Proceedings of 6th International Conference in Software Engineering for Defence Applications : SEDA 2018 /: SEDA 2018. ([2020])
- Record Type:
- Book
- Title:
- Proceedings of 6th International Conference in Software Engineering for Defence Applications : SEDA 2018 /: SEDA 2018. ([2020])
- Main Title:
- Proceedings of 6th International Conference in Software Engineering for Defence Applications : SEDA 2018
- Other Titles:
- SEDA 2018
- Further Information:
- Note: Editors, Paolo Ciancarini, Manuel Mazzara, Angelo Messina, Alberto Sillitti, and Giancarlo Succi.
- Editors:
- Ciancarini, Paolo, 1959-
Mazzara, Manuel
Messina, Angelo
Sillitti, Alberto
Succi, Giancarlo, 1964- - Other Names:
- International Conference in Software Engineering for Defence Applications, 6th
- Contents:
- Intro; Preface; Acknowledgements; Organization; Programme Committee; Additional Reviewers; Contents; Bi-lingual Intent Classification of Twitter Posts: A Roadmap; Abstract; 1 Introduction; 1.1 Fake News Detection; 1.2 Stance Detection; 1.3 Intent Detection; 2 Related Work to Intent Classification; 2.1 Commercial Intent Classification; 2.2 Social Intent Classification; 3 Problem Definition; 3.1 Proposed Methodology; 4 Conclusion; References; Evolving Diverse Cellular Automata Based Level Maps; 1 Introduction; 2 Background; 2.1 Evolutionary Algorithms; 2.2 Cellular Automata 3 Experimental Design3.1 The Quality Measure; 4 Experimental Results; 5 Discussion; 5.1 The Cellular Automata Rule Space; 5.2 Extensions of the Work; References; Affordance Theory Applied to Agile Development: A Case Study of LC2EVO; 1 Introduction; 2 Case Study: An Affordance Theory-Based Analysis of Work Cell Design During the Development of LC2EVO Software; 2.1 Land Command and Control EVOlution System (LC2EVO); 2.2 The Visualization of the Work Flow During LC2EVO Development; 2.3 Work Cell Design and Interpersonal Space; 3 Data Analysis; 4 Discussion and Implications of Research 3.1 Lookup Tables3.2 Tiles; 3.3 Control Structures; 4 Conclusions; References; When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices; 1 Introduction; 1.1 Contribution; 1.2 Paper Structure; 2 Security of Cheap and Ubiquitous IoT Devices: A Smartwatch Case Study; 2.1 Related Works; 2.2 The Typical Setting inIntro; Preface; Acknowledgements; Organization; Programme Committee; Additional Reviewers; Contents; Bi-lingual Intent Classification of Twitter Posts: A Roadmap; Abstract; 1 Introduction; 1.1 Fake News Detection; 1.2 Stance Detection; 1.3 Intent Detection; 2 Related Work to Intent Classification; 2.1 Commercial Intent Classification; 2.2 Social Intent Classification; 3 Problem Definition; 3.1 Proposed Methodology; 4 Conclusion; References; Evolving Diverse Cellular Automata Based Level Maps; 1 Introduction; 2 Background; 2.1 Evolutionary Algorithms; 2.2 Cellular Automata 3 Experimental Design3.1 The Quality Measure; 4 Experimental Results; 5 Discussion; 5.1 The Cellular Automata Rule Space; 5.2 Extensions of the Work; References; Affordance Theory Applied to Agile Development: A Case Study of LC2EVO; 1 Introduction; 2 Case Study: An Affordance Theory-Based Analysis of Work Cell Design During the Development of LC2EVO Software; 2.1 Land Command and Control EVOlution System (LC2EVO); 2.2 The Visualization of the Work Flow During LC2EVO Development; 2.3 Work Cell Design and Interpersonal Space; 3 Data Analysis; 4 Discussion and Implications of Research 3.1 Lookup Tables3.2 Tiles; 3.3 Control Structures; 4 Conclusions; References; When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices; 1 Introduction; 1.1 Contribution; 1.2 Paper Structure; 2 Security of Cheap and Ubiquitous IoT Devices: A Smartwatch Case Study; 2.1 Related Works; 2.2 The Typical Setting in Which Smartwatches Operate; 2.3 Rohs K88h Smartwatch Overview; 2.4 The Vulnerability; 2.5 Possible Solution; 3 Security of Cheap and Ubiquitous IoT Devices: An IP Camera Case Study; 3.1 Related Works; 3.2 System Overview; 3.3 Tools and Set-Up; 3.4 The Vulnerabilities 3.5 Possible Solutions4 Conclusions and Future Works; References; An Open-Source Software Metric Tool for Defect Prediction, Its Case Study and Lessons We Learned; 1 Introduction; 2 Description of SMD; 2.1 Extracting Code Metrics; 2.2 Extracting Process Metrics; 2.3 Comparison Datasets; 3 A Case Study; 3.1 Mean Similarity Score; 3.2 Results; 4 Discussion; 5 Related and Future Work; References; Community Targeted Phishing; 1 Introduction; 2 Natural Language Generation (NLG); 3 Aiming at Groups: Community Targeted Phishing (CTP); 3.1 Case Study: Scientific Community; 4 Advanced NLG … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.1
Software engineering -- Congresses
COMPUTERS / General
COMPUTERS / Software Development & Engineering / General
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030146870
3030146871 - Related ISBNs:
- 9783030146863
- Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed March 20, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.399903
- Ingest File:
- 02_434.xml