carrie Gates.
Publisher: In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11).

Event clustering for log reduction and run time system understanding.
Authors: Kostas Kontogiannis, Ahmed Wasfy, Serge Mankovski
Publisher: ACM Symposium on Applied Computing

Facebook goes to the doctor
Authors: Matt Bishop, Peter Yellowlees, Carrie Gates, Gabriel Silberman
Publisher: In Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies. ACM.

Heuristics for evaluating IT security management tools
Authors: Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, and Konstantin Beznosov
Publisher: In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11)

Idea: A Reference Platform for Systematic Information Security Management Tool Support
Authors: Ingo Müller, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: International Symposium on Engineering Secure Software and Systems, 256-263

Managing information overload on large enterprise systems
Authors: Maria Velez-Rojas, Serge Mankovskii, Michael Robers, Steven Greenspan, Esin Kiris
Publisher: Emerging Technologies for a Smarter World

One of These Records Is Not Like the Others
Authors: Carrie Gates, Matt Bishop
Publisher: In TaPP

Optimizing the IT business supply chain utilizing cloud computing
Authors: Donald F. Ferguson, Ethan Hadar
Publisher: In Proceedings of the 8th International Conference & Expo on Emerging Technologies for a Smarter World. IEEE.

Risk-based decision method for access control systems
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 9th Annual International Conference on Privacy, Security and Trust. IEEE

Run-time management and optimization of web service monitoring systems
Authors: Garth Heward, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: In Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)

SMICloud: A Framework for Comparing and Ranking Cloud Services
Authors: Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: In Proceedings of the 2011 Fourth IEEE International Conference Utility and Cloud Computing (UCC)

Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services
Authors: Ingo Muller, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: In Proceedings of the 2011 IEEE International Conference on Cloud Computing (CLOUD)

Towards a requirements-driven framework for detecting malicious behavior against software systems
Authors: Hamzeh Zawawy, Kostas Kontogiannis, John Mylopoulos, Serge Mankovski
Publisher: In Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research. ACM

2010

Symptom-based problem determination using log data abstraction
Authors: Liang Huang, Xiaodi Ke, Kenny Wong, Serge Mankovski
Publisher: In Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research. ACM

A risk management approach to the “insider threat”
Authors: Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen
Publisher: In Insider threats in cyber security. Springer.

Combining trust and behavioral analysis to detect security threats in open environments
Authors: Owen McCusker, Joel Glanfield, Scott Brunza, Carrie Gates, John McHugh, Diana Paterson
Publisher: SONALYSTS INC WATERFORD CT.

Detecting incompleteness in access control policies using data classification schemes
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Fifth International Conference on Digital Information Management (ICDIM). IEEE

Does the Past Say It All? Using History to Predict Change Sets in a CMDB.
Authors: Sarah Nadi, Richard C. Holt, Serge Mankovski
Publisher: In Proceedings of the 2010 14th European Conference on Software Maintenance and Reengineering. IEEE

Inconsistency detection method for access control policies
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Sixth International Conference on Information Assurance and Security

Integrated system diagnosis and root cause analysis
Authors: Kenny Wong, Serge Mankovski, Kostas Kontogiannis, Hausi A. Müller, John Mylopoulos
Publisher: In Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research. ACM

Risk management in dynamic role based access control systems
Authors: Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Fifth International Conference on Digital Information Management (ICDIM)

The security and privacy implications of using social networks to deliver healthcare
Authors: Carrie Gates, Matt Bishop
Publisher: In Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments. ACM

Uncovering cultural perceptions and barriers during knowledge audit
Authors: Meira Levy, Irit Hadar, Steven Greenspan, Ethan Hadar
Publisher: Journal of Knowledge Management, Vol. 14 Issue: 1,

Watching the watchers: “voluntary monitoring” of infosec employees
Authors: Tara Whalen, Carrie Gates
Publisher: Information Management & Computer Security

2009

A policy-based middleware for web services SLA negotiation
Authors: Farhana Zulkernine, Patrick Martin, Chris Craddock, Kirk Wilson
Publisher: In Proceedings of the 2009 IEEE International Conference on Web Services. IEEE

An automated classification system based on the strings of trojan and virus families
Authors: Ronghua Tian, Lynn Batten, Rafiqul Islam, Steve Versteeg
Publisher: In Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)

