Author Archives: Ali

Our New Work on Self-Adaptive Security for large-scale Open Environments

We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, … Continue reading

Posted in Architectural knowledge, Cloud Computing, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Data Exfiltration: External Attack Vectors and Countermeasures

With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors … Continue reading

Posted in Big Data, Cloud Computing, Cyber Security, Data Exfiltration, Knowledge Sharing, Security, Service Oriented Computing | Leave a comment

Search Engines for Web of Things (WoT)

Millions of objects are being connected to provide different services via the Web. This trend has led the paradigm of Web of Things (WoT), that can be searched and leveraged by uses (i.e., human or other systems/machines). One of the … Continue reading

Posted in Innovation, Internet of Everything, Internet of Things (IoTs), Software Architecture, Software Engineering, Uncategorized, Web of Things (WoTs) | Leave a comment

Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies

The ongoing collaboration with the Maritime Division of Defence and Science Technology Group (DST) has resulted in another very useful piece of work that we are very glad to share through this blog. We have been conducting a series of … Continue reading

Posted in Cloud Computing, Combat Systems, Container Technologies, Cyber Security, Defence Systems, Private Cloud, Scalable, Security, Service Oriented Computing, Submarine Systems | Leave a comment

Understanding Container Isolation Mechanisms for Security-Sensitive Private Cloud

With the increasing trend of adopting containerised solution for cloud-based infrastructures, it is becoming increasingly important to pay appropriate attention to the security risks that usually characterise virtualised solutions using container technologies such as Docker. We have recently finished another … Continue reading

Posted in Cloud Computing, Combat Systems, Container Technologies, Defence Systems, DevOps, Private Cloud, Submarine Systems | Leave a comment

A 360 Review on Continuous Integration, Delivery, and Deployment

The increasing amount of literature on Continuous Integration (CI), Continuous Delivery (CDE), and Continuous Deployment (CD) has stimulated the need and desire of secondary studies. Recently, there have been several reviews published on CI, CDE, and CD, mostly in Software … Continue reading

Posted in Continuous Development, Continuous Software Engineering, Evidence-Based Software Engineering, Software Engineering | Leave a comment

A New Course on Requirements Engineering

We are going to complete the implementation of our redeveloped Bachelor of Engineering (Software) degree program in 2017. As part of the full implementation of the redeveloped degree, we will be adding two new courses to the program: Software Engineering … Continue reading

Posted in Curriculum, Education, Requirements Engineering, SE Curriculum, Software Engineering, Software Engineering Programs | Leave a comment