{"componentChunkName":"component---src-templates-category-template-category-template-js","path":"/category/research-topic","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Tools and Techniques for Secure-by-Design DLT System","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 4, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"tools-and-techniques-for-secure-by-design-dlt-system","authorId":"owen-christ","dateSlug":"2020-07-04"},"excerpt":"Tools and Techniques for Secure-by-Design DLT System The third area of research concerns with techniques and tools for facilitating secure…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Socio-technical factors in secure software engineering methodologies and practices","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"socio-technical-factors-in-secure-software-engineering-methodologies-and-practices","authorId":"owen-christ","dateSlug":"2020-07-01T15:01:00.000Z"},"excerpt":"Socio-technical factors in secure software engineering methodologies and practices Software development is a highly cognitive process…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security of Machine Learning Models","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-of-machine-learning-models","authorId":"owen-christ","dateSlug":"2020-07-01T15:01:00.000Z"},"excerpt":"Security of Machine Learning Models With the immense amount of data produced every data, manual data analyse has become an impossible task…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Secure Mobile Health Application Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"secure-mobile-health-application-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Secure Mobile Health Application Engineering Smartphone ownership has surpassed three billion, and it is expected to increase by several…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security, Architecture and Platforms for Distributed Autonomous Systems","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-architecture-and-platforms-for-distributed-autonomous-systems","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Security, Architecture and Platforms for Distributed Autonomous Systems In this area of research, we devise and implement (i) security…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security Orchestration and Automation","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-orchestration-and-automation","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Security Orchestration and Automation At CREST researchers are leveraging existing software engineering, analytical reasoning, natural…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Mining Open-source Repositories for Predictive Security Analytics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"mining-open-source-repositories-for-predictive-security-analytics","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Mining Open-source Repositories for Predictive Security Analytics Security is an integral requirement and concern when developing a software…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Real-time Big Data Analytics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEE/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3ygD/8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQABBQJf/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGBABAAMBAAAAAAAAAAAAAAAAAQARIEH/2gAIAQEAAT8hg3xM/wD/2gAMAwEAAgADAAAAEAAP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGhABAAEFAAAAAAAAAAAAAAAAAREAICExQf/aAAgBAQABPxBwamlSMTrFv//Z","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"real-time-big-data-analytics","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Real-time Big Data Analytics The volume, velocity, and variety of digital data is increasing day by day. It is expected that by 2020, the…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Cyber Common Operating Pictures (CCOP)","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEE/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3ygD/8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQABBQJf/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGBABAAMBAAAAAAAAAAAAAAAAAQARIEH/2gAIAQEAAT8hg3xM/wD/2gAMAwEAAgADAAAAEAAP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGhABAAEFAAAAAAAAAAAAAAAAAREAICExQf/aAAgBAQABPxBwamlSMTrFv//Z","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"cyber-common-operating-pictures-ccop","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Pictures (CCOP) Cyber security threats reside in various parts of an organisation. The lack of tools to provide a…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Automated Container Security","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"automated-container-security","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Automated Container Security Container Technologies is considered as one of the most uprising technologies in the computing paradigm. The…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Techniques and Frameworks for DLT System Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAEE/8QAFAEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEAMQAAAB3ygD/8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQABBQJf/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPwE//8QAFBABAAAAAAAAAAAAAAAAAAAAIP/aAAgBAQAGPwJf/8QAGBABAAMBAAAAAAAAAAAAAAAAAQARIEH/2gAIAQEAAT8hg3xM/wD/2gAMAwEAAgADAAAAEAAP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGhABAAEFAAAAAAAAAAAAAAAAAREAICExQf/aAAgBAQABPxBwamlSMTrFv//Z","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"techniques-and-frameworks-for-dlt-system-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Techniques and Frameworks for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluating…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Tools and Automation Support for DLT System Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"tools-and-automation-support-for-dlt-system-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Tools and Automation Support for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluation of…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"CCOP Dashboard","author":{"name":"Nguyen Khoi Tran","image":{"childImageSharp":{"fixed":{"base64":"data:image/png;base64,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","width":32,"height":32,"src":"/static/5e71ca9a49d0d0118050abee263f3a14/32341/nguyen.png","srcSet":"/static/5e71ca9a49d0d0118050abee263f3a14/32341/nguyen.png 1x,\n/static/5e71ca9a49d0d0118050abee263f3a14/d6ed2/nguyen.png 1.5x,\n/static/5e71ca9a49d0d0118050abee263f3a14/971ae/nguyen.png 2x","srcWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/c899c/nguyen.webp","srcSetWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/c899c/nguyen.webp 1x,\n/static/5e71ca9a49d0d0118050abee263f3a14/fd5ae/nguyen.webp 1.5x,\n/static/5e71ca9a49d0d0118050abee263f3a14/52265/nguyen.webp 2x"}}}},"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"ccop-dashboard","authorId":"nguyen-khoi-tran","dateSlug":"2020-07-01"},"excerpt":"CCOP Dashboard CCOP Dashboard visualizes security metrics to provide executives a concise view of their organizations' security status. It…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"A paper accepted in Mining Software Repositories (MSR) 2020","author":{"name":"Nguyen Khoi Tran","image":{"childImageSharp":{"fixed":{"base64":"data:image/png;base64,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","width":32,"height":32,"src":"/static/5e71ca9a49d0d0118050abee263f3a14/32341/nguyen.png","srcSet":"/static/5e71ca9a49d0d0118050abee263f3a14/32341/nguyen.png 1x,\n/static/5e71ca9a49d0d0118050abee263f3a14/d6ed2/nguyen.png 1.5x,\n/static/5e71ca9a49d0d0118050abee263f3a14/971ae/nguyen.png 2x","srcWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/c899c/nguyen.webp","srcSetWebp":"/static/5e71ca9a49d0d0118050abee263f3a14/c899c/nguyen.webp 1x,\n/static/5e71ca9a49d0d0118050abee263f3a14/fd5ae/nguyen.webp 1.5x,\n/static/5e71ca9a49d0d0118050abee263f3a14/52265/nguyen.webp 2x"}}}},"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"March 10, 2020","featured_image":null},"fields":{"slug":"a-paper-accepted-in-mining-software-repositories-msr-2020","authorId":"nguyen-khoi-tran","dateSlug":"2020-03-10"},"excerpt":"We are delighted to announce that our paper PUMiner: Mining security posts from Q&A websites using PU learning has been accepted for…"}}]}},"pageContext":{"category":"research topic","breadcrumb":{"location":"/category/research-topic","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/category","crumbLabel":"category"},{"pathname":"/category/research-topic","crumbLabel":"research-topic"}]}}}}