Category Archives: Uncategorized

Design Space for Cyber Security Analytical Systems

Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. … Continue reading

Posted in Big Data, Cloud Computing, Connected Cities, Cyber Security, Data Exfiltration, Security, Security Analytics, Uncategorized | Leave a comment

Adaptive Architectures for Cyber Security Analytics Systems

It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics … Continue reading

Posted in Big Data, Cloud Computing, Cyber Security, Data Exfiltration, Security, Security Analytics, Security Orchestration, Uncategorized | Leave a comment

Building and Leveraging Design Spaces for Architecting Contemporary Software Systems

It was a great pleasure to visit the Secure Systems Group at the Aalto University of Finland. I was hosted by Professor N. Asokan, the leader of the group and a leading authority on different aspects of the security systems, … Continue reading

Posted in Architectural knowledge, Cyber Security, Design patterns, Design rationale, Internet of Everything, Internet of Things (IoTs), Knowledge Sharing, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Architecting for Continuous Delivery and Deployment

Continuous Software Engineering has been gaining signifiant momentum in terms of widespread adoption among large and small Software houses. This paradigm shift is based on the promise of early, frequent delivery and deployment of software features and continuous feedback on … Continue reading

Posted in Continuous Development, Continuous Software Engineering, DevOps, Evidence-Based Software Engineering, Human-Centric Software Engineering, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Our New Work on Self-Adaptive Security for large-scale Open Environments

We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, … Continue reading

Posted in Architectural knowledge, Cloud Computing, Cyber Security, Data Exfiltration, Design patterns, Design rationale, Security, Service Oriented Computing, Service-Oriented Architecture, Software Architecture, Software Engineering, Uncategorized | Leave a comment

Search Engines for Web of Things (WoT)

Millions of objects are being connected to provide different services via the Web. This trend has led the paradigm of Web of Things (WoT), that can be searched and leveraged by uses (i.e., human or other systems/machines). One of the … Continue reading

Posted in Innovation, Internet of Everything, Internet of Things (IoTs), Software Architecture, Software Engineering, Uncategorized, Web of Things (WoTs) | Leave a comment

Modeling Security-Sensitive Architecture of Systems-of-Systems

An increasing number of software systems are considered Software Intensive Systems of Systems (SiSoS), which consist of dozens of constituent systems. Systems are interconnected using private or public networks, which can be prime target for security attacks. Hence, securing SiSoS … Continue reading

Posted in Combat Systems, Cyber Security, Data Exfiltration, Defence Systems, Internet of Everything, Internet of Things (IoTs), Microgrid, Model Driven Engineering (MDE), Security, Service Oriented Computing, Smart Campus, Smart Cities, Smart Grid, Submarine Systems, Uncategorized | Leave a comment