{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:33Z","timestamp":1742913513351,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688509"},{"type":"electronic","value":"9783030688516"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68851-6_30","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:04:02Z","timestamp":1612422242000},"page":"408-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Methodology to Automate the Security Patterns Selection"],"prefix":"10.1007","author":[{"given":"Khudema","family":"Zahra","sequence":"first","affiliation":[]},{"given":"Shahid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Humaira","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Muhammad Rafiq","family":"Mufti","sequence":"additional","affiliation":[]},{"given":"Dost Muhammad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Muhammad Khalid","family":"Sohail","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2018.10.049","volume":"75","author":"S Hussain","year":"2019","unstructured":"Hussain, S., Keung, J., Sohail, M.K., Khan, A.A., Ilahi, M.: Automated framework for classification and selection of software design patterns. Appl. Soft Comput. 75, 1\u201320 (2019). ISSN 1568-4946","journal-title":"Appl. Soft Comput."},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.asoc.2017.04.043","volume":"58","author":"S Hussain","year":"2017","unstructured":"Hussain, S., Keung, J., Khan, A.A.: Software design patterns classification and selection using text categorization approach. Appl. Soft Comput. 58, 225\u2013244 (2017). ISSN 1568-4946","journal-title":"Appl. Soft Comput."},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.asoc.2018.12.005","volume":"76","author":"C Singh","year":"2018","unstructured":"Singh, C., Bala, A.: A transform-based fast fuzzy C-means approach for high brain MRI segmentation accuracy. Appl. Soft Comput. 76, 156\u2013173 (2018)","journal-title":"Appl. Soft Comput."},{"key":"30_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-78849-2_35","volume-title":"Progress in WWW Research and Development","author":"EB Fernandez","year":"2008","unstructured":"Fernandez, E.B., Washizaki, H., Yoshioka, N., Kubo, A., Fukazawa, Y.: Classifying security patterns. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 342\u2013347. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78849-2_35"},{"key":"30_CR5","unstructured":"Dangler, J.Y.: Categorization of Security Design Patterns. Electronic Theses and Dissertations. Paper 1119 (2013)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Laverdiere, M.A., Mourad, A., Hanna, A., Debbabi, M.: Security design patterns: survey and evaluation conference. In: Proceedings: Canadian Conference on Electrical and Computer Engineering. IEEE, May 2006","DOI":"10.1109\/CCECE.2006.277727"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.jss.2011.08.031","volume":"85","author":"SMH Hasheminejad","year":"2012","unstructured":"Hasheminejad, S.M.H., Jalili, S.: Design patterns selection: an automatic two-phase method. J. Syst. Softw. 85, 408\u2013424 (2012)","journal-title":"J. Syst. Softw."},{"key":"30_CR8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.21248\/jlcl.20.2005.68","volume":"20","author":"A Hotho","year":"2005","unstructured":"Hotho, A., Nurnberger, A., Paab, G.: A brief survey of text mining. J. Comput. Linguist. Lang. Technol. 20, 19\u201362 (2005)","journal-title":"J. Comput. Linguist. Lang. Technol."},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"e0221780","DOI":"10.1371\/journal.pone.0221780","volume":"14","author":"S Hussain","year":"2019","unstructured":"Hussain, S., et al.: Mining version history to predict the class instability. PLoS ONE 14, e0221780 (2019)","journal-title":"PLoS ONE"},{"key":"30_CR10","volume-title":"Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems","author":"BP Douglass","year":"2002","unstructured":"Douglass, B.P.: Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. Addison-Wesley\/Longman Publishing Co., Inc., Boston (2002)"},{"key":"30_CR11","unstructured":"Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 6th edn. (2002)"},{"key":"30_CR12","unstructured":"Tichy, W.F.: A catalogue of general-Purpose software design patterns. In: Proceedings of Technology of Object-Oriented Languages and Systems, pp. 330\u2013339 (1997)"},{"issue":"2","key":"30_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10798-018-9448-1","volume":"29","author":"E Sung","year":"2018","unstructured":"Sung, E., Kelley, T.R.: Identifying design process patterns: a sequential analysis study of design thinking. Int. J. Technol. Des. Educ. 29(2), 283\u2013302 (2018). https:\/\/doi.org\/10.1007\/s10798-018-9448-1","journal-title":"Int. J. Technol. Des. Educ."