Case studies of an insider framework
Authors: Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates
Publisher: In Proceedings of the 42nd Hawaii International Conference on System Sciences, 2009. HICSS'09. IEEE

Coordinated Scan Detection
Authors: Carrie Gates
Publisher: In NDSS

DRACA: decision support for root cause analysis and change impact analysis for CMDBs
Authors: Sarah Nadi, Richard C. Holt, Ian J. Davis, Serge Mankovski
Publisher: In Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research. ACM

Flovis: Flow visualization system
Authors: Teryl Taylor, Diana Paterson, Joel Glanfield, Carrie Gates, Stephen Brooks, John McHugh
Publisher: In Proceedings of the 2009 Conference For Homeland Security CATCH'09. Cybersecurity Applications & Technology. IEEE.

ITML: a domain-specific modeling language for supporting business driven it management
Authors: Ulrich Frank, David Heise, Heiko Kattenstroth, Donald F. Ferguson, Ethan Hadar, Marvin G. Waschke
Publisher: In Proceedings of the 9th Workshop on Domain-Specific Modeling (DSM) at the International Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA).

Making Sense of the Unkown: Knowledge Dissemination in Organizations
Authors: Sven Laqua, Angela M Sasse, Carrie Gates, Steven Greenspan
Publisher: 2nd Sensemaking Workshop at CHI 2009.

Root cause analysis and diagnosis in SOA and cloud environments
Authors: Serge Mankovski, Kostas Kontogiannis, Hausi Müller, and Ken Wong.
Publisher: In Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '09)

The sisterhood of the traveling packets
Authors: Matt Bishop, Carrie Gates, Jeffrey Hunker
Publisher: In Proceedings of the 2009 workshop on New security paradigms workshop. ACM.

Typing for Conflict Detection in Access Control Policies
Authors: Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Publisher: Lecture Notes in Business Information Processing book series (LNBIP, volume 26). Springer

Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees
Authors: Tara Whalen, Carrie Gates
Publisher: In HAISA

We have met the enemy and he is us
Authors: Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates
Publisher: In Proceedings of the 2008 New Security Paradigms Workshop. ACM.

2008

A case study in testing a network security algorithm
Authors: Carrie Gates
Publisher: In Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities (p. 28). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

A fast randomness test that preserves local detail
Authors: Tim Ebringer, Li Sun, Serdar Boztas
Publisher: In Virus Bulletin 2008 (pp. 34-42). Virus Bulletin Ltd.

A middleware solution to monitoring composite web services-based processes
Authors: Farhana H. Zulkernine, Patrick Martin, Kirk Wilson
Publisher: In Congress on services part II, 2008. SERVICES-2. IEEE.

A survey of policy-based management approaches for service oriented systems
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
Publisher: In Proceedings of the 19th Australian Conference on Software Engineering. IEEE.

Agile architecture methodology: long term strategy interleaved with short term tactics
Authors: Ethan Hadar, Gabriel Silberman
Publisher: In Companion to the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications. ACM.

An access control reference architecture
Authors: Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev
Publisher: In Proceedings of the 2nd ACM workshop on Computer security architectures. ACM.

An automatic anti-anti-VMware technique applicable for multi-stage packed malware
Authors: Li Sun, Tim Ebringer, Serdar Boztas
Publisher: In Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE). IEEE.

Defining the insider threat
Authors: Matt Bishop, Carrie Gates
Publisher: In Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead. ACM.

Friends or foes?: a conceptual analysis of self-adaptation and it change management
Authors: Cristina Gacek, Holger Giese, Ethan Hadar
Publisher: In Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems. ACM.

Function length as a tool for malware classification
Authors: Ronghua Tian, Lynn Margaret Batten, Steve Versteeg
Publisher: In Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008. MALWARE 2008

Knowledge Management Culture Audit: Capturing Tacit Perceptions and Barriers
Authors: Meira Levy, Irit Hadar, Steven Greenspan, Ethan Hadar
Publisher: In Proceedings of the 2008 Americas Conference on Information Systems. AMCIS. 2008

Permission set mining: Discovering practical and useful roles
Authors: Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann
Publisher: In Proceedings of the 2008 Annual Computer Security Applications Conference. ACSAC 2008. IEEE.

