default search action
Awais Rashid
Person information
- affiliation: University of Bristol, UK
- affiliation (former): The University of Lancaster, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2003
- [b2]Awais Rashid:
Aspect-Oriented Database Systems. Springer 2003, ISBN 3-540-00948-5 - 2001
- [b1]Awais Rashid:
A database evolution approach for object oriented databases. Lancaster University, UK, 2001
Journal Articles
- 2024
- [j68]Lata Nautiyal, Awais Rashid:
A framework for mapping organisational workforce knowledge profile in cyber security. Comput. Secur. 145: 103925 (2024) - [j67]Zaina Dkaidek, Awais Rashid:
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study. IEEE Secur. Priv. 22(5): 88-95 (2024) - [j66]John Eidar Simensen, Coralie Esnoul, Eunkyoung Jee, Ali Babar, Triet Huynh Minh Le, Awais Rashid:
Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS/SVM - 2024). ACM SIGSOFT Softw. Eng. Notes 49(4): 18-21 (2024) - 2023
- [j65]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the privacy of mental health apps. Empir. Softw. Eng. 28(1): 2 (2023) - [j64]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. IEEE Secur. Priv. 21(1): 49-57 (2023) - [j63]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [j62]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-21 (2023) - [j61]Kopo Marvin Ramokapane, Jose M. Such, Awais Rashid:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. ACM Trans. Priv. Secur. 26(1): 5:1-5:34 (2023) - [j60]Nikhil Patnaik, Andrew Carl Dwyer, Joseph Hallett, Awais Rashid:
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations. ACM Trans. Softw. Eng. Methodol. 32(3): 60:1-60:31 (2023) - [j59]Benjamin Shreeve, Catarina Gralha, Awais Rashid, João Araújo, Miguel Goulão:
Making Sense of the Unknown: How Managers Make Cyber Security Decisions. ACM Trans. Softw. Eng. Methodol. 32(4): 83:1-83:33 (2023) - [j58]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. IEEE Trans. Software Eng. 49(9): 4324-4348 (2023) - 2022
- [j57]Ola Aleksandra Michalec, Sveta Milyaeva, Awais Rashid:
When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures? Big Data Soc. 9(1): 205395172211083 (2022) - [j56]Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. IEEE Secur. Priv. 20(1): 87-95 (2022) - [j55]Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, Jason I. Hong, Awais Rashid:
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks. Proc. Priv. Enhancing Technol. 2022(3): 33-56 (2022) - [j54]Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk van der Linden, John N. Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh:
The Case for Adaptive Security Interventions. ACM Trans. Softw. Eng. Methodol. 31(1): 9:1-9:52 (2022) - [j53]Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. IEEE Trans. Software Eng. 48(2): 364-376 (2022) - [j52]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. IEEE Trans. Software Eng. 48(5): 1515-1528 (2022) - 2021
- [j51]Colin Topping, Andrew Carl Dwyer, Ola Aleksandra Michalec, Barnaby Craggs, Awais Rashid:
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks. Comput. Secur. 108: 102324 (2021) - 2020
- [j50]Eleni Philippou, Sylvain Frey, Awais Rashid:
Contextualising and aligning security metrics and business objectives: A GQM-based methodology. Comput. Secur. 88 (2020) - [j49]Charles Weir, Awais Rashid, James Noble:
Challenging software developers: dialectic as a foundation for security assurance techniques. J. Cybersecur. 6(1) (2020) - [j48]Denny Pencheva, Joseph Hallett, Awais Rashid:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. IEEE Secur. Priv. 18(2): 68-74 (2020) - [j47]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw. Pract. Exp. 50(3): 275-298 (2020) - [j46]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. IEEE Trans. Inf. Forensics Secur. 15: 1128-1137 (2020) - [j45]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey, Awais Rashid:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. ACM Trans. Priv. Secur. 24(1): 5:1-5:29 (2020) - 2019
