Collection
SI - System Software and Network Evolution, Applications, and Visualization
- Submission status
- Closed
Modern software systems and apps significantly affect all aspects of our society, as they are essential for a wide range of economic, social, and educational events. Indeed, a large portion of modern software operates on web browsers and smartphones, and Internet of Things (IoT) systems are becoming more common. The development and upkeep of software systems involve many complex processes that span long periods of time and may involve many software engineers from various locations and countries. These complex processes are cyclical and follow the principles of software evolution: Software changes depend on the current state of the software project, which is the accumulation of previous changes made by many software engineers. Several tools, such as logs, communication systems, and defect-tracking systems, maintain records with dates, comments, changes made to software elements, and information about the accompanying programmers in this regard.
Software development and upkeep typically take several years, resulting in thousands, if not millions, of lines of source code, hundreds of software components, and thousands of commits, variables, constants, programming structures, methods, and intricate relationships between software items. As a result, ensuring the correctness and integrity of such systems/applications is critical. Combined with ever-shorter production cycles, their complexity and characteristics necessitate novel testing methods. A variety of exciting research directions are emerging, ranging from the automated generation of test suites using, for example, search-based strategies to the use of artificial intelligence (AI), deep learning (DL), and machine learning (ML) to improve the effectiveness of testing frameworks and tools. Furthermore, while many cutting-edge contemporary applications include AI-, DL-, and ML-based features, quality assurance of these complex, intelligent components is still in its early stages.
This special issue aims to highlight advanced findings and new trends both in academia and industry regarding the reliability and security of software systems. These results will investigate how emerging applications and techniques can be used to model and assess software systems and network performance.
This special issue aims to highlight advanced findings and new trends both in academia and industry regarding the reliability and security of software systems. These results will investigate how emerging applications and techniques can be used to model and assess software systems and network performance.
Potential topics include but are not limited to the following:
• Software defined network (SDN) applications
• Techniques to monitor the evolution of the quality of software (QoS) elements
• Internet of things (IoT) architectures, protocols, security, and privacy
• AI-based computational methods
• Machine learning for traffic engineering and network optimization
• Security threats and countermeasures for software
• Blockchain-based solutions for enhancing security and privacy
• Internet of Things systems
• Security threats and countermeasures for software
• Artificial Intelligence, deep learning, and machine learning applied to software testing
• Self-healing, self-protecting, and self-adaptive systems
• SDN-based solutions for managing and securing IoT networks
• Repairing and re-engineering for software systems
• Mining software repositories, software analytics and software visualization
• Software analysis, parsing and fact extraction
• Software tools for software analysis, evolution and maintenance
• Software evolution analysis, software fault localization
• Continuous software development and integration of software
• Federated Learning (FL), FL with non-IID data, federated transfer learning approaches, multi task FL, and distributed learning approaches
• Robotics and software system, robot localization and network management
• Computing technologies i.e., cloud, edge, fog, etc., high performance computing, parallel computing technologies
• Wireless communication and computing, data mining for IoT in mobile computing, MANETs
• Advances in big data and deep learning, network science for big data computing, big data analytics
• Healthcare customer relationship management (CRM) software, E-prescriptions software, medical diagnosis software
---
For all submissions, this Journal adheres to the standard Peer Review Policy, Process and Guidance as outlined by Springer under Editorial Policies in the lnformation for Journal Authors web page.
---
Submission Guidelines
Authors are encouraged to submit high-quality, original work that has neither appeared in, nor is under consideration by other journals. All papers must be prepared in accordance with the Journal Guidelines: https://www.springer.com/journal/11227. Submitted papers should present original, unpublished work, relevant to one of the topics of this special issue. All manuscripts will be subject to the Journal’s rigorous peer review policy, by at least two independent reviewers. This evaluation will cover the following aspects, but will not be limited to: relevance, significance of contribution to the field, technical quality, scholarship, and quality of presentation. It is the policy of the journal that no submission, or substantially overlapping submission, be published or be under review at another journal or conference at any time during the peer review process.
---
Author Resources
Springer provides a host of information about publishing in a Springer Journal on our Author Resources page, including Springer’s Peer Review Policy and Editorial Policies, FAQs, Tutorials along with Help and Support.
Other links that might be useful:
• read and publish agreements
All papers will undergo the standard, rigorous journal review process and be accepted only if well-suited to the topic of this special issue and meeting the scientific level of the journal. Final decisions on all papers are made by the Editor in Chief.