Quality-driven business policy specification and refinement for service-oriented systems
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Kirk Wilson
Publisher: Service-Oriented Computing – ICSOC 2008. Lecture Notes in Computer Science, vol 5364. Springer

The contact surface: A technique for exploring internet scale emergent behaviors
Authors: Carrie Gates, John McHugh
Publisher: In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer

2007

A psychological profile of defender personality traits
Authors: Tara Whalen, Carrie Gates
Publisher: Journal of Computers

Access control requirements for web 2.0 security and privacy
Authors: Carrie Gates
Publisher: IEEE Web, 2(0)

Dependable security: testing network intrusion detection systems
Authors: Carrie Gates, Carol Taylor, Matt Bishop
Publisher: In HotDep (Vol. 7, p. 12)

Historic data access in publish/subscribe
Authors: Guoli Li, Alex King Yeung Cheung, Shuang Hou, Songlin Hu, Vinod Muthusamy, R. Sherafat, Alex Wun, Hans-Arno Jacobsen, Serge Mankovski:
Publisher: In Proceedings of the 2007 inaugural international conference on Distributed event-based systems. ACM

Policy-based service registration and discovery
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
Publisher: In OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Springer.

Role engineering using graph optimisation
Authors: Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
Publisher: In Proceedings of the 12th ACM symposium on Access control models and technologies (pp. 139-144). ACM.

SWorD–A Simple Worm Detection Scheme
Authors: Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang
Publisher: In OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Springer

The WSDM of Autonomic Computing: Experiences in Implementing Autonomic Web Services
Authors: Patrick Martin, Wendy Powley, Kirk Wilson, Wenhu Tian, T. Xu, Jared Zebedee
Publisher: In Proceedings of the 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems. IEEE Computer Society

2006

Challenging the anomaly detection paradigm: a provocative discussion
Authors: Carrie Gates, Carol Taylor
Publisher: In Proceedings of the 2006 workshop on New security paradigms. ACM.

Decentralized Execution of Event-Driven Scientific Workflows
Authors: Guoli Li, Vinod Muthusamy, H.-Arno Jacobsen, Serge Mankovski
Publisher: Services Computing Workshops, 2006.

2005

The PADRES Distributed Publish/Subscribe System
Authors: Eli Fidler, Hans-Arno Jacobsen, Guoli Li, Serge Mankovskii
Publisher: FIW

Earlier Publications

2014

Data is the new currency
Authors: Carrie Gates, Peter Matthews
Publisher: In Proceedings of the 2014 New Security Paradigms Workshop. ACM.

Detecting Discontinuities in Large Scale Systems
Authors: Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: IEEE

Efficient Graph Based Approach to Large Scale Role Engineering.
Authors: Dana Zhang, Kotagiri Ramamohanarao, Rui Zhang, Steve Versteeg
Publisher: Trans. Data Privacy 7 (1), 1-26

Formulating Cost-Effective Monitoring Strategies for Service-Based Systems
Authors: Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider, Steve Versteeg
Publisher: IEEE Transactions on Software Engineering 40 (5), 461-482

Graph anonymization via metric embed-dings: Using classical anonymization for graphs
Authors: Arnau Padrol, Victor Muntés-Mulero
Publisher: Intell. Data Anal. 18(3): 365-388

SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments
Authors: Linlin Wu, Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: IEEE Transactions on Services Computing 7 (3), 465-485

Using genetic algorithms for attribute grouping in multivariate microaggregation
Authors: Jordi Balasch-Masoliver, Victor Muntés-Mulero, Jordi Nin
Publisher: Intelligent Data Analysis, vol. 18, no. 5, pp. 819-836, 2014. IOS Press

Worker ranking determination in crowdsourcing platforms using aggregation functions
Authors: David Sanchez-Charles, Jordi Nin, Marc Solé, Victor Muntés-Mulero
Publisher: FUZZ-IEEE 2014: 1801-1808.

