15 research outputs found
Recommended from our members
Exploring the Relationship between Architecture Coupling and Software Vulnerabilities: A Google Chrome Case
Employing software metrics, such as size and complexity, for predicting defects has been given a lot of attention over the years and proven very useful. However, the few studies looking at software architecture and vulnerabilities are limited in scope and findings. We explore the relationship between software vulnerabilities and component metrics (like code churn and cyclomatic complexity), as well as architecture coupling metrics (direct, indirect, and cyclic coupling). Our case is based on the Google Chromium project, an open source project that has not been studied for this topic yet. Our findings show a strong relationship between vulnerabilities and both component level metrics and architecture coupling metrics. Unfortunately, the effects of different types of coupling are somewhat hard to distinguish
Architecting Out Software Intellectual Property Lock-In: A Method to Advance the Efficacy of BBP
Naval Postgraduate School Acquisition Research Progra
System dynamics modeling for pro-active intelligence
Final Report: Proactive Intelligence (PAINT)
CONTRACT FA8750-07-C-0101 ISSUED BY AFRL/IFKE CODE FA8750 6.
ADMINISTERED BY CODE N62879 USAF, AFMC AIR FORCE RESEARCH LABORATORY 26 ELECTRONIC PARKWAY
ROME NY 13441-4514The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and insurgencies, both independent and state-sponsored. In particular, certain threats (including emerging dual-use technologies) are difficult to detect using traditional intelligence means because: (a) indicators are difficult to discern and may give little warning time, (b) there is usually limited relevant data collection and integration capability, and (c) expertise is generally diverse and disconnected.
Over the course of 18 months from September 2007 to February 2009, an effort, led by researchers from MIT, was initiated to develop computational social science models to study and understand the dynamics of complex intelligence targets for nefarious technology activities (broadly defined as activities outside U.S. national interest). System dynamics models were developed because they offered great opportunities to (a) understand and represent determinants of nefarious technology development, (b) to identify aspects of critical pathways, such as resource management, towards the development of nefarious technologies, and (c) support a modeling based strategy for the identification of new sources of intelligence.
This report describes the “System Dynamics Modeling for Pro-Active Intelligence” effort and its two thrusts: (a) development of a comprehensive holistic system dynamics model to represent, understand, and differentiate nefarious and benign activities and (b) the development of a detailed system dynamics resource model that can be used as a component of a multi-method federation of models. In both cases, simulations were conducted to illustrate the effectiveness of these models in demonstrating system behavior and, on occasion, highlighting potentially counter-intuitive behaviors.CONTRACT FA8750-07-C-0101 ISSUED BY AFRL/IFKE CODE FA8750 6.
ADMINISTERED BY CODE N62879 USAF, AFMC AIR FORCE RESEARCH LABORATORY 26 ELECTRONIC PARKWAY
ROME NY 13441-451
System dynamics modeling for Pro-Active intelligence (PAINT)
The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and insurgencies, both independent and state-sponsored. In particular, certain threats (including emerging dual-use technologies) are difficult to detect using traditional intelligence means because: (a) indicators are difficult to discern and may give little warning time, (b) there is usually limited relevant data collection and integration capability, and (c) expertise is generally diverse and disconnected.
Over the course of 18 months from September 2007 to February 2009, an effort, led by researchers from MIT, was initiated to develop computational social science models to study and understand the dynamics of complex intelligence targets for nefarious technology activities (broadly defined as activities outside U.S. national interest). System dynamics models were developed because they offered great opportunities to (a) understand and represent determinants of nefarious technology development, (b) to identify aspects of critical pathways, such as resource management, towards the development of nefarious technologies, and (c) support a modeling based strategy for the identification of new sources of intelligence.
This report describes the “System Dynamics Modeling for Pro-Active Intelligence” effort and its two thrusts: (a) development of a comprehensive holistic system dynamics model to represent, understand, and differentiate nefarious and benign activities and (b) the development of a detailed system dynamics resource model that can be used as a component of a multi-method federation of models. In both cases, simulations were conducted to illustrate the effectiveness of these models in demonstrating system behavior and, on occasion, highlighting potentially counter-intuitive behaviors.CONTRACT FA8750-07-C-0101 ISSUED BY AFRL/IFKE CODE FA8750 6. ADMINISTERED BY CODE N62879 USAF, AFMC
AIR FORCE RESEARCH LABORATORY 26 ELECTRONIC PARKWAY
ROME NY 13441-451