Common Vulnerabilities and Exposures (CVE) mining and prediction
With the continuous increase in reported Common Vulnerabilities and Exposures (CVEs), security teams are overwhelmed by vast amounts of data, which are often analyzed manually, leading to a slow and inefficient process. To address cybersecurity threats effectively, it...Software diagnosis with log files
This project aims to create an automated tool to identify software failures and isolate the faulty software components (e.g., classes and functions) that caused the failure without using code coverage. The core idea is to leverage the information in the system log...AppLearner: learn and predict the resource consumption patterns of your application
This project targets the problem of accurately estimating resource requirements for workloads running over Red Hat OpenShift Container Platform and adjusting these estimations during the course of application execution.