2013

A Business Protocol Unit Testing Framework for Web Service Composition
Authors: Jian Yu, Jun Han, Steven O. Gunarso, Steve Versteeg
Publisher: International Conference on Advanced Information Systems Engineering, 17-34

A framework for ranking of cloud computing services
Authors: Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: Future Generation Computer Systems 29 (4), 1012-1023

A Logical Foundation For Troubleshooting Agents
Authors: Basseda, Reza, Paul Fodor, Steven Greenspan
Publisher: In Proceedings of KICSS'2013, pp. 46-56

Automated SLA Negotiation Framework for Cloud Computing
Authors: Linlin Wu, Saurabh Kumar Garg, Rajkumar Buyya, Chao Chen, Steve Versteeg
Publisher: Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International ...

CAPRI: a tool for mining complex line patterns in large log data
Authors: Farhana Zulkernine, Patrick Martin, Wendy Powley, Sima Soltani, Serge Mankovski, Mark Addleman
Publisher: In Proceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous
Source Mining: Algorithms, Systems, Programming Models and Applications (BigMine '13).

Classification of malware based on integrated static and dynamic features
Authors: Rafiqul Islam, Ronghua Tian, Lynn M. Batten, Steve Versteeg
Publisher: Journal of Network and Computer Applications 36 (2), 646-656

Complex activities in an operations center: a case study and model for engineering interaction
Authors: Judith M. Brown, Steven Greenspan, Robert L. Biddle.
Publisher: In Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems (EICS '13).

Data Management and Risk Modelling in Cloud Computing Maintenance
Authors: Peter Matthews, Victor Muntes.
Publisher: CA Technology Exchange - CA Labs Research, 4(1):42-48,

Developing Troubleshooting Systems Using Ontologies
Authors: Reza Basseda, Michael Kifer, John P. Kane, Steven Greenspan, Paul I. Fodor
Publisher: Web Intelligence (WI) and Intelligent Agent Technologies (IAT)13

Eliciting risk, quality and cost aspects in multi-cloud environments
Authors: Victor Muntés, Peter Matthews, Aida Omerovic, Alexander Gunka.
Publisher: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING

Forgive and forget: return to obscurity
Authors: Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan
Publisher: In Proceedings of the 2013 New Security Paradigms Workshop (NSPW '13).

Generating service models by trace subsequence substitution
Authors: Miao Du, Jean-Guy Schneider, Cameron Hine, John Grundy, Steve Versteeg
Publisher: In Proceedings of the 9th international ACM Sigsoft conference on Quality of ...

Heuristics for Evaluating IT Security Management Tools
Authors: Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov
Publisher: Human–Computer Interaction

Information behaving badly
Authors: Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun
Publisher: In Proceedings of the 2013 New Security Paradigms Workshop. ACM.

Interaction Traces Mining for Efficient System Responses Generation
Authors: Miao Du, Steve Versteeg, Jean-Guy Schneider, Jun Han, John Grundy
Publisher: 2nd International Workshop on Software Mining (SoftMine)

Less is more: Architecture documentation for agile development
Authors: Irit Hadar, Sofia Sherman, Ethan Hadar, John J. Harrison
Publisher: In Cooperative and Human Aspects of Software Engineering (CHASE), 2013 6th International Workshop on. IEEE.

Looking beyond the Single Pane of Glass: Visualization and Perspective in Enterprise Network
Authors: Maria C. Velez-Rojas, Serge Mankovski, Michael Roberts, Steven Greenspan, Esin Kırış
Publisher: Lecture Notes in Computer Science

Predicting bug-fixing time: an empirical study of commercial software projects
Authors: Hongyu Zhang, Liang Gong, Steve Versteeg
Publisher: In Proceedings of the 2013 international conference on software engineering ...

Reflecting on visualization for cyber security
Authors: Carrie Gates, Sophie Engle
Publisher: In Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE.

Regression-based utilization prediction algorithms: an empirical investigation.
Authors: Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: ACM, CASCON

Software Engineering for Self-Adaptive Systems: A Second Research Roadmap
Authors: Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley Schmerl, Gabriel Tamura, Norha M. Villegas, Thomas Vogel, Danny Weyns, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy BrunBojan Cukic, Ron Desmarais, S
Publisher: Springer, Lecture Notes in Computer Science

Storm prediction in a cloud.
Authors: Ian J. Davis, Hadi Hemmati, Richard C. Holt, Michael W. Godfrey, Douglas Neuse, Serge Mankovski
Publisher: IEEE, CSE

