
-
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack
BACKGROUND: Machine learning-based security detection models have become...
read it
-
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code
Context: The 'as code' suffix in infrastructure as code (IaC) refers to ...
read it
-
Improved Recognition of Security Bugs via Dual Hyperparameter Optimization
Background: Security bugs need to be handled by small groups of engineer...
read it
-
Security Smells in Infrastructure as Code Scripts
Context: Security smells are coding patterns in source code that are ind...
read it
-
Feature Toggle Driven Development: Practices usedby Practitioners
Using feature toggles is a technique that allows developers to either tu...
read it
-
Better Security Bug Report Classification via Hyperparameter Optimization
When security bugs are detected, they should be (a) discussed privately ...
read it
-
Source Code Properties of Defective Infrastructure as Code Scripts
Context: In continuous deployment, software and services are rapidly dep...
read it
-
Categorizing Defects in Infrastructure as Code
Infrastructure as code (IaC) scripts are used to automate the maintenanc...
read it
-
Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research
Context:Infrastructure as code (IaC) is the practice to automatically co...
read it
-
Cost-aware Vulnerability Prediction: the HARMLESS Approach
Society needs more secure software. But predicting vulnerabilities is di...
read it