{"componentChunkName":"component---src-templates-blog-list-blog-list-js","path":"/blog/page/6","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Mining Open-source Repositories for Predictive Security Analytics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"mining-open-source-repositories-for-predictive-security-analytics","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Mining Open-source Repositories for Predictive Security Analytics Security is an integral requirement and concern when developing a software…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Real-time Big Data Analytics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEE/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3ygD/8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQABBQJf/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGBABAAMBAAAAAAAAAAAAAAAAAQARIEH/2gAIAQEAAT8hg3xM/wD/2gAMAwEAAgADAAAAEAAP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGhABAAEFAAAAAAAAAAAAAAAAAREAICExQf/aAAgBAQABPxBwamlSMTrFv//Z","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"real-time-big-data-analytics","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Real-time Big Data Analytics The volume, velocity, and variety of digital data is increasing day by day. It is expected that by 2020, the…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Cyber Common Operating Pictures (CCOP)","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"cyber-common-operating-pictures-ccop","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Pictures (CCOP) Cyber security threats reside in various parts of an organisation. The lack of tools to provide a…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Automated Container Security","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"automated-container-security","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Automated Container Security Container Technologies is considered as one of the most uprising technologies in the computing paradigm. The…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Techniques and Frameworks for DLT System Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"techniques-and-frameworks-for-dlt-system-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Techniques and Frameworks for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluating…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Tools and Automation Support for DLT System Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"tools-and-automation-support-for-dlt-system-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Tools and Automation Support for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluation of…"}}]}},"pageContext":{"limit":6,"skip":30,"currentPage":6,"numberOfPages":7,"breadcrumb":{"location":"/blog/page/6","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/blog","crumbLabel":"blog"},{"pathname":"/blog/page","crumbLabel":"page"},{"pathname":"/blog/page/6","crumbLabel":"6"}]}}}}