Supporting the development and operation of multi-cloud applications: The modaclouds approach
Authors: Elisabetta Di Nitto, Marcos Aurelio Almeida da Silva, Danilo Ardagna, Giuliano Casale, Ciprian Dorin Craciun, Nicolas Ferry, Victor Muntés-Mulero, Arnor Solberg
Publisher: 5th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Timisoara, 2013

The day-in-the-life scenario: A technique for capturing user experience in complex work environments
Authors: Ravina Samaroo, Judith M. Brown, Robert Biddle, Steven Greenspan
Publisher: Emerging Technologies for a Smarter World (CEWIT)

Towards a Method for Decision Support in Multi-cloud Environments
Authors: Aida Omerovic, Victor Muntés-Mulero, Peter Matthews, Alexander Gunka.
Publisher: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization

Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems
Authors: Gabriel Tamura, Norha M. Villegas, Hausi A. Müller, João Pedro Sousa Basil, Becker Gabor, Karsai, Serge Mankovski, Mauro Pezzè, Wilhelm Schäfer, Ladan Tahvildari, Kenny Wong
Publisher: Springer

2012

A virtual deployment testing environment for enterprise software systems
Authors: Jian Yu, Jun Han, Jean-Guy Schneider, Cameron Hine, Steve Versteeg
Publisher: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures

Analysis of User Behaviour in Accessing a Source Code Repository
Authors: Li Sun, Serdar Boztas, K Horadam, A Rao, Steve Versteeg
Publisher: CA Labs Research

Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience.
Authors: Ian J. Davis, Michael W. Godfrey, Richard C. Holt, Serge Mankovski, Nick Minchenko
Publisher: IEEE, CSMR

Collaborating Through Shared Displays and Interacting Devices
Authors: Steven Greenspan
Publisher: CA Technology Exchange: Post-PC Era

Context-Aware Machine Translation for Software Localization
Authors: Víctor Muntés, Patricia Paladini, Cristina España-Bonet, Lluís Màrquez
Publisher: In Proceedings of the 16th Annual Conference of the European Association for Machine Translation (EAMT12)

Crowdsourcing for Industrial Problems
Authors: Victor Muntés-Mulero, Patricia Paladini, Jawad Manzoor, Andrea Gritti, Josep-Lluís Larriba-Pey, Frederik Mijnhardt
Publisher: In Proceedings of the 1st International Workshop on Citizen Sensor Networks

Efficient Graph Management Based on Bitmap Indices
Authors: Norbert Martínez-Bazan, M. Ángel Águila-Lorente, Victor Muntés-Mulero, David Dominguez-Sal, Sergio Gómez-Villamor, Josep-L. Larriba-Pey
Publisher: ACM

Efficient microaggregation techniques for large numerical data volumes.
Authors: Marc Solé, Victor Muntés-Mulero, Jordi Nin.
Publisher: International Journal of Information Security August 2012, Volume 11, Issue 4, pp 253–267

Emulation of Cloud-Scale Environments for Scalability Testing
Authors: Steve Versteeg, Cameron Hine, Jean-Guy Schneider, Jun Han
Publisher: Quality Software (QSIC), 2012 12th International Conference on, 201-209

Introducing STRATOS: A cloud broker service
Authors: Przemyslaw Pawluk, Bradley Simmons, Michael Smit, Marin Litoiu, Serge Mankovski
Publisher: In Proceedings of IEEE Fifth International Conference on Cloud Computing

Multiplying the Potential of Crowdsourcing with Machine Translation
Authors: Victor Muntés-Mulero, Patricia Paladini, Marc Solé, Jawad Manzoor
Publisher: Procs. of the Conference of the Association of Machine Translation of the Americas (AMTA)

Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems
Authors: Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steve Versteeg
Publisher: Services Computing (SCC), 2012 IEEE Ninth International Conference on, 178-185

Probabilistic critical path identification for cost-effective monitoring of service-based web applications
Authors: Qiang He, Jun Han, Yun Yang, Jean-Guy Schneider, Hai Jin, Steve Versteeg
Publisher: In Proceedings of the 21st International Conference on World Wide Web, 523-524

Quokka: visualising interactions of enterprise software environment emulators
Authors: Cameron Hine, Jean-Guy Schneider, Jun Han, Steve Versteeg
Publisher: In Proceedings of the 27th IEEE/ACM International Conference on Automated ...