- [j44]Jose M. Such, Pierre Ciholas, Awais Rashid, John Vidler, Timothy Seabrook:
Basic Cyber Hygiene: Does It Work? Computer 52(4): 21-31 (2019) - [j43]Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs, Awais Rashid:
Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables. IEEE Secur. Priv. 17(3): 28-39 (2019) - [j42]Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. Proc. Priv. Enhancing Technol. 2019(2): 209-227 (2019) - [j41]Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi:
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. IEEE Trans. Software Eng. 45(5): 521-536 (2019) - 2018
- [j40]Walter Cazzola, Ruzanna Chitchyan, Awais Rashid, Albert Shaqiri:
μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating. Comput. Lang. Syst. Struct. 51: 71-89 (2018) - [j39]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - [j38]Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, Muhammad Ali Babar, Awais Rashid:
Data exfiltration: A review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 101: 18-54 (2018) - [j37]Dirk van der Linden, Awais Rashid:
The Effect of Software Warranties on Cybersecurity. ACM SIGSOFT Softw. Eng. Notes 43(4): 31-35 (2018) - [j36]Dirk van der Linden, Awais Rashid:
The Effect of Software Warranties on Cybersecurity. ACM SIGSOFT Softw. Eng. Notes 43(4): 53 (2018) - 2017
- [j35]Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid, Alistair Baron:
Panning for gold: Automatically analysing online social engineering attack surfaces. Comput. Secur. 69: 18-34 (2017) - [j34]William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid:
All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications. Computer 50(12): 60-71 (2017) - [j33]Raffi Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe:
Detecting broken pointcuts using structural commonality and degree of interest. Sci. Comput. Program. 150: 56-74 (2017) - [j32]Tomás Bures, Danny Weyns, Bradley R. Schmerl, Eduardo Tovar, Eric Boden, Thomas Gabor, Ilias Gerostathopoulos, Pragya Gupta, Eunsuk Kang, Alessia Knauss, Pankesh Patel, Awais Rashid, Ivan Ruchkin, Roykrong Sukkerd, Christos Tsigkanos:
Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions. ACM SIGSOFT Softw. Eng. Notes 42(2): 19-24 (2017) - 2016
- [j31]Jose M. Such, Antonios Gouglidis, William Knowles, Gaurav Misra, Awais Rashid:
Information assurance techniques: Perceived cost effectiveness. Comput. Secur. 60: 117-133 (2016) - [j30]Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer:
iCOP: Live forensics to reveal previously unknown criminal media on P2P networks. Digit. Investig. 18: 50-64 (2016) - [j29]Natalia Criado, Awais Rashid, Larissa Leite:
Flash mobs, Arab Spring and protest movements: Can we analyse group identities in online conversations? Expert Syst. Appl. 62: 212-224 (2016) - [j28]Johan Fabry, Coen De Roover, Carlos Noguera, Steffen Zschaler, Awais Rashid, Viviane Jonckers:
AspectJ code analysis and verification with GASR. J. Syst. Softw. 117: 528-544 (2016) - 2015
- [j27]Matthew Edwards, Awais Rashid, Paul Rayson:
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement. ACM Comput. Surv. 48(1): 15:1-15:54 (2015) - 2013
- [j26]Alberto Sardinha, Ruzanna Chitchyan, Nathan Weston, Phil Greenwood, Awais Rashid:
EA-Analyzer: automating conflict detection in a large set of textual aspect-oriented requirements. Autom. Softw. Eng. 20(1): 111-135 (2013) - [j25]Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood, James Walkerdine:
