Abstract
As patterns in cyberspace, cyberpatterns shed light on research on the development of cyber systems from a new angle. They can help us move from an improvised craft to an engineering discipline because they help to transfer knowledge about proven solutions in an understandable and reusable format. They allow innovative applications in cloud, cyber-physical and mobile systems, and novel methods of use with data patterns for observation and analysis of ‘big data’ problems. The ultimate aim of research on cyberpatterns is an overall framework for cyberpatterns integrating all the cyber domains to help develop a better-understood and effective cyberspace. However, there are many research questions in cyberpatterns that remain unanswered regarding both their conceptual foundation and practical use. This chapter concludes the book by exploring some of the most critical and important problems needing to be addressed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhu H. Cyberpatterns: a pattern oriented research methodology for studying cyberspace. In: Unifying design patterns with security and attack patterns. Springer; 2014.
Bayley I. Challenges for a formal framework for patterns. In: Cyberpatterns: unifying design patterns with security and attack patterns. Springer; 2014.
Mitre Corporation. Common attack pattern enumeration and classification (CAPEC). Mitre corporation. 2014. http://capec.mitre.org. Accessed 11 Jan 2014.
Taibi T. Formalising design patterns composition. IEE Proc Softw. 2006;153(3):126–53.
Zhu H, Bayley I. An algebra of design patterns. ACM Trans Softw Eng Methodol. 2013;22(3):1404–8.
Smith J. Elemental design patterns. UK: Addison-Wesley; 2012.
Zhu H. Design space-based pattern representation. In: Cyberpatterns: unifying design patterns with security and attack patterns. Springer; 2014.
Lano K. Design patterns: applications and open issues. In: Cyberpatterns: unifying design patterns with security and attack patterns. Springer; 2014.
Fowler M. Refactoring: improving the design of existing code. UK: Addison-Wesley; 1999.
Hafiz M. Security on demand. PhD dissertation. University of Illinois. 2011. http://munawarhafiz.com/research/phdthesis/Munawar-Dissertation.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Blackwell, C., Zhu, H. (2014). Future Directions for Research on Cyberpatterns. In: Blackwell, C., Zhu, H. (eds) Cyberpatterns. Springer, Cham. https://doi.org/10.1007/978-3-319-04447-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-04447-7_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04446-0
Online ISBN: 978-3-319-04447-7
eBook Packages: Computer ScienceComputer Science (R0)