-
Recent Posts
- Engineering Data-Driven Secure Software Services
- Design Space for Cyber Security Analytical Systems
- Adaptive Architectures for Cyber Security Analytics Systems
- A Systematic Horizon Scan of Security Orchestration Approaches and Tools
- Internet of Things Search Engine: Concepts, Classification, and Open Issues
Recent Comments
Cap Table on Unique Challenges of Global So… Archives
- March 2019
- January 2019
- October 2018
- August 2018
- July 2018
- November 2017
- June 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- August 2014
- April 2014
- March 2014
- February 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- May 2013
- April 2013
- November 2012
- September 2012
- August 2012
- July 2012
- May 2012
- April 2012
- March 2012
- December 2011
- September 2011
- August 2011
- July 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
Categories
- Activity Based Computing
- Adelaide Smart City
- Agile Approaches
- Architectural knowledge
- Australian Software Factory
- Australian Software Factory
- Big Data
- Cloud Computing
- Combat Systems
- Computer Science Degree Programs
- Connected Cities
- Container Technologies
- Continuous Development
- Continuous Software Engineering
- Curriculum
- Cyber Security
- Data Exfiltration
- Defence Systems
- Delegate
- Design patterns
- Design rationale
- DevOps
- Education
- Entrepreneurs
- Evidence-Based Software Engineering
- Extreme Programming
- Gamification
- Global Software Engineering (GSE)
- Green ICT
- Green Software
- Human-Centric Software Engineering
- Inner Source Software
- Innovation
- Internet of Everything
- Internet of Things (IoTs)
- Knowledge Sharing
- Massive Open Online Courses
- Microgrid
- Model Driven Engineering (MDE)
- MOOCs
- Open Source Software
- Privacy
- Private Cloud
- Requirements Engineering
- Research Methods
- Scalable
- Scrum
- SE Curriculum
- Security
- Security Analytics
- Security Orchestration
- Service Oriented Computing
- Service-Oriented Architecture
- Small Private Online Courses
- Smart Campus
- Smart Campus
- Smart Cities
- Smart Energy Systems
- Smart Environment
- Smart Grid
- Smart Mobility
- Smart People
- Social Computing
- Social Structure
- Software Architecture
- Software Engineering
- Software Engineering Programs
- Software Product Lines
- SPOCs
- Submarine Systems
- Sustainability
- Uncategorized
- Variability management
- Web of Things (WoTs)
Meta
Category Archives: Big Data
Design Space for Cyber Security Analytical Systems
Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. … Continue reading
Adaptive Architectures for Cyber Security Analytics Systems
It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics … Continue reading
Data Exfiltration: External Attack Vectors and Countermeasures
With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors … Continue reading
An Approach to Designing and Evaluating Web of Things (WoT) Systems
Internet of Things (IoT) have emerged a popular technology that underpinning several innovative products and services. Internet of Everything (IoE) or Web of Things (WoT) are real or virtual networks of things (or services) that can be meaningfully quarried or … Continue reading
Posted in Architectural knowledge, Big Data, Cloud Computing, Container Technologies, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Internet of Everything, Internet of Things (IoTs), Private Cloud, Scalable, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Web of Things (WoTs)
Leave a comment
Smart Campus: Model Driven Security for Systems of Systems
Socio-technical systems underpinning smart and connected cities are good examples of systems of systems – where each constituent system act and behave independents but these systems are connected with each other and provide each other different services. Security is one … Continue reading
Posted in Big Data, Cloud Computing, Container Technologies, Cyber Security, Data Exfiltration, Green ICT, Green Software, Innovation, Internet of Everything, Internet of Things (IoTs), Model Driven Engineering (MDE), Private Cloud, Security, Smart Campus, Smart Cities, Smart Grid, Sustainability
Leave a comment
Designing and Evolving Architectures for Big Data Applications
Big Data applications are playing critical role for all sorts of organisations. Whilst data scientist is considered a critical role for big data applications, the role of software architect has become even more critical as appropriate design and careful implementation … Continue reading
Reference Architecture for Cloud-Based Tools as a Service Workspace Completed
A few years ago we started an exciting and challenging project to design and implement a reference architecture for providing Tools as a Service (TaaS). That project was aimed at developing and evaluating an infrastructure that can host and provision … Continue reading
D2D CRC Project on Reference Architecture for Defence Big Data Systems
Big Data systems (i.e., data-intensive applications) have become one of the key priority areas for all sorts of organizations (i.e., private or public). Big Data is usually characterized by huge amount of diverse set of data that cannot be easily … Continue reading
Reference Architecture for Cloud-Based Workspace of Tools
A few years ago, we started working on designing a cloud-based infrastructure for providing Engineering tools as services, an approach we called Tools as a Service (TaaS). We have made significant progress towards materialising the concept of developing an infrastructure … Continue reading
Keynote Talk at the Big Data & Cloud Computing Conference
It was a great pleasure to have an opportunity to attend the fourth edition of the Big Data and Cloud Computing Conference in Sydney at the beginning of December, 2014. I had had the privilege of listening to several great … Continue reading