Who Am I? Analyzing Digital Personas in Cybercrime Investigations. Computer 46(4): 54-61 (2013) - [j24]Pauline Anthonysamy, Phil Greenwood, Awais Rashid:
Social Networking Privacy: Understanding the Disconnect from Policy to Controls. Computer 46(6): 60-67 (2013) - [j23]Fabiano Cutigi Ferrari, Awais Rashid, José Carlos Maldonado:
Towards the practical mutation testing of AspectJ programs. Sci. Comput. Program. 78(9): 1639-1662 (2013) - [j22]Cláudio Sant'Anna, Alessandro Garcia, Thaís Vasconcelos Batista, Awais Rashid:
Mastering crosscutting architectural decisions with aspects. Softw. Pract. Exp. 43(3): 305-332 (2013) - 2012
- [j21]Raffi Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Xu:
Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software. IEEE Trans. Software Eng. 38(3): 642-657 (2012) - 2011
- [j20]Roberta Coelho, Arndt von Staa, Uirá Kulesza, Awais Rashid, Carlos José Pereira de Lucena:
Unveiling and taming liabilities of aspects in the presence of exceptions: A static analysis based approach. Inf. Sci. 181(13): 2700-2720 (2011) - 2010
- [j19]Awais Rashid, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen:
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. Computer 43(2): 19-26 (2010) - [j18]Florian Heidenreich, Pablo Sánchez, João Pedro Santos, Steffen Zschaler, Mauricio Alférez, João Araújo, Lidia Fuentes, Uirá Kulesza, Ana Moreira, Awais Rashid:
Relating Feature Models to Other Models of a Software Product Line - A Comparative Study of FeatureMapper and VML*. LNCS Trans. Aspect Oriented Softw. Dev. 7: 69-114 (2010) - 2009
- [j17]Awais Rashid, John Weckert, Richard Lucas:
Software Engineering Ethics in a Digital World. Computer 42(6): 34-41 (2009) - [j16]Nathan Weston, Ruzanna Chitchyan, Awais Rashid:
Formal semantic conflict detection in aspect-oriented requirements. Requir. Eng. 14(4): 247-268 (2009) - 2007
- [j15]Américo Sampaio, Awais Rashid, Ruzanna Chitchyan, Paul Rayson:
EA-Miner: Towards Automation in Aspect-Oriented Requirements Engineering. LNCS Trans. Aspect Oriented Softw. Dev. 3: 4-39 (2007) - [j14]Ruzanna Chitchyan, Mónica Pinto, Awais Rashid, Lidia Fuentes:
COMPASS: Composition-Centric Mapping of Aspectual Requirements to Architecture. LNCS Trans. Aspect Oriented Softw. Dev. 4: 3-53 (2007) - 2006
- [j13]Alessandro Garcia, Thaís Vasconcelos Batista, Awais Rashid, Cláudio Sant'Anna:
Driving and managing architectural decisions with aspects. ACM SIGSOFT Softw. Eng. Notes 31(5) (2006) - [j12]Elisa L. A. Baniassad, Paul C. Clements, João Araújo, Ana Moreira, Awais Rashid, Bedir Tekinerdogan:
Discovering Early Aspects. IEEE Softw. 23(1): 61-70 (2006) - [j11]Johan Brichau, Ruzanna Chitchyan, Siobhán Clarke, Ellie D'Hondt, Alessandro Garcia, Michael Haupt, Wouter Joosen, Shmuel Katz, Jacques Noyé, Awais Rashid, Mario Südholt:
A Model Curriculum for Aspect-Oriented Software Development. IEEE Softw. 23(6): 53-61 (2006) - [j10]David Parsons, Awais Rashid, Alexandru C. Telea, Andreas Speck:
An architectural pattern for designing component-based application frameworks. Softw. Pract. Exp. 36(2): 157-190 (2006) - 2005
- [j9]Awais Rashid, Peter Sawyer:
A database evolution taxonomy for object-oriented databases. J. Softw. Maintenance Res. Pract. 17(2): 93-141 (2005) - [j8]Jim Buckley, Tom Mens, Matthias Zenger, Awais Rashid, Günter Kniesel:
Towards a taxonomy of software change. J. Softw. Maintenance Res. Pract. 17(5): 309-332 (2005) - 2004
- [j7]Awais Rashid, Ana M. D. Moreira, Bedir Tekinerdogan:
Special issue on Early aspects: aspect-oriented requirements engineering and architecture design. IEE Proc. Softw. 151(4): 153-156 (2004) - 2003
- [j6]Awais Rashid, Lynne Blair:
Editorial: Aspect-oriented Programming and Separation of Crosscutting Concerns. Comput. J. 46(5): 527-528 (2003) - 2002
- [j5]Awais Rashid:
Weaving Aspects in a Persistent Environment. ACM SIGPLAN Notices 37(2): 36-44 (2002) - 2001
- [j4]Awais Rashid:
Aspect-oriented and component-based software engineering. IEE Proc. Softw. 148(3): 87-88 (2001) - [j3]Awais Rashid, Peter Sawyer:
Aspect-orientation and database systems: an effective customisation approach. IEE Proc. Softw. 148(5): 156-164 (2001) - 2000
- [j2]Awais Rashid, Peter Sawyer:
Transparent Dynamic Database Evolution from Java. Obj. Logiciel Base données Réseaux 6(3) (2000) - [j1]Awais Rashid, Peter Sawyer:
Object Database Evolution Using Separation of Concerns. SIGMOD Rec. 29(4): 26-33 (2000)
Conference and Workshop Papers
- 2024
- [c169]Karen Li, Anne Roudaut, Awais Rashid:
Conceptual Designs for Security interfaces in Industrial Control Systems. Conference on Designing Interactive Systems (Companion Volume) 2024 - [c168]Stanislav Abaimov, Joseph Gardiner, Emmanouil Samanis, Jacob Williams, Marios Samanis, Feras Shahbi, Awais Rashid:
Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise. CPSS@AsiaCCS 2024: 98-106 - [c167]Sami Ullah, Awais Rashid:
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications. EuroS&P 2024: 381-397 - [c166]Priyanka Badva, Kopo M. Ramokapane, Eleonora Pantano, Awais Rashid:
Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense. USENIX Security Symposium 2024 - 2023
- [c165]James Stevenson, Matthew Edwards, Awais Rashid:
Analysing The Activities Of Far-Right Extremists On The Parler Social Network. ASONAM 2023: 392-399 - [c164]Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid:
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. CHI 2023: 168:1-168:24 - [c163]Samuel Barnes-Thornton, Joseph Gardiner, Awais Rashid:
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming. CPSIOTSEC@CCS 2023: 67-73 - [c162]Feras Shahbi, Joseph Gardiner, Sridhar Adepu, Awais Rashid:
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts. EuroS&P Workshops 2023: 320-328 - [c161]Karen Li, Awais Rashid, Anne Roudaut:
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. EuroUSEC 2023: 205-217 - [c160]Kopo Marvin Ramokapane, Awais Rashid:
ExD: Explainable Deletion. NSPW 2023: 34-47 - [c159]Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. Security Protocols Workshop 2023: 211-219 - 2022
- [c158]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. ARES 2022: 28:1-28:12 - [c157]Kopo Marvin Ramokapane, Caroline Bird, Awais Rashid, Ruzanna Chitchyan:
Privacy Design Strategies for Home Energy Management Systems (HEMS). CHI 2022: 405:1-405:15 - [c156]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [c155]Mohammad Tahaei, Julia Bernd, Awais Rashid:
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC 2022: 117-130 - [c154]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
Adaptive Cyber Security for Critical Infrastructure. ICCPS 2022: 304-305 - [c153]Awais Rashid:
Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. ICISSP 2022: 5 - [c152]Irum Rauf, Tamara Lopez, Helen Sharp, Marian Petre, Thein Tun, Mark Levine, John N. Towse, Dirk van der Linden, Awais Rashid, Bashar Nuseibeh:
Influences of developers' perspectives on their engagement with security in code. CHASE@ICSE 2022: 86-95 - [c151]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid:
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. NSPW 2022: 60-74 - [c150]Sharad Agarwal, Awais Rashid, Joseph Gardiner:
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming. CSET @ USENIX Security Symposium 2022: 1-9 - 2021
