Steve Versteeg

According to our database1, Steve Versteeg authored at least 55 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Extracting Formats of Service Messages with Varying Payloads.
ACM Trans. Internet Techn., 2022

2021
R-gram: Inferring message formats of service protocols with relative positional n-grams.
J. Netw. Comput. Appl., 2021

SpecMiner: Heuristic-based mining of service behavioral models from interaction traces.
Future Gener. Comput. Syst., 2021

2020
A positional keyword-based approach to inferring fine-grained message formats.
Future Gener. Comput. Syst., 2020

Heuristic-based Mining of Service Behavioral Models from Interaction Traces.
CoRR, 2020

2019
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages.
IEEE Access, 2019

2018
Mining accurate message formats for service APIs.
Proceedings of the 25th International Conference on Software Analysis, 2018

GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

2017
On the effectiveness of isolation-based anomaly detection in cloud data centers.
Concurr. Comput. Pract. Exp., 2017

A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems.
Comput. J., 2017

Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges.
Proceedings of the 3rd IEEE/ACM International Workshop on Rapid Continuous Software Engineering, 2017

2016
Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study.
CoRR, 2016

Opaque service virtualisation: a practical tool for emulating endpoint systems.
Proceedings of the 38th International Conference on Software Engineering, 2016

Enhanced playback of automated service emulation models using entropy analysis.
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016

Enterprise software service emulation: constructing large-scale testbeds.
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016

2015
Interaction Traces Mining for Efficient System Responses Generation.
ACM SIGSOFT Softw. Eng. Notes, 2015

Languages for Mobile Agents.
CoRR, 2015

From Network Traces to System Responses: Opaquely Emulating Software Services.
CoRR, 2015

Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Generalized Suffix Tree Based Multiple Sequence Alignment for Service Virtualization.
Proceedings of the 24th Australasian Software Engineering Conference, 2015

2014
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems.
IEEE Trans. Software Eng., 2014

SLA-Based Resource Provisioning for Hosted Software-as-a-Service Applications in Cloud Computing Environments.
IEEE Trans. Serv. Comput., 2014

Efficient Graph Based Approach to Large Scale Role Engineering.
Trans. Data Priv., 2014

2013
Classification of malware based on integrated static and dynamic features.
J. Netw. Comput. Appl., 2013

A framework for ranking of cloud computing services.
Future Gener. Comput. Syst., 2013

Generating service models by trace subsequence substitution.
Proceedings of the 9th international ACM SIGSOFT conference on Quality of Software Architectures, 2013

Predicting bug-fixing time: an empirical study of commercial software projects.
Proceedings of the 35th International Conference on Software Engineering, 2013

Automated SLA Negotiation Framework for Cloud Computing.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

A Business Protocol Unit Testing Framework for Web Service Composition.
Proceedings of the Advanced Information Systems Engineering, 2013

2012
Probabilistic critical path identification for cost-effective monitoring of service-based web applications.
Proceedings of the 21st World Wide Web Conference, 2012

Emulation of Cloud-Scale Environments for Scalability Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

A virtual deployment testing environment for enterprise software systems.
Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures, 2012

Quokka: visualising interactions of enterprise software environment emulators.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Probabilistic Critical Path Identification for Cost-Effective Monitoring of Service-Based Systems.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
SMICloud: A Framework for Comparing and Ranking Cloud Services.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

Run-time management and optimization of web service monitoring systems.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

Idea: A Reference Platform for Systematic Information Security Management Tool Support.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Protecting data in multi-stakeholder web service system.
Proceedings of the 19th International Conference on World Wide Web, 2010

Propagation of Data Protection Requirements in Multi-stakeholder Web Services Systems.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010

Differentiating malware from cleanware using behavioural analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Reac2o: a runtime for enterprise system models.
Proceedings of the ASE 2010, 2010

A Case Study on Optimizing Web Service Monitoring Configurations.
Proceedings of the Service-Oriented Computing, 2010

Optimizing the Configuration of Web Service Monitors.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Graph based strategies to role engineering.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Modelling Enterprise System Protocols and Trace Conformance.
Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), 2010

Assessing the Performance Impact of Service Monitoring.
Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), 2010

Pattern Recognition Techniques for the Classification of Malware Packers.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Scalable Emulation of Enterprise Systems.
Proceedings of the 20th Australian Software Engineering Conference (ASWEC 2009), 2009

RoleVAT: Visual Assessment of Practical Need for Role Based Access Control.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Function length as a tool for malware classification.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

A Conceptual Framework for Unified and Comprehensive SOA Management.
Proceedings of the Service-Oriented Computing - ICSOC 2008 Workshops, 2008

2001
Getting the Job Done in a Hostile Environment.
Proceedings of the AI 2001: Advances in Artificial Intelligence, 2001


  Loading...