{"title":"Cyber Security Education and Law","authors":"A. Wilk","doi":"10.1109/SWSTE.2016.21","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.21","url":null,"abstract":"The Cyberspace presents enormous challenges to computer professionals. In addition to enhancing education in security, reliability, and privacy, it is important for students to have more understanding of ethics, law, policy, regulation, and responsible software development. This paper suggests the necessity of a course Law for Computer Professionals and a relevant curriculum that includes: legal aspects, ethical aspects, and professional responsibility. Student legal awareness of Privacy and Intellectual Property is very important because it affects every computer professional, and also brings one into contact with moral, philosophy and ethical issues. Curricular guidelines by the IEEE and ACM are addressed. Various study topics, for instance, on privacy and on patents, are demonstrated.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Computer Programming Competition for Cyber Education","authors":"Oded Margalit","doi":"10.1109/SWSTE.2016.22","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.22","url":null,"abstract":"Contests are one of the best ways to teach. It serves as a gamification of the learning process. In the cyber security field there are two additional unique obstacles: the first is that we don't want to teach criminal activities and the second is that we actually don't really know what the future cyber world will actually need. Both this problems are solved by asking to solve hard out-of-the-box computer programming tasks that are correlated to the current cyber security techniques.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing an International Standard for Manufacturing System Lifecycle Management Using Object-Process Methodology","authors":"Rea Lavi, D. Dori, Y. Dori","doi":"10.1109/SWSTE.2016.18","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.18","url":null,"abstract":"Object-Process Methodology (OPM) is a model-based systems engineering methodology which has been recognized as an ISO 19450:2015 standard for automation systems and integration. It is domain-independent and intended for conceptual modeling of systems of various kinds. We collaborated remotely with a team that had implemented this methodology for modeling their proposed international standard, which concerned manufacturing systems lifecycle management. The goal of this collaboration was to achieve a satisfactory level of text-model coherence and model quality for the proposed standard that comply with ISO 19450. Achieving this goal proved to be an ill-structured problem, without defined initial or final states and without a clear procedure for solving it. We compare three latter versions of the conceptual model using a quality assessment rubric that has been validated in previous studies. Utilizing OPM in this capacity enabled efficacious evaluation of model quality at every stage of authoring. The case described herein demonstrates how OPM can be utilized by interdisciplinary teams to tackle ill structured problems more effectively.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilevel Modeling and Reasoning with FOML","authors":"Mira Balaban, Igal Khitron, M. Kifer","doi":"10.1109/SWSTE.2016.17","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.17","url":null,"abstract":"Multilevel system modeling deals with the representation and implementation of relationships among types and among types and instances in software systems. It raises questions of interpretation and organization of types and instances in strict or interleaved layers. Reasoning over multilevel models requires a logic language that provides a uniform, extensible and flexible account for intra-type relationships, and type-instance relationships. FOML is a logic programming language that provides an expressive, executable formal basis for software models. It supports a wide variety of model-level activities, including reasoning about models, meta-modeling, and more. It is built as a semantic layer on top of PathLP, a compact logic programming language of guarded path expressions. In this paper we advocate the use of FOML as an underlying framework for the development and analysis of multilevel software modeling. We argue that FOML is suitable for multilevel modeling and for reasoning about such models. We show that FOML possesses major features needed for such tasks, including type-instance mixing in various organizational architectures, and demonstrate a sizable example using several approaches.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"83 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Reconstruction of Multi-stage Attacks","authors":"S. Rubinshtein, Rami Puzis","doi":"10.1109/SWSTE.2016.27","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.27","url":null,"abstract":"This paper present a lightweight modeling technique that is suitable for attack description and reconstruction. It allows reconstruction of steps taken by the attacker during each stage using predefined attack ontology and traces left by the attacker. Simplicity and comprehensiveness of the proposed models makes them readable and appropriate for inclusion in incidence reports and investigation. At the same time given a predefined ontology the proposed modeling technique can be used to enhance reconstruction of attacks from forensic data.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Preliminary Survey on Domain-Specific Languages for Machine Learning in Big Data","authors":"I. Portugal, P. Alencar, D. Cowan","doi":"10.1109/SWSTE.2016.23","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.23","url":null,"abstract":"The proliferation of data often called Big Data has created problems with traditional approaches to data capture, storage, analysis and visualization, thus opening up new areas of research. Machine Learning algorithms are one area that has been used in Big Data for analysis. However, because of the challenges Big Data imposes, these algorithms need to be adapted and optimized to specific applications. One important decision made by software engineers is the choice of the language that is used in the implementation of these algorithms. This literature survey identifies and describes domain-specific languages and frameworks used for Machine Learning in Big Data with the intention of assisting software engineers in making more informed choices and providing beginners with an overview of the main languages used in this domain. This is the first survey that aims at better understanding how domain-specific languages for Machine Learning are used as a tool for research in Big Data.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control Networks","authors":"Amir Menczel, Gera Weiss, Dror Fried","doi":"10.1109/SWSTE.2016.26","DOIUrl":"https://doi.org/10.1109/SWSTE.2016.26","url":null,"abstract":"We propose a mathematical model for wireless industrial control systems and analyze the engineering challenge of co-scheduling networking and control in this context. We demonstrate the use of the model using a small case study and explain how our modelling approach allows for self-configuring and self-adapting systems. The main theoretical contribution of the paper is a mathematical formulation of the computational problem of synthesizing a co-design of scheduling and control for wireless industrial control systems and a mathematical proof that this problem is computationally hard. We also identify relevant special network topologies for which the problem can be efficiently solved.","PeriodicalId":118525,"journal":{"name":"2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}