Subject
Hardware and Architecture,Information Systems,Software
Reference62 articles.
1. Analyzing security architectures;Abi-Antoun,2010
2. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security, ASE ’07;Abi-Antoun,2007
3. Abukwaik, H., Burger, A., Andam, B.K., Berger, T., 2018. Semi-automated feature traceability with embedded annotations. In: 2018 IEEE International Conference on Software Maintenance and Evolution. ICSME, pp. 529–533. http://dx.doi.org/10.1109/ICSME.2018.00049.
4. Alshuqayran, N., Ali, N., Evans, R., 2018. Towards micro service architecture recovery: An empirical study. In: 2018 IEEE International Conference on Software Architecture. ICSA, pp. 47–4709. http://dx.doi.org/10.1109/ICSA.2018.00014.
5. Florida: Feature location dashboard for extracting and visualizing feature traces;Andam,2017
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Migration of Monolithic to Microservices With an Extraction Design Pattern in Single Sign on (SSO) Module Using Graph Neural Network (GNN);2024 International Seminar on Intelligent Technology and Its Applications (ISITIA);2024-07-10
2. Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems;Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems;2024-04-15
3. CATMA: Conformance Analysis Tool For Microservice Applications;Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings;2024-04-14
4. How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment;2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER);2024-03-12
5. Smelling Homemade Crypto Code in Microservices, with KubeHound;Lecture Notes in Computer Science;2024