Solving big data challenges for enterprise application performance management
Authors: Tilmann Rabl, Sergio Gómez-Villamor, Mohammad Sadoghi, Victor Muntés-Mulero, Hans-Arno Jacobsen, Serge Mankovskii
Publisher: PVLDB 5(12):1724-1735, 2012.

The Human in the Center: Agile decision-making in complex operations and command center
Authors: Reza Basseda, Tiantian Gao Michael Kifer, Steven Greenspan, Charley Chell
Publisher: The Human in the Center: Agile decision-making in complex operations and command center

Towards a Training-Oriented Adaptive Decision Guidance and Support System
Authors: Farhana H. Zulkernine, Patrick Martin, Sima Soltani, Wendy Powley, Serge Mankovski, Mark Addleman
Publisher: IEEE

2011

Attribution requirements for next generation internets
Authors: Jeffrey Hunker, Carrie Gates, Matt Bishop
Publisher: In Technologies for Homeland Security (HST), 2011 IEEE International Conference on. IEEE.

Concrete- and abstract-based access control
Authors: Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Publisher: Springer

Do you KnowDis? a user study of a knowledge discovery tool for organizations
Authors: Sven Laqua, M. Angela Sasse, Steven Greenspan, Carrie Gates.
Publisher: In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11).

Event clustering for log reduction and run time system understanding.
Authors: Kostas Kontogiannis, Ahmed Wasfy, Serge Mankovski
Publisher: ACM Symposium on Applied Computing

Facebook goes to the doctor
Authors: Matt Bishop, Peter Yellowlees, Carrie Gates, Gabriel Silberman
Publisher: In Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies. ACM.

Heuristics for evaluating IT security management tools
Authors: Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, and Konstantin Beznosov
Publisher: In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11)

Idea: A Reference Platform for Systematic Information Security Management Tool Support
Authors: Ingo Müller, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: International Symposium on Engineering Secure Software and Systems, 256-263

Managing information overload on large enterprise systems
Authors: Maria Velez-Rojas, Serge Mankovskii, Michael Robers, Steven Greenspan, Esin Kiris
Publisher: Emerging Technologies for a Smarter World

One of These Records Is Not Like the Others
Authors: Carrie Gates, Matt Bishop
Publisher: In TaPP

Optimizing the IT business supply chain utilizing cloud computing
Authors: Donald F. Ferguson, Ethan Hadar
Publisher: In Proceedings of the 8th International Conference & Expo on Emerging Technologies for a Smarter World. IEEE.

Risk-based decision method for access control systems
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 9th Annual International Conference on Privacy, Security and Trust. IEEE

Run-time management and optimization of web service monitoring systems
Authors: Garth Heward, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: In Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)

SMICloud: A Framework for Comparing and Ranking Cloud Services
Authors: Saurabh Kumar Garg, Steve Versteeg, Rajkumar Buyya
Publisher: In Proceedings of the 2011 Fourth IEEE International Conference Utility and Cloud Computing (UCC)

Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services
Authors: Ingo Muller, Jun Han, Jean-Guy Schneider, Steve Versteeg
Publisher: In Proceedings of the 2011 IEEE International Conference on Cloud Computing (CLOUD)

Towards a requirements-driven framework for detecting malicious behavior against software systems
Authors: Hamzeh Zawawy, Kostas Kontogiannis, John Mylopoulos, Serge Mankovski
Publisher: In Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research. ACM

2010

Symptom-based problem determination using log data abstraction
Authors: Liang Huang, Xiaodi Ke, Kenny Wong, Serge Mankovski
Publisher: In Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research. ACM

A risk management approach to the “insider threat”
Authors: Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen
Publisher: In Insider threats in cyber security. Springer.

Combining trust and behavioral analysis to detect security threats in open environments
Authors: Owen McCusker, Joel Glanfield, Scott Brunza, Carrie Gates, John McHugh, Diana Paterson
Publisher: SONALYSTS INC WATERFORD CT.