- [c149]Danny Weyns, Tomás Bures, Radu Calinescu, Barnaby Craggs, John S. Fitzgerald, David Garlan, Bashar Nuseibeh, Liliana Pasquale, Awais Rashid, Ivan Ruchkin, Bradley R. Schmerl:
Six Software Engineering Principles for Smarter Cyber-Physical Systems. ACSOS-C 2021: 198-203 - [c148]Chao Chen, Claudia Peersman, Matthew Edwards, Ziauddin Ursani, Awais Rashid:
AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet. IEEE BigData 2021: 2516-2524 - [c147]Joseph Gardiner, Adam Eiffert, Peter Garraghan, Nicholas J. P. Race, Shishir Nagaraja, Awais Rashid:
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems. CPSIOTSEC@CCS 2021: 63-68 - [c146]Claudia Peersman, Denny Pencheva, Awais Rashid:
Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets. eCrime 2021: 1-12 - [c145]Joseph Gardiner, Partha Das Chowdhury, Jacob Halsey, Mohammad Tahaei, Tariq Elahi, Awais Rashid:
Building a Privacy Testbed: Use Cases and Design Considerations. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 185-193 - [c144]Ziauddin Ursani, Claudia Peersman, Matthew Edwards, Chao Chen, Awais Rashid:
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach. EuroS&P Workshops 2021: 227-238 - [c143]Karen Li, Awais Rashid, Anne Roudaut:
Vision: Security-Usability Threat Modeling for Industrial Control Systems. EuroUSEC 2021: 83-88 - [c142]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? ICSE 2021: 486-498 - [c141]Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid:
Developers Are Neither Enemies Nor Users: They Are Collaborators. SecDev 2021: 47-55 - 2020
- [c140]Richard James Thomas, Joseph Gardiner, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. CPSIOTSEC@CCS 2020: 49-60 - [c139]Joseph Gardiner, Awais Rashid:
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. CPSIOTSEC@CCS 2020: 67 - [c138]Irum Rauf, Dirk van der Linden, Mark Levine, John N. Towse, Bashar Nuseibeh, Awais Rashid:
Security but not for security's sake: The impact of social considerations on app developers' choices. ICSE (Workshops) 2020: 141-144 - [c137]Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. ICSE 2020: 149-160 - [c136]Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, Awais Rashid:
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures. SOUPS @ USENIX Security Symposium 2020: 301-317 - 2019
- [c135]Joseph Gardiner, Barnaby Craggs, Benjamin Green, Awais Rashid:
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds. CPS-SPC@CCS 2019: 75-86 - [c134]Awais Rashid, Joseph Gardiner, Benjamin Green, Barnaby Craggs:
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure. CRITIS 2019: 3-17 - [c133]Barnaby Craggs, Awais Rashid:
Trust beyond computation alone: human aspects of trust in blockchain technologies. ICSE-SEIS 2019: 21-30 - [c132]Charles Weir, Ingolf Becker, James Noble, Lynne Blair, M. Angela Sasse, Awais Rashid:
Interventions for software security: creating a lightweight program of assurance techniques for developers. ICSE (SEIP) 2019: 41-50 - [c131]Ye Hou, Jose M. Such, Awais Rashid:
Understanding security requirements for industrial control system supply chains. SEsCPS@ICSE 2019: 50-53 - [c130]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries. SOUPS @ USENIX Security Symposium 2019 - [c129]Dirk van der Linden, Irit Hadar, Matthew Edwards, Awais Rashid:
Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes. STAST 2019: 47-65 - 2018
- [c128]Atif Saeed, Peter Garraghan, Barnaby Craggs, Dirk van der Linden, Awais Rashid, Syed Asad Hussain:
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation. IEEE CLOUD 2018: 606-613 - [c127]Awais Rashid, Nils Ole Tippenhauer:
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2018: 2171-2172 - [c126]Liliana Pasquale, Dalal Alrajeh, Claudia Peersman, Thein Than Tun, Bashar Nuseibeh, Awais Rashid:
Towards forensic-ready software systems. ICSE (NIER) 2018: 9-12 - [c125]Dirk van der Linden, Awais Rashid, Emma J. Williams, Bogdan Warinschi:
Safe cryptography for all: towards visual metaphor driven cryptography building blocks. SEAD@ICSE 2018: 41-44 - [c124]Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi:
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game. ICSE 2018: 496 - [c123]Joseph Hallett, Robert Larson, Awais Rashid:
Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks. ASE @ USENIX Security Symposium 2018 - 2017
- [c122]Rakesh B. Bobba, Awais Rashid:
CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2017: 2629-2630 - [c121]Anhtuan Le, Utz Roedig, Awais Rashid:
LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. ESSoS 2017: 36-52 - [c120]Pauline Anthonysamy, Awais Rashid, Ruzanna Chitchyan:
Privacy Requirements: Present & Future. ICSE-SEIS 2017: 13-22 - [c119]Barnaby Craggs, Awais Rashid:
Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design. SEsCPS@ICSE 2017: 22-25 - [c118]Sarah Schulz Mukisa, Awais Rashid:
Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. RE Workshops 2017: 97-103 - [c117]Kopo M. Ramokapane, Awais Rashid, Jose M. Such:
"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies. SOUPS 2017: 241-256 - [c116]Alberto Zanutto, Ben Shreeve, Karolina Follis, Jerry S. Busby, Awais Rashid:
The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems. SOUPS 2017 - [c115]Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid:
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. CSET @ USENIX Security Symposium 2017 - [c114]Matthew Edwards, Claudia Peersman, Awais Rashid:
Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds. WWW (Companion Volume) 2017: 1291-1299 - [c113]Monica T. Whitty, Matthew Edwards, Michael Levi, Claudia Peersman, Awais Rashid, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [c112]Tom Carrick, Awais Rashid, Paul J. Taylor:
Mimicry in online conversations: An exploratory study of linguistic analysis techniques. ASONAM 2016: 732-736 - [c111]Matthew Edwards, Stephen Wattam, Paul Rayson, Awais Rashid:
Sampling labelled profile data for identity resolution. IEEE BigData 2016: 540-547 - [c110]William Jardine, Sylvain Frey, Benjamin Green, Awais Rashid:
SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection. CPS-SPC@CCS 2016: 23-34 - [c109]Kopo M. Ramokapane, Awais Rashid, Jose M. Such:
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions. CCSW 2016: 97-108 - [c108]Charles Weir, Awais Rashid, James Noble:
Early Report: How to Improve Programmers' Expertise at App Security? IMPS@ESSoS 2016: 49-50 - [c107]Pauline Anthonysamy, Matthew Edwards, Christian Weichel, Awais Rashid:
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. ESSoS 2016: 233-250 - [c106]Sylvain Frey, Yehia Elkhatib, Awais Rashid, Karolina Follis, John Vidler, Nicholas J. P. Race, Christopher Edwards:
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe. EuroS&P 2016: 423-438 - [c105]Rob Antrobus, Sylvain Frey, Awais Rashid, Benjamin Green:
SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems. ICS-CSR 2016 - [c104]Sylvain Frey, Awais Rashid, Alberto Zanutto, Jerry S. Busby, Karolina Follis:
On the role of latent design conditions in cyber-physical systems security. SEsCPS@ICSE 2016: 43-46 - [c103]Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar:
Discovering "unknown known" security requirements. ICSE 2016: 866-876 - [c102]Charles Weir, Awais Rashid, James Noble:
Reaching the masses: a new subdiscipline of app programmer education. SIGSOFT FSE 2016: 936-939 - [c101]Charles Weir, Awais Rashid, James Noble:
How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views. WSIW@SOUPS 2016 - 2015
