default search action
Awais Rashid
Person information
- affiliation: University of Bristol, UK
- affiliation (former): The University of Lancaster, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j69]Lata Nautiyal, Awais Rashid:
A framework for mapping organisational workforce knowledge profile in cyber security. Comput. Secur. 145: 103925 (2024) - [j68]Zaina Dkaidek, Awais Rashid:
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study. IEEE Secur. Priv. 22(5): 88-95 (2024) - [j67]John Eidar Simensen, Coralie Esnoul, Eunkyoung Jee, Ali Babar, Triet Huynh Minh Le, Awais Rashid:
Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS/SVM - 2024). ACM SIGSOFT Softw. Eng. Notes 49(4): 18-21 (2024) - [j66]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross Anderson, Awais Rashid:
Threat models over space and time: A case study of end-to-end-encrypted messaging applications. Softw. Pract. Exp. 54(12): 2316-2335 (2024) - [c174]Karen Li, Anne Roudaut, Awais Rashid:
Conceptual Designs for Security interfaces in Industrial Control Systems. Conference on Designing Interactive Systems (Companion Volume) 2024 - [c173]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CCS 2024: 2726-2740 - [c172]Joseph Gardiner, Stanislav Abaimov, Jacob Williams, Feras Shahbi, Konstantinos Anastasakis, Partha Das Chowdhury, Winston Ellis, Maria Sameen, Emmanouil Samanis, Awais Rashid:
"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions. CPSIOTSEC@CCS 2024: 27-40 - [c171]Konstantinos Anastasakis, Awais Rashid:
Towards Linking Indicators of Compromise to Operational Resilience and Safety Requirements. CPSIOTSEC@CCS 2024: 104-110 - [c170]Stanislav Abaimov, Joseph Gardiner, Emmanouil Samanis, Jacob Williams, Marios Samanis, Feras Shahbi, Awais Rashid:
Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise. CPSS@AsiaCCS 2024: 98-106 - [c169]Sami Ullah, Awais Rashid:
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications. EuroS&P 2024: 381-397 - [c168]Karen Li, Kopo M. Ramokapane, Awais Rashid:
Usability Study of Security Features in Programmable Logic Controllers. EuroUSEC 2024: 200-219 - [c167]Partha Das Chowdhury, Mohammad Tahaei, Matthew Edwards, Claudia Peersman, Lata Nautiyal, Kopo Marvin Ramokapane, Awais Rashid:
Community Security Champions: Studying the Most Influential Users on Security Stack Exchange. SecDev 2024: 93-104 - [c166]Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid:
Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense. USENIX Security Symposium 2024 - [i31]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CoRR abs/2405.06371 (2024) - [i30]Lata Nautiyal, Awais Rashid:
A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security. CoRR abs/2406.03322 (2024) - [i29]Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid:
Assessing Effectiveness of Cyber Essentials Technical Controls. CoRR abs/2406.15210 (2024) - [i28]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Saltzer & Schroeder for 2030: Security engineering principles in a world of AI. CoRR abs/2407.05710 (2024) - 2023
- [j65]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the privacy of mental health apps. Empir. Softw. Eng. 28(1): 2 (2023) - [j64]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. IEEE Secur. Priv. 21(1): 49-57 (2023) - [j63]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [j62]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-21 (2023) - [j61]Kopo Marvin Ramokapane, Jose M. Such, Awais Rashid:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. ACM Trans. Priv. Secur. 26(1): 5:1-5:34 (2023) - [j60]Nikhil Patnaik, Andrew Carl Dwyer, Joseph Hallett, Awais Rashid:
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations. ACM Trans. Softw. Eng. Methodol. 32(3): 60:1-60:31 (2023) - [j59]Benjamin Shreeve, Catarina Gralha, Awais Rashid, João Araújo, Miguel Goulão:
Making Sense of the Unknown: How Managers Make Cyber Security Decisions. ACM Trans. Softw. Eng. Methodol. 32(4): 83:1-83:33 (2023) - [j58]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. IEEE Trans. Software Eng. 49(9): 4324-4348 (2023) - [c165]James Stevenson, Matthew Edwards, Awais Rashid:
Analysing The Activities Of Far-Right Extremists On The Parler Social Network. ASONAM 2023: 392-399 - [c164]Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid:
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. CHI 2023: 168:1-168:24 - [c163]Samuel Barnes-Thornton, Joseph Gardiner, Awais Rashid:
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming. CPSIOTSEC@CCS 2023: 67-73 - [c162]Feras Shahbi, Joseph Gardiner, Sridhar Adepu, Awais Rashid:
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts. EuroS&P Workshops 2023: 320-328 - [c161]Karen Li, Awais Rashid, Anne Roudaut:
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. EuroUSEC 2023: 205-217 - [c160]Kopo Marvin Ramokapane, Awais Rashid:
ExD: Explainable Deletion. NSPW 2023: 34-47 - [c159]Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. Security Protocols Workshop 2023: 211-219 - [i27]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - [i26]Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid:
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. CoRR abs/2301.06534 (2023) - [i25]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - [i24]Benjamin Shreeve, Joseph Gardiner, Joseph Hallett, David Humphries, Awais Rashid:
Decisions & Disruptions 2: Decide Harder. CoRR abs/2306.12168 (2023) - [i23]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. CoRR abs/2307.02332 (2023) - [i22]Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid:
Towards Equitable Privacy. CoRR abs/2308.00004 (2023) - [i21]Kopo M. Ramokapane, Awais Rashid:
ExD: Explainable Deletion. CoRR abs/2308.13326 (2023) - [i20]Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. CoRR abs/2308.14593 (2023) - 2022
- [j57]Ola Aleksandra Michalec, Sveta Milyaeva, Awais Rashid:
When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures? Big Data Soc. 9(1): 205395172211083 (2022) - [j56]Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. IEEE Secur. Priv. 20(1): 87-95 (2022) - [j55]Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, Jason I. Hong, Awais Rashid:
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks. Proc. Priv. Enhancing Technol. 2022(3): 33-56 (2022) - [j54]Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk van der Linden, John N. Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh:
The Case for Adaptive Security Interventions. ACM Trans. Softw. Eng. Methodol. 31(1): 9:1-9:52 (2022) - [j53]Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. IEEE Trans. Software Eng. 48(2): 364-376 (2022) - [j52]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. IEEE Trans. Software Eng. 48(5): 1515-1528 (2022) - [c158]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. ARES 2022: 28:1-28:12 - [c157]Kopo Marvin Ramokapane, Caroline Bird, Awais Rashid, Ruzanna Chitchyan:
Privacy Design Strategies for Home Energy Management Systems (HEMS). CHI 2022: 405:1-405:15 - [c156]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c155]Mohammad Tahaei, Julia Bernd, Awais Rashid:
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC 2022: 117-130 - [c154]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
Adaptive Cyber Security for Critical Infrastructure. ICCPS 2022: 304-305 - [c153]Awais Rashid:
Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. ICISSP 2022: 5 - [c152]Irum Rauf, Tamara Lopez, Helen Sharp, Marian Petre, Thein Tun, Mark Levine, John N. Towse, Dirk van der Linden, Awais Rashid, Bashar Nuseibeh:
Influences of developers' perspectives on their engagement with security in code. CHASE@ICSE 2022: 86-95 - [c151]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid:
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. NSPW 2022: 60-74 - [c150]Sharad Agarwal, Awais Rashid, Joseph Gardiner:
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming. CSET @ USENIX Security Symposium 2022: 1-9 - [i19]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development. CoRR abs/2201.09006 (2022) - [i18]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. CoRR abs/2202.01604 (2022) - [i17]Matthew Edwards, Emma J. Williams, Claudia Peersman, Awais Rashid:
Characterising Cybercriminals: A Review. CoRR abs/2202.07419 (2022) - [i16]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, Awais Rashid:
The Political Economy of Privacy Enhancing Technologies. CoRR abs/2202.08548 (2022) - [i15]Andrew C. Dwyer, Joseph Hallett, Claudia Peersman, Matthew Edwards, Brittany I. Davidson, Awais Rashid:
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces. CoRR abs/2203.08557 (2022) - [i14]Claudia Peersman, Emma J. Williams, Matthew Edwards, Awais Rashid:
Understanding motivations and characteristics of financially-motivated cybercriminals. CoRR abs/2203.08642 (2022) - [i13]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
Automatic User Profiling in Darknet Markets: a Scalability Study. CoRR abs/2203.13179 (2022) - [i12]Colin Topping, Ola Aleksandra Michalec, Awais Rashid:
Contrasting global approaches for identifying and managing cybersecurity risks in supply chains. CoRR abs/2208.02244 (2022) - [i11]Karen Li, Kopo M. Ramokapane, Awais Rashid:
"Yeah, it does have a...Windows '98 Vibe": Usability Study of Security Features in Programmable Logic Controllers. CoRR abs/2208.02500 (2022) - [i10]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges & Solutions. CoRR abs/2208.11898 (2022) - [i9]Partha Das Chowdhury, Mohammad Tahaei, Awais Rashid:
Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j. CoRR abs/2211.02341 (2022) - [i8]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices. CoRR abs/2211.08916 (2022) - [i7]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
A Survey of Relevant Text Mining Technology. CoRR abs/2211.15784 (2022) - 2021
- [j51]Colin Topping, Andrew Carl Dwyer, Ola Aleksandra Michalec, Barnaby Craggs, Awais Rashid:
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks. Comput. Secur. 108: 102324 (2021) - [c149]Danny Weyns, Tomás Bures, Radu Calinescu, Barnaby Craggs, John S. Fitzgerald, David Garlan, Bashar Nuseibeh, Liliana Pasquale, Awais Rashid, Ivan Ruchkin, Bradley R. Schmerl:
Six Software Engineering Principles for Smarter Cyber-Physical Systems. ACSOS-C 2021: 198-203 - [c148]Chao Chen, Claudia Peersman, Matthew Edwards, Ziauddin Ursani, Awais Rashid:
AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet. IEEE BigData 2021: 2516-2524 - [c147]Joseph Gardiner, Adam Eiffert, Peter Garraghan, Nicholas J. P. Race, Shishir Nagaraja, Awais Rashid:
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems. CPSIOTSEC@CCS 2021: 63-68 - [c146]Claudia Peersman, Denny Pencheva, Awais Rashid:
Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets. eCrime 2021: 1-12 - [c145]Joseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi, Awais Rashid:
Building a Privacy Testbed: Use Cases and Design Considerations. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 185-193 - [c144]Ziauddin Ursani, Claudia Peersman, Matthew Edwards, Chao Chen, Awais Rashid:
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach. EuroS&P Workshops 2021: 227-238 - [c143]Karen Li, Awais Rashid, Anne Roudaut:
Vision: Security-Usability Threat Modeling for Industrial Control Systems. EuroUSEC 2021: 83-88 - [c142]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? ICSE 2021: 486-498 - [c141]Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid:
Developers Are Neither Enemies Nor Users: They Are Collaborators. SecDev 2021: 47-55 - [i6]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? CoRR abs/2102.09790 (2021) - [i5]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The best laid plans or lack thereof: Security decision-making of different stakeholder groups. CoRR abs/2104.00284 (2021) - [i4]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations. CoRR abs/2105.02031 (2021) - 2020
- [j50]Eleni Philippou, Sylvain Frey, Awais Rashid:
Contextualising and aligning security metrics and business objectives: A GQM-based methodology. Comput. Secur. 88 (2020) - [j49]Charles Weir, Awais Rashid, James Noble:
Challenging software developers: dialectic as a foundation for security assurance techniques. J. Cybersecur. 6(1) (2020) - [j48]Denny Pencheva, Joseph Hallett, Awais Rashid:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. IEEE Secur. Priv. 18(2): 68-74 (2020) - [j47]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - [j46]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. IEEE Trans. Inf. Forensics Secur. 15: 1128-1137 (2020) - [j45]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey, Awais Rashid:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. ACM Trans. Priv. Secur. 24(1): 5:1-5:29 (2020) - [c140]Richard James Thomas, Joseph Gardiner, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. CPSIOTSEC@CCS 2020: 49-60 - [c139]Joseph Gardiner, Awais Rashid:
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. CPSIOTSEC@CCS 2020: 67 - [c138]Irum Rauf, Dirk van der Linden, Mark Levine, John N. Towse, Bashar Nuseibeh, Awais Rashid:
Security but not for security's sake: The impact of social considerations on app developers' choices. ICSE (Workshops) 2020: 141-144 - [c137]Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. ICSE 2020: 149-160 - [c136]Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, Awais Rashid:
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures. SOUPS @ USENIX Security Symposium 2020: 301-317 - [e11]Awais Rashid, Peter Popov:
Critical Information Infrastructures Security - 15th International Conference, CRITIS 2020, Bristol, UK, September 2-3, 2020, Proceedings. Lecture Notes in Computer Science 12332, Springer 2020, ISBN 978-3-030-58294-4 [contents] - [d1]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
SLR_Dataset. IEEE DataPort, 2020 - [i3]Joseph Gardiner, Awais Rashid:
Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. CoRR abs/2009.03961 (2020)
2010 – 2019
- 2019
- [j44]Jose M. Such, Pierre Ciholas, Awais Rashid, John Edward Vidler, Timothy Seabrook:
Basic Cyber Hygiene: Does It Work? Computer 52(4): 21-31 (2019) - [j43]Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs, Awais Rashid:
Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables. IEEE Secur. Priv. 17(3): 28-39 (2019) - [j42]Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. Proc. Priv. Enhancing Technol. 2019(2): 209-227 (2019) - [j41]Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi:
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. IEEE Trans. Software Eng. 45(5): 521-536 (2019) - [c135]Joseph Gardiner, Barnaby Craggs, Benjamin Green, Awais Rashid:
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds. CPS-SPC@CCS 2019: 75-86 - [c134]Awais Rashid, Joseph Gardiner, Benjamin Green, Barnaby Craggs:
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure. CRITIS 2019: 3-17 - [c133]Barnaby Craggs, Awais Rashid:
Trust beyond computation alone: human aspects of trust in blockchain technologies. ICSE-SEIS 2019: 21-30 - [c132]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - [c131]Ye Hou, Jose M. Such, Awais Rashid:
Understanding security requirements for industrial control system supply chains. SEsCPS@ICSE 2019: 50-53 - [c130]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries. SOUPS @ USENIX Security Symposium 2019 - [c129]Dirk van der Linden, Irit Hadar, Matthew Edwards, Awais Rashid:
Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes. STAST 2019: 47-65 - [i2]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. CoRR abs/1905.12593 (2019) - [i1]Eleni Philippou, Sylvain Frey, Awais Rashid:
Contextualising and Aligning Security Metrics and Business Objectives: a GQM-based Methodology. CoRR abs/1910.05263 (2019) - 2018
- [j40]