Detecting incompleteness in access control policies using data classification schemes
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Fifth International Conference on Digital Information Management (ICDIM). IEEE

Does the Past Say It All? Using History to Predict Change Sets in a CMDB.
Authors: Sarah Nadi, Richard C. Holt, Serge Mankovski
Publisher: In Proceedings of the 2010 14th European Conference on Software Maintenance and Reengineering. IEEE

Inconsistency detection method for access control policies
Authors: Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Sixth International Conference on Information Assurance and Security

Integrated system diagnosis and root cause analysis
Authors: Kenny Wong, Serge Mankovski, Kostas Kontogiannis, Hausi A. Müller, John Mylopoulos
Publisher: In Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research. ACM

Risk management in dynamic role based access control systems
Authors: Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
Publisher: In Proceedings of the 2010 Fifth International Conference on Digital Information Management (ICDIM)

The security and privacy implications of using social networks to deliver healthcare
Authors: Carrie Gates, Matt Bishop
Publisher: In Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments. ACM

Uncovering cultural perceptions and barriers during knowledge audit
Authors: Meira Levy, Irit Hadar, Steven Greenspan, Ethan Hadar
Publisher: Journal of Knowledge Management, Vol. 14 Issue: 1,

Watching the watchers: “voluntary monitoring” of infosec employees
Authors: Tara Whalen, Carrie Gates
Publisher: Information Management & Computer Security

2009

A policy-based middleware for web services SLA negotiation
Authors: Farhana Zulkernine, Patrick Martin, Chris Craddock, Kirk Wilson
Publisher: In Proceedings of the 2009 IEEE International Conference on Web Services. IEEE

An automated classification system based on the strings of trojan and virus families
Authors: Ronghua Tian, Lynn Batten, Rafiqul Islam, Steve Versteeg
Publisher: In Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)

Case studies of an insider framework
Authors: Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates
Publisher: In Proceedings of the 42nd Hawaii International Conference on System Sciences, 2009. HICSS'09. IEEE

Coordinated Scan Detection
Authors: Carrie Gates
Publisher: In NDSS

DRACA: decision support for root cause analysis and change impact analysis for CMDBs
Authors: Sarah Nadi, Richard C. Holt, Ian J. Davis, Serge Mankovski
Publisher: In Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research. ACM

Flovis: Flow visualization system
Authors: Teryl Taylor, Diana Paterson, Joel Glanfield, Carrie Gates, Stephen Brooks, John McHugh
Publisher: In Proceedings of the 2009 Conference For Homeland Security CATCH'09. Cybersecurity Applications & Technology. IEEE.

ITML: a domain-specific modeling language for supporting business driven it management
Authors: Ulrich Frank, David Heise, Heiko Kattenstroth, Donald F. Ferguson, Ethan Hadar, Marvin G. Waschke
Publisher: In Proceedings of the 9th Workshop on Domain-Specific Modeling (DSM) at the International Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA).

Making Sense of the Unkown: Knowledge Dissemination in Organizations
Authors: Sven Laqua, Angela M Sasse, Carrie Gates, Steven Greenspan
Publisher: 2nd Sensemaking Workshop at CHI 2009.

Root cause analysis and diagnosis in SOA and cloud environments
Authors: Serge Mankovski, Kostas Kontogiannis, Hausi Müller, and Ken Wong.
Publisher: In Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '09)

The sisterhood of the traveling packets
Authors: Matt Bishop, Carrie Gates, Jeffrey Hunker
Publisher: In Proceedings of the 2009 workshop on New security paradigms workshop. ACM.

Typing for Conflict Detection in Access Control Policies
Authors: Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Publisher: Lecture Notes in Business Information Processing book series (LNBIP, volume 26). Springer

Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees
Authors: Tara Whalen, Carrie Gates
Publisher: In HAISA

We have met the enemy and he is us
Authors: Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates
Publisher: In Proceedings of the 2008 New Security Paradigms Workshop. ACM.

2008

A case study in testing a network security algorithm
Authors: Carrie Gates
Publisher: In Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities (p. 28). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

A fast randomness test that preserves local detail
Authors: Tim Ebringer, Li Sun, Serdar Boztas
Publisher: In Virus Bulletin 2008 (pp. 34-42). Virus Bulletin Ltd.

A middleware solution to monitoring composite web services-based processes
Authors: Farhana H. Zulkernine, Patrick Martin, Kirk Wilson
Publisher: In Congress on services part II, 2008. SERVICES-2. IEEE.

