{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:37:21Z","timestamp":1765960641135,"version":"3.48.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T00:00:00Z","timestamp":1755302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T00:00:00Z","timestamp":1755302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005357","name":"Agent\u00fara na Podporu V\u00fdskumu a V\u00fdvoja","doi-asserted-by":"publisher","award":["APVV-23-0408"],"award-info":[{"award-number":["APVV-23-0408"]}],"id":[{"id":"10.13039\/501100005357","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Slovak Technical University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Software developers who solve recurring problems employ similar practices, which are documented and reused as patterns. Organizational patterns can fix organizational issues. Security patterns can be used to implement security measures into software or an organization. Expected solutions to complex problems of establishing security in the organization can be embodied in pattern sequences. Sequences of patterns that are expected to be used in practice cannot be established by applying stochastic processes, because multiple sequences may have the same probability of use. The symmetry of the relationship between patterns can be calculated using stochastic processes, and these symmetries can be used to distinguish pattern sequences that are truly expected to be used. This article presents two methods of establishing pattern sequences using stochastic processes. Both methods, based on stochastic trees and Bayesian networks, can be used to establish pattern sequences that are expected and unexpected in practice. The method that combines stochastic trees and symmetry of relationships between patterns can be used to establish sequences of conditionally independent patterns. The method that combines Bayesian networks and symmetry of relationships between patterns can be used to establish sequences of conditionally dependent patterns in multiple pattern languages or catalogs without constructing multiple stochastic trees. We used these methods to establish 19 sequences of organizational and security patterns. We show how expected sequences of organizational and security patterns can establish security in an organization. These two methods can also be used to establish expected sequences of patterns for engineering software for the cloud.<\/jats:p>","DOI":"10.1007\/s13278-025-01510-2","type":"journal-article","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T16:36:09Z","timestamp":1755362169000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Establishing pattern sequences using stochastic processes with an application to organizational patterns"],"prefix":"10.1007","volume":"15","author":[{"given":"Viktor","family":"Matovi\u010d","sequence":"first","affiliation":[]},{"given":"Valentino","family":"Vrani\u0107","sequence":"additional","affiliation":[]},{"given":"Waheedullah","family":"Sulaiman Khail","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Harrison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,16]]},"reference":[{"key":"1510_CR1","volume-title":"The process of creating life: nature of order, book 2: an essay on the art of building and the nature of the universe","author":"C Alexander","year":"2002","unstructured":"Alexander C (2002) The process of creating life: nature of order, book 2: an essay on the art of building and the nature of the universe. Center for Enviromental Structure"},{"key":"1510_CR2","volume-title":"A pattern language: towns, buildings, construction","author":"C Alexander","year":"1977","unstructured":"Alexander C, Ishikawa S, Silverstein M (1977) A pattern language: towns, buildings, construction. Oxford University Press, Oxford"},{"key":"1510_CR3","volume-title":"Bayesian reasoning and machine learning","author":"D Barber","year":"2011","unstructured":"Barber D (2011) Bayesian reasoning and machine learning, 04 edn. Cambridge University Press, Cambridge (in press)","edition":"04"},{"key":"1510_CR4","volume-title":"Pattern oriented software architecture: on patterns and pattern languages","author":"F Buschmann","year":"2007","unstructured":"Buschmann F, Henney K, Schmidt DC (2007) Pattern oriented software architecture: on patterns and pattern languages. Wiley, Hoboken"},{"key":"1510_CR5","doi-asserted-by":"crossref","unstructured":"Coplien J, Zhao L (2000) Symmetry breaking in software patterns. In: Proceedings of the second international symposium on generative and component-based software engineering, GCSE 2000, Revised Papers. Springer, Erfurt, Germany","DOI":"10.1007\/3-540-44815-2_4"},{"key":"1510_CR6","volume-title":"Organizational patterns of agile software development","author":"JO Coplien","year":"2004","unstructured":"Coplien JO, Harrison NB (2004) Organizational patterns of agile software development. Prentice-Hall, Upper Saddle River"},{"volume-title":"Pattern languages of program design","year":"1995","key":"1510_CR7","unstructured":"Coplien JO, Schmidt DC (eds) (1995) Pattern languages of program design. ACM Press, New York"},{"key":"1510_CR8","unstructured":"Cordeiro A, Vasconcelos A, Correia M (2022) A catalog of security patterns. In: Proceedings of 29th Conference on Pattern Languages of Programs Online, PLoP 2022. ACM"},{"key":"1510_CR9","unstructured":"Falkenthal M, Breitenb\u00fccher U, Leymann F (2018) The nature of pattern languages"},{"key":"1510_CR10","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Erich Gamma","year":"1994","unstructured":"Gamma E, Helm R, Johnson R, and Vlissides J (1994) Design patterns: elements of reusable object-oriented software.