Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Steve Versteeg"'
Autor:
Jiaojiao Jiang, Steve Versteeg, Jun Han, Md Arafat Hossain, Jean-Guy Schneider, Christopher Leckie, Zeinab Farahmandpour
Publikováno v:
IEEE Access, Vol 7, Pp 88504-88516 (2019)
An IT system generates messages for other systems or users to consume, through direct interaction or as system logs. Automatically identifying the types of these machine-generated messages has many applications, such as intrusion detection and system
Externí odkaz:
https://doaj.org/article/044ff90abdc54f52aa351ea597b8ccfb
Autor:
Md Arafat Hossain, Jun Han, Jean-Guy Schneider, Jiaojiao Jiang, Muhammad Ashad Kabir, Steve Versteeg
Publikováno v:
ACM Transactions on Internet Technology. 22:1-31
Having precise specifications of service APIs is essential for many Software Engineering activities. Unfortunately, available documentation of services is often inadequate and/or imprecise and, hence, cannot be fully relied upon. Generating service d
Publikováno v:
Future Generation Computer Systems. 117:59-71
Software behavioral models have proven useful for emulating and testing software systems. Many techniques have been proposed to infer behavioral models of software systems from their interaction traces. The quality of the inferred/mined model is crit
Publikováno v:
Future Generation Computer Systems. 102:369-381
Message format extraction, the process of revealing the message syntax without access to the protocol specification, is important for a variety of applications such as service virtualization and network security. In this paper, we propose P-token, wh
Autor:
Jean-Guy Schneider, Zeinab Farahmandpour, Arafat Hossain, Christopher Leckie, Jun Han, Jiaojiao Jiang, Steve Versteeg
Publikováno v:
IEEE Access, Vol 7, Pp 88504-88516 (2019)
An IT system generates messages for other systems or users to consume, through direct interaction or as system logs. Automatically identifying the types of these machine-generated messages has many applications, such as intrusion detection and system
Publikováno v:
Journal of Network and Computer Applications. 196:103247
Automatically discovering message formats of unknown service or system protocols from network traces has become important for a variety of applications, such as emulating the behavior of an unknown protocol in service virtualization, or enabling deep
Publikováno v:
The Computer Journal. 60:27-44
The landscape of modern enterprise IT environments is that a large number of distributed software systems interact and cooperate with each other to support daily business operations. With the prevalence of cloud computing, the level of system connect
Autor:
Muhammad Ashad Kabir, Steve Versteeg, Jiaojiao Jiang, Jean-Guy Schneider, Jun Han, Arafat Hossain
Publikováno v:
SANER
APIs play a significant role in the sharing, utilization and integration of information and service assets for enterprises, delivering significant business value. However, the documentation of service APIs can often be incomplete, ambiguous, or even
Publikováno v:
ICWS
We present GHTraffic, a dataset of significant size comprising HTTP transactions extracted from GitHub data and augmented with synthetic transaction data. The dataset facilitates reproducible research on many aspects of service-oriented computing. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5c1edc8bef03e25502ce90e6e450033
Publikováno v:
ACM SIGSOFT Software Engineering Notes. 40:1-8
Software service emulation is an emerging technique for creating realistic executable models of server-side behaviour. It is particularly useful in quality assurance and DevOps, replicating production-like conditions for large-scale enterprise softwa