Decomposition of monolith applications into microservices architectures: A systematic review

Y Abgaz, A McCarren, P Elger, D Solan… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Microservices architecture has gained significant traction, in part owing to its potential to
deliver scalable, robust, agile, and failure-resilient software products. Consequently, many …

Migration of monolithic systems to microservices: A systematic mapping study

AM Saucedo, G Rodríguez, FG Rocha… - Information and …, 2025 - Elsevier
Context: The popularity of microservices architecture has grown due to its ability to address
monolithic architecture issues, such as limited scalability, hard maintenance, and …

Combining static and dynamic analysis to decompose monolithic application into microservices

K Sellami, MA Saied, A Ouni… - … Conference on Service …, 2022 - Springer
In order to benefit from the advantages offered by the microservices architectural design,
many companies have started migrating their monolithic application to this newer design …

A Graph-Based Java Projects Representation for Antipatterns Detection

R Capuano, H Muccini - European Conference on Software Architecture, 2023 - Springer
The identification and resolution of antipatterns in legacy Java code is a crucial process that
can enhance the overall quality of software. However, detecting these antipatterns is often …

Microservice Decomposition Techniques: An Independent Tool Comparison

Y Wang, S Bornais, J Rubin - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
The microservice-based architecture-a SOA-inspired principle of dividing systems into
components that communicate with each other using language-agnostic APIs-has gained …

Evolution of Microservices Identification in Monolith Decomposition: A Systematic Review

I Oumoussa, R Saidi - IEEE Access, 2024 - ieeexplore.ieee.org
Modernizing monolithic systems through microservices architectures (MSAs) promises
significant benefits in terms of scalability, agility, and cloud adoption. However, this transition …

Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid

M Chaieb, MA Ghorab, MA Saied - arXiv preprint arXiv:2405.03620, 2024 - arxiv.org
As cyber threats and malware attacks increasingly alarm both individuals and businesses,
the urgency for proactive malware countermeasures intensifies. This has driven a rising …

Development of a method for solving the problem of it product configuration analysis

M Ievlanov, N Vasiltcova, O Neumyvakina… - … -European Journal of …, 2022 - papers.ssrn.com
DEVELOPMENT OF A METHOD FOR SOLVING THE PROBLEM OF IT PRODUCT
CONFIGURATION ANALYSIS Page 1 Eastern-European Journal of Enterprise Technologies ISSN …

GTMicro—microservice identification approach based on deep NLP transformer model for greenfield developments

D Bajaj, U Bharti, I Gupta, P Gupta, A Yadav - International Journal of …, 2024 - Springer
Microservice architecture (MSA) has become a new style to modernize monolithic systems.
MSA comprises small, independent, and autonomous services that communicate using …

Detecting Continuous Integration Skip: A Reinforcement Learning-based Approach

H Mhalla, MA Saied - arXiv preprint arXiv:2405.09657, 2024 - arxiv.org
The software industry is experiencing a surge in the adoption of Continuous Integration (CI)
practices, both in commercial and open-source environments. CI practices facilitate the …