Editors
-
Juw Won Park
University of Louisville, USA
-
Chang Choi
Gachon University, Republic of Korea
Articles (18 in this collection)
-
-
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications
Authors (first, second and last of 4)
- Haifeng Yu
- Lei Cai
- Xin Su
- Content type: OriginalPaper
- Open Access
- Published: 23 December 2023
- Pages: 10469 - 10484
-
Framework design based on data-driven for evaluating the efficiency of group collaboration in scientific research teams
Authors
- ZhongGui Pei
- Content type: OriginalPaper
- Published: 20 December 2023
- Pages: 10148 - 10171
-
Ensemble learning method based on CNN for class imbalanced data
Authors
- Xin Zhong
- Nan Wang
- Content type: OriginalPaper
- Published: 19 December 2023
- Pages: 10090 - 10121
-
Machine learning-based defect prediction model using multilayer perceptron algorithm for escalating the reliability of the software
Authors (first, second and last of 7)
- Sapna Juneja
- Ali Nauman
- Yuning Tao
- Content type: OriginalPaper
- Published: 19 December 2023
- Pages: 10122 - 10147
-
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis
Authors (first, second and last of 8)
- Shahzadi Bano
- Weimei Zhi
- Nuha Alruwais
- Content type: OriginalPaper
- Published: 18 December 2023
- Pages: 9848 - 9869
-
Correlation-based advanced feature analysis for wireless sensor networks
Authors
- JongHyuk Kim
- Yong Moon
- Hoon Ko
- Content type: OriginalPaper
- Published: 15 December 2023
- Pages: 9812 - 9828
-
Revolutionizing software developmental processes by utilizing continuous software approaches
Authors (first, second and last of 7)
- Habib Ullah Khan
- Waseem Afsar
- Haya Mesfer Alshahrani
- Content type: OriginalPaper
- Published: 12 December 2023
- Pages: 9579 - 9608
-
Green urban logistics path planning design based on physical network system in the context of artificial intelligence
Authors
- Juanjuan Ren
- Siti Salwa Salleh
- Content type: OriginalPaper
- Published: 03 December 2023
- Pages: 9140 - 9161
-
Interoperability of heterogeneous Systems of Systems: from requirements to a reference architecture
Authors (first, second and last of 6)
- Mersedeh Sadeghi
- Alessio Carenini
- Andreas Vogelsang
- Content type: OriginalPaper
- Open Access
- Published: 02 December 2023
- Pages: 8954 - 8987
-
Simulation-based uprighting of a capsized ship in wave-induced environments
Authors (first, second and last of 8)
- Dewei Pan
- Zhijie Liu
- Zhen Min
- Content type: OriginalPaper
- Open Access
- Published: 02 December 2023
- Pages: 9054 - 9072
-
Hybrid booting with incremental hibernation for the baseboard management controllers
Authors
- Joonhyouk Jang
- Minho Park
- Jiman Hong
- Content type: OriginalPaper
- Published: 24 November 2023
- Pages: 8485 - 8504
-
A new decomposition transform method for solving nonlinear fractional logistic differential equation
Authors
- Ali Khalouta
- Content type: OriginalPaper
- Published: 14 November 2023
- Pages: 8179 - 8201
-
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters
Authors (first, second and last of 8)
- Ayesha Kanwal
- Kashif Javed
- Mohammad Shabaz
- Content type: OriginalPaper
- Published: 13 November 2023
- Pages: 8156 - 8178
-
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks
Authors (first, second and last of 10)
- Bakht Sher Ali
- Inam Ullah
- Habib Hamam
- Content type: OriginalPaper
- Published: 10 November 2023
- Pages: 7876 - 7905
-
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model
Authors (first, second and last of 5)
- Ali M. Al Shahrani
- Ali Rizwan
- Mohammad Shabaz
- Content type: OriginalPaper
- Published: 10 November 2023
- Pages: 7849 - 7875
-
ARdetector: android ransomware detection framework
Authors (first, second and last of 5)
- Dan Li
- Wenbo Shi
- Sokjoon Lee
- Content type: OriginalPaper
- Published: 08 November 2023
- Pages: 7557 - 7584
-
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
Authors (first, second and last of 6)
- Inam Ullah
- Asra Noor
- Nida Aslam
- Content type: OriginalPaper
- Published: 07 October 2023
- Pages: 5870 - 5899