A survey of policy-based management approaches for service oriented systems
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
Publisher: In Proceedings of the 19th Australian Conference on Software Engineering. IEEE.

Agile architecture methodology: long term strategy interleaved with short term tactics
Authors: Ethan Hadar, Gabriel Silberman
Publisher: In Companion to the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications. ACM.

An access control reference architecture
Authors: Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev
Publisher: In Proceedings of the 2nd ACM workshop on Computer security architectures. ACM.

An automatic anti-anti-VMware technique applicable for multi-stage packed malware
Authors: Li Sun, Tim Ebringer, Serdar Boztas
Publisher: In Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE). IEEE.

Defining the insider threat
Authors: Matt Bishop, Carrie Gates
Publisher: In Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead. ACM.

Friends or foes?: a conceptual analysis of self-adaptation and it change management
Authors: Cristina Gacek, Holger Giese, Ethan Hadar
Publisher: In Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems. ACM.

Function length as a tool for malware classification
Authors: Ronghua Tian, Lynn Margaret Batten, Steve Versteeg
Publisher: In Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008. MALWARE 2008

Knowledge Management Culture Audit: Capturing Tacit Perceptions and Barriers
Authors: Meira Levy, Irit Hadar, Steven Greenspan, Ethan Hadar
Publisher: In Proceedings of the 2008 Americas Conference on Information Systems. AMCIS. 2008

Permission set mining: Discovering practical and useful roles
Authors: Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann
Publisher: In Proceedings of the 2008 Annual Computer Security Applications Conference. ACSAC 2008. IEEE.

Quality-driven business policy specification and refinement for service-oriented systems
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Kirk Wilson
Publisher: Service-Oriented Computing – ICSOC 2008. Lecture Notes in Computer Science, vol 5364. Springer

The contact surface: A technique for exploring internet scale emergent behaviors
Authors: Carrie Gates, John McHugh
Publisher: In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer

2007

A psychological profile of defender personality traits
Authors: Tara Whalen, Carrie Gates
Publisher: Journal of Computers

Access control requirements for web 2.0 security and privacy
Authors: Carrie Gates
Publisher: IEEE Web, 2(0)

Dependable security: testing network intrusion detection systems
Authors: Carrie Gates, Carol Taylor, Matt Bishop
Publisher: In HotDep (Vol. 7, p. 12)

Historic data access in publish/subscribe
Authors: Guoli Li, Alex King Yeung Cheung, Shuang Hou, Songlin Hu, Vinod Muthusamy, R. Sherafat, Alex Wun, Hans-Arno Jacobsen, Serge Mankovski:
Publisher: In Proceedings of the 2007 inaugural international conference on Distributed event-based systems. ACM

Policy-based service registration and discovery
Authors: Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
Publisher: In OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Springer.

Role engineering using graph optimisation
Authors: Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
Publisher: In Proceedings of the 12th ACM symposium on Access control models and technologies (pp. 139-144). ACM.

SWorD–A Simple Worm Detection Scheme
Authors: Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang
Publisher: In OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Springer

The WSDM of Autonomic Computing: Experiences in Implementing Autonomic Web Services
Authors: Patrick Martin, Wendy Powley, Kirk Wilson, Wenhu Tian, T. Xu, Jared Zebedee
Publisher: In Proceedings of the 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems. IEEE Computer Society

2006

Challenging the anomaly detection paradigm: a provocative discussion
Authors: Carrie Gates, Carol Taylor
Publisher: In Proceedings of the 2006 workshop on New security paradigms. ACM.

Decentralized Execution of Event-Driven Scientific Workflows
Authors: Guoli Li, Vinod Muthusamy, H.-Arno Jacobsen, Serge Mankovski
Publisher: Services Computing Workshops, 2006.

2005

The PADRES Distributed Publish/Subscribe System
Authors: Eli Fidler, Hans-Arno Jacobsen, Guoli Li, Serge Mankovskii
Publisher: FIW

Meet the CA Strategic Research team

Get to know the distinguished researchers, engineers and staff behind CA Strategic Research and the Office of the CTO.

Explore our current patent portfolio

Supporting CA Technologies’ leadership by protecting its ideas