\u00a0Addison-Wesley Longman Publishing Co., Inc., USA."},{"key":"1510_CR11","unstructured":"Greene SI (2003) Tool-based decision support for pattern assisted development. Workshop at CHI 2003, Fort Lauderdale, Florida, USA, Perspectives on HCI Patterns: Concepts and Tools"},{"key":"1510_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1177\/0272989X9201200302","volume":"12","author":"G Hazen","year":"1992","unstructured":"Hazen G (1992) Stochastic trees: a new technique for temporal medical decision modeling. Med Decis Mak 12:163\u201378","journal-title":"Med Decis Mak"},{"key":"1510_CR13","volume-title":"Software requirements & specifications: a lexicon of practice, principles and prejudices","author":"M Jackson","year":"1995","unstructured":"Jackson M (1995) Software requirements & specifications: a lexicon of practice, principles and prejudices. ACM Press, New York (cited in [4])"},{"key":"1510_CR14","volume-title":"Problem frames: analyzing and structuring software development problems","author":"M Jackson","year":"2001","unstructured":"Jackson M (2001) Problem frames: analyzing and structuring software development problems. Addison Wesley, Reading"},{"key":"1510_CR15","doi-asserted-by":"crossref","unstructured":"Janeiro, J., Barbosa, S.D.J., Springer, T., Schill, A. (2010). Improving the Search for User Interface Design Patterns through Typed Relationships. In: Forbrig, P., Patern\u00f3, F., Mark Pejtersen, A. (eds) Human-Computer Interaction. HCIS 2010. IFIP Advances in Information and Communication Technology, vol 332. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-15231-3_2","DOI":"10.1007\/978-3-642-15231-3_2"},{"key":"1510_CR16","doi-asserted-by":"crossref","unstructured":"Kaliyar RK (2020) A multi-layer bidirectional transformer encoder for pre-trained word embedding: a survey of bert. In: Proceedings of 2020 10th International Conference on Cloud Computing, Data Science \u2018I &\u2019 Engineering (Confluence). IEEE, Noida, India","DOI":"10.1109\/Confluence47617.2020.9058044"},{"key":"1510_CR17","unstructured":"Kodituwakku SR, Bertok P (2003) Pattern categories: a mathematical approach for organizing design patterns. In: Proceedings of 2002 Conference on Pattern Languages of Programs, CRPIT \u201902. Australian Computer Society, Inc., Victoria"},{"key":"1510_CR18","volume-title":"Probabilistic graphical models: principles and techniques\u2014adaptive computation and machine learning","author":"D Koller","year":"2009","unstructured":"Koller D, Friedman N (2009) Probabilistic graphical models: principles and techniques\u2014adaptive computation and machine learning. The MIT Press, Cambridge"},{"key":"1510_CR19","volume-title":"Doing Bayesian data analysis","author":"J Kruschke","year":"2015","unstructured":"Kruschke J (2015) Doing Bayesian data analysis, 2nd edn. Academic Press, Cambridge","edition":"2"},{"issue":"3","key":"1510_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JID-2005-9304","volume":"9","author":"Atsuto Kubo","year":"2005","unstructured":"Kubo A, Washizaki H, Takasu A, Fukazawa Y (2005) Extracting relations among embedded software design patterns. J Integr Design Process Sci 9:39\u201352. https:\/\/doi.org\/10.3233\/JID-2005-9304","journal-title":"Journal of Integrated Design & Process Science"},{"key":"1510_CR21","doi-asserted-by":"publisher","unstructured":"Matovi\u010d V, Vrani\u0107 V (2024) Establishing pattern sequences using stochastic processes with an application to security patterns. In: Proceedings of the 29th European conference on pattern languages of programs, EuroPLoP 2024. ACM, Kloster Irsee in Bavaria, Germany. https:\/\/doi.org\/10.1145\/3698322.3698357","DOI":"10.1145\/3698322.3698357"},{"key":"1510_CR22","doi-asserted-by":"publisher","first-page":"32443","DOI":"10.1109\/ACCESS.2025.3543319","volume":"13","author":"V Matovi\u010d","year":"2025","unstructured":"Matovi\u010d V, Vrani\u0107 V (2025) Establishing pattern sequences using stochastic trees and Bayesian belief networks with an application to security patterns. IEEE Access 13:32443\u201332457. https:\/\/doi.org\/10.1109\/ACCESS.2025.3543319","journal-title":"IEEE Access"},{"issue":"1","key":"1510_CR23","doi-asserted-by":"publisher","first-page":"1934959","DOI":"10.1080\/27658449.2021.1934959","volume":"8","author":"Michael Van Auken","year":"2021","unstructured":"Van Auken, R. M., & Kebschull, S. A. (2021). Type I error convergence of three hypothesis tests for small RxC contingency tables. RMS: Research in Mathematics & Statistics, 8(1). https:\/\/doi.org\/10.1080\/27658449.2021.1934959","journal-title":"RMS: Research in Mathematics & Statistics"},{"issue":"2","key":"1510_CR24","doi-asserted-by":"publisher","first-page":"143","DOI":"10.11613\/BM.2013.018","volume":"23","author":"ML McHugh","year":"2013","unstructured":"McHugh ML (2013) The chi-square test of independence. Biochemia Medica 23(2):143\u2013149. https:\/\/doi.org\/10.11613\/BM.2013.018","journal-title":"Biochemia Medica"},{"key":"1510_CR25","unstructured":"Noble J (1998) Classifying relationships between object-oriented design patterns. In: Proceedings of 1998 Australian Software Engineering Conference. IEEE, Adelaide, SA, Australia"},{"key":"1510_CR26","volume-title":"Symmetry in science: an introduction to the general theory","author":"J Rosen","year":"2019","unstructured":"Rosen J (2019) Symmetry in science: an introduction to the general theory. Springer, Berlin"},{"key":"1510_CR27","doi-asserted-by":"publisher","unstructured":"Seidel N (2017) Empirical evaluation methods for pattern languages: sketches, classification, and network analysis. In: Proceedings of the 22nd European Conference on Pattern Languages of Programs, EuroPLoP \u201917. ACM, Kloster Irsee in Bavaria, Germany. https:\/\/doi.org\/10.1145\/3147704.3147719","DOI":"10.1145\/3147704.3147719"},{"issue":"6","key":"1510_CR28","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TSE.2021.3052177","volume":"48","author":"TB Sousa","year":"2022","unstructured":"Sousa TB, Ferreira HS, Correia FF (2022) A survey on the adoption of patterns for engineering software for the cloud. IEEE Trans Softw Eng 48(6):2128\u20132140","journal-title":"IEEE Trans Softw Eng"},{"key":"1510_CR29","volume-title":"On non-graphical description of models of conditional independence structure","author":"M Studen\u00fd","year":"2001","unstructured":"Studen\u00fd M (2001) On non-graphical description of models of conditional independence structure. Academic Press, Cambridge"},{"key":"1510_CR30","doi-asserted-by":"crossref","unstructured":"Sulaiman\u00a0Khail W, Vrani\u0107 V (2019) Reflecting pattern relationships in a pattern format. In: Proceedings of 24th European Conference on Pattern Languages of Programs, EuroPLoP 2019. ACM, Irsee, Germany","DOI":"10.1145\/3361149.3361180"},{"key":"1510_CR31","unstructured":"Penn State (2023). STAT 415: Introduction to mathematical statistics. Maximum likelihood estimation. https:\/\/online.stat.psu.edu\/stat415\/lesson\/1\/1.2"},{"key":"1510_CR32","unstructured":"Vaishnavi V, Kuechler B (2004\u20132017) Design science research in information systems. http:\/\/www.desrist.org\/design-research-in-information-systems\/"},{"key":"1510_CR33","volume-title":"Design science research in information systems","author":"VK Vaishnavi","year":"2015","unstructured":"Vaishnavi VK, Vaishnavi VK, Kuechler W (2015) Design science research in information systems. CRC Press, Boca Raton"},{"key":"1510_CR34","doi-asserted-by":"crossref","unstructured":"Vrani\u0107 V, Vrani\u0107 A, Sulaiman\u00a0Khail W (2020) Growing organizations with patterns: lessons from drama. In: Proceedings of the 25th European Conference on Pattern Languages of Programs, EuroPLoP 2020 Online. ACM, Virtual Event","DOI":"10.1145\/3424771.3424903"},{"key":"1510_CR35","doi-asserted-by":"crossref","unstructured":"Waseeb S, Sulaiman Khail W, Gul Wahaj H, and Vrani\u0107 V (2020) Extracting relations between organizational patterns using association mining. In: Proceedings of European Conference on Pattern Languages of Programs 2020, EuroPLoP 2020. ACM, Virtual Event, Germany","DOI":"10.1145\/3424771.3424817"},{"key":"1510_CR36","doi-asserted-by":"publisher","unstructured":"Hironori Washizaki, Masashi Kadoya, Yoshiaki Fukazawa, and Takeshi Kawamura. 2014. Network Analysis for Software Patterns Including Organizational Patterns in Portland Pattern Repository. In: Proceedings of the 2014 Agile Conference (AGILE '14). IEEE Computer Society, USA, 66\u201367. https:\/\/doi.org\/10.1109\/AGILE.2014.12.","DOI":"10.1109\/AGILE.2014.12"},{"key":"1510_CR37","doi-asserted-by":"publisher","unstructured":"Zhang J, Yue H, Wu X and Chen W, A brief review of Bayesian belief network. 2019 Chinese Control And Decision Conference (CCDC), Nanchang, China, 2019, pp. 3910\u20133914. https:\/\/doi.org\/10.1109\/CCDC.2019.8832649.","DOI":"10.1109\/CCDC.2019.8832649"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-025-01510-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-025-01510-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-025-01510-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:26:42Z","timestamp":1765960002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-025-01510-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,16]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1510"],"URL":"https:\/\/doi.org\/10.1007\/s13278-025-01510-2","relation":{},"ISSN":["1869-5469"],"issn-type":[{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2025,8,16]]},"assertion":[{"value":"10 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"88"}}