},{"issue":"2","key":"30_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11334-019-00329-3","volume":"15","author":"AK Dwivedi","year":"2019","unstructured":"Dwivedi, A.K., Tirkey, A., Rath, S.K.: Applying learning-based methods for recognizing design patterns. Innovations Syst. Softw. Eng. 15(2), 87\u2013100 (2019). https:\/\/doi.org\/10.1007\/s11334-019-00329-3","journal-title":"Innovations Syst. Softw. Eng."},{"issue":"1","key":"30_CR15","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/s10664-018-9620-y","volume":"24","author":"E Klotins","year":"2018","unstructured":"Klotins, E., Unterkalmsteiner, M., Gorschek, T.: Software engineering in start-up companies: an analysis of 88 experience reports. Empir. Softw. Eng. 24(1), 68\u2013102 (2018). https:\/\/doi.org\/10.1007\/s10664-018-9620-y","journal-title":"Empir. Softw. Eng."},{"key":"30_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-981-10-8848-3_28","volume-title":"Software Engineering","author":"Shambhu Kr Jha","year":"2019","unstructured":"Jha, Shambhu Kr., Mishra, R.K.: Predicting and accessing security features into component-based software development: a critical survey. In: Hoda, M.N., Chauhan, N., Quadri, S.M.K., Srivastava, P.R. (eds.) Software Engineering. AISC, vol. 731, pp. 287\u2013294. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-8848-3_28"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.envsoft.2019.03.017","volume":"117","author":"J Peng","year":"2019","unstructured":"Peng, J., Zhao, S., Dong, J., Liu, Y., Meersmans, J., Li, H., Wu, J.: Applying ant colony algorithm to identify ecological security patterns in megacities. Environ. Model Softw. 117, 214\u2013222 (2019)","journal-title":"Environ. Model Softw."},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"36164","DOI":"10.1109\/ACCESS.2019.2903133","volume":"7","author":"M Asif","year":"2019","unstructured":"Asif, M., Ali, I., Malik, M.S.A., Chaudary, M.H., Tayyaba, S., Mahmood, M.T.: Annotation of software requirements specification (srs), extractions of nonfunctional requirements, and measurement of their tradeoff. IEEE Access 7, 36164\u201336176 (2019)","journal-title":"IEEE Access"},{"key":"30_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-18500-2_7","volume-title":"Information Security Education Across the Curriculum","author":"J van Niekerk","year":"2015","unstructured":"van Niekerk, J., Futcher, L.: The use of software design patterns to teach secure software design: an integrated approach. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2015. IAICT, vol. 453, pp. 75\u201383. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18500-2_7"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Hamdy, A., Elsayed, M.: Automatic recommendation of software design patterns: text retrieval approach. J. Softw. 13(4), 260\u2013268 (2018)","DOI":"10.17706\/jsw.13.4.260-268"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Hussain, S.: Threshold analysis of design metrics to detect design flaws. In: ACM Symposium on Applied Computing (SRC), pp. 4\u20138, April 2016","DOI":"10.1145\/2851613.2852013"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Hussain, S.: A methodology to predict the instable classes. In: 32nd ACM Symposium on Applied Computing (SAC), Morocco, April 2017","DOI":"10.1145\/3019612.3019927"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Nahar, N., Sakib, K.: ACDPR: a recommendation system for the creational design patterns using anti-patterns. In: Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (2016)","DOI":"10.1109\/SANER.2016.44"},{"key":"30_CR24","unstructured":"Suresh, S., Naidu, M., Kiran, S.A., Tathawade, P.: Design pattern recommendation system: a methodology, data model and algorithms. In: Proceedings of the International Conference on Computational Techniques and Artificial Intelligence (2011)"},{"key":"30_CR25","unstructured":"Smith, S., Plante, D.R.: Dynamically recommending design patterns. In: Proceedings of the 24th International Conference on Software Engineering and Knowledge Engineering (2012)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68851-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T18:18:44Z","timestamp":1671041924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68851-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688509","9783030688516"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68851-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}