- [c100]Christos Charitonidis, Awais Rashid, Paul J. Taylor:
Weak Signals as Predictors of Real-World Phenomena in Social Media. ASONAM 2015: 864-871 - [c99]David Redlich, Mykola Galushka, Thomas Molka, Wasif Gilani, Gordon S. Blair, Awais Rashid:
Evaluation of the Dynamic Construct Competition Miner for an eHealth System. BIS 2015: 115-126 - [c98]William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid:
Assurance Techniques for Industrial Control Systems (ICS). CPS-SPC@CCS 2015: 101-112 - [c97]Ruzanna Chitchyan, Awais Rashid, Walter Cazzola:
Software Engineering for Social Sustainability. EnviroInfo/ICT4S (2) 2015: 251-252 - [c96]Ruzanna Chitchyan, Walter Cazzola, Awais Rashid:
Engineering Sustainability Through Language. ICSE (2) 2015: 501-504 - [c95]Awais Rashid, Karenza Moore, Corinne May-Chahal, Ruzanna Chitchyan:
Managing Emergent Ethical Concerns for Software Engineering in Society. ICSE (2) 2015: 523-526 - [c94]Pauline Anthonysamy, Awais Rashid:
Software Engineering for Privacy in-the-Large. ICSE (2) 2015: 947-948 - [c93]Raffi Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe:
Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N). ASE 2015: 641-646 - [c92]Raffi Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe:
Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software. SPLASH (Companion Volume) 2015: 17-18 - 2014
- [c91]David Redlich, Thomas Molka, Wasif Gilani, Gordon S. Blair, Awais Rashid:
Constructs Competition Miner: Process Control-Flow Discovery of BP-Domain Constructs. BPM 2014: 134-150 - [c90]David Redlich, Wasif Gilani, Thomas Molka, Marc Drobek, Awais Rashid, Gordon S. Blair:
Introducing a Framework for Scalable Dynamic Process Discovery. EEWC 2014: 151-166 - [c89]Matthew John Edwards, Awais Rashid, Paul Rayson:
A Service-Indepenent Model for Linking Online User Profile Information. JISIC 2014: 280-283 - [c88]Maria Pinto-Albuquerque, Awais Rashid:
Tackling the requirements jigsaw puzzle. RE 2014: 233-242 - [c87]David Redlich, Thomas Molka, Wasif Gilani, Gordon S. Blair, Awais Rashid:
Dynamic Constructs Competition Miner - Occurrence- vs. Time-Based Ageing. SIMPDA (Revised Selected Papers) 2014: 79-106 - [c86]David Redlich, Thomas Molka, Wasif Gilani, Gordon S. Blair, Awais Rashid:
Scalable Dynamic Business Process Discovery with the Constructs Competition Miner. SIMPDA 2014: 91-107 - [c85]Ebrahim Hamad Al Hanaei, Awais Rashid:
DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations. IEEE Symposium on Security and Privacy Workshops 2014: 57-60 - [c84]Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer:
iCOP: Automatically Identifying New Child Abuse Media in P2P Networks. IEEE Symposium on Security and Privacy Workshops 2014: 124-131 - 2012
- [c83]Pauline Anthonysamy, Phil Greenwood, Awais Rashid:
A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks. APF 2012: 187-202 - [c82]Phil Greenwood, Awais Rashid, James Walkerdine:
UDesignIt: Towards social media for community-driven design. ICSE 2012: 1321-1324 - [c81]Alberto Sardinha, Yijun Yu, Nan Niu, Awais Rashid:
EA-tracer: identifying traceability links between code aspects and early aspects. SAC 2012: 1035-1042 - 2011
- [c80]Fabiano Cutigi Ferrari, Elisa Yumi Nakagawa, José Carlos Maldonado, Awais Rashid:
Proteum/AJ: a mutation system for AspectJ programs. AOSD (Companion) 2011: 73-74 - [c79]Steffen Zschaler, Awais Rashid:
Aspect assumptions: a retrospective study of AspectJ developers' assumptions about aspect usage. AOSD 2011: 93-104 - [c78]David Redlich, Gordon S. Blair, Awais Rashid, Thomas Molka, Wasif Gilani:
Research Challenges for Business Process Models at Run-Time. Models@run.time@Dagstuhl 2011: 208-236 - [c77]Phil Greenwood, Ruzanna Chitchyan, Awais Rashid, Joost Noppen, Franck Fleurey, Arnor Solberg:
Modelling adaptability and variability in requirements. RE 2011: 343-344 - [c76]Bruno Barbieri Pontes Cafeo, Joost Noppen, Fabiano Cutigi Ferrari, Ruzanna Chitchyan, Awais Rashid:
Inferring test results for dynamic software product lines. SIGSOFT FSE 2011: 500-503 - [c75]Pauline Anthonysamy, Awais Rashid, Phil Greenwood:
Do the Privacy Policies Reflect the Privacy Controls on Social Networks? SocialCom/PASSAT 2011: 1155-1158 - 2010
- [c74]Pauline Anthonysamy, Awais Rashid, Andreas Rummler:
Taming Unbounded Variability in Service Engineering. Business Process Management Workshops 2010: 615-619 - [c73]Fabiano Cutigi Ferrari, Elisa Yumi Nakagawa, Awais Rashid, José Carlos Maldonado:
Automating the mutation testing of aspect-oriented Java programs. AST 2010: 51-58 - [c72]Fabiano Cutigi Ferrari, Rachel Burrows, Otávio Augusto Lazzarini Lemos, Alessandro Garcia, Eduardo Figueiredo, Nélio Cacho, Frederico Lopes, Nathalia Temudo, Liana Silva, Sérgio Soares, Awais Rashid, Paulo César Masiero, Thaís Vasconcelos Batista, José Carlos Maldonado:
An exploratory study of fault-proneness in evolving aspect-oriented programs. ICSE (1) 2010: 65-74 - 2009
- [c71]Alberto Sardinha, Awais Rashid, Ruzanna Chitchyan, Nathan Weston, Phil Greenwood:
EA-Analyzer: a tool for identifying conflicting dependencies in requirements documents. EA@AOSD 2009: 43-44 - [c70]Nathan Weston, Awais Rashid:
ArborCraft: automatic feature models from textual requirements documents. EA@AOSD 2009: 45-46 - [c69]Christina Chavez, Alessandro F. Garcia, Thaís Vasconcelos Batista, Marcel Vinícius Medeiros Oliveira, Cláudio Sant'Anna, Awais Rashid:
Composing architectural aspects based on style semantics. AOSD 2009: 111-122 - [c68]Ruzanna Chitchyan, Phil Greenwood, Américo Sampaio, Awais Rashid, Alessandro F. Garcia, Lyrene Fernandes da Silva:
Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study. AOSD 2009: 149-160 - [c67]Alberto Sardinha, Ruzanna Chitchyan, Nathan Weston, Phil Greenwood, Awais Rashid:
EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements. ASE 2009: 530-534 - [c66]Raffi Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Xu:
Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software. ASE 2009: 575-579 - [c65]Steffen Zschaler, Pablo Sánchez, João Pedro Santos, Mauricio Alférez, Awais Rashid, Lidia Fuentes, Ana Moreira, João Araújo, Uirá Kulesza:
VML* - A Family of Languages for Variability Management in Software Product Lines. SLE 2009: 82-102 - [c64]Steffen Zschaler, Dimitrios S. Kolovos, Nikolaos Drivalos, Richard F. Paige, Awais Rashid:
Domain-Specific Metamodelling Languages for Software Language Engineering. SLE 2009: 334-353 - [c63]Nathan Weston, Ruzanna Chitchyan, Awais Rashid:
A framework for constructing semantically composable feature models from natural language requirements. SPLC 2009: 211-220 - [c62]Joost Noppen, Pim van den Broek, Nathan Weston, Awais Rashid:
Modelling Imperfect Product Line Requirements with Fuzzy Feature Diagrams. VaMoS 2009: 93-102 - 2008
- [c61]Safoora Shakil Khan, Phil Greenwood, Alessandro Garcia, Awais Rashid:
On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study. CAiSE 2008: 243-257 - [c60]Roberta Coelho, Awais Rashid, Alessandro Garcia, Fabiano Cutigi Ferrari, Nélio Cacho, Uirá Kulesza, Arndt von Staa, Carlos José Pereira de Lucena:
Assessing the Impact of Aspects on Exception Flows: An Exploratory Study. ECOOP 2008: 207-234 - [c59]Awais Rashid, Ruzanna Chitchyan:
Aspect-oriented requirements engineering: a roadmap. EA@ICSE 2008: 35-41 - [c58]Américo Sampaio, Awais Rashid:
Mining early aspects from requirements with ea-miner. ICSE Companion 2008: 911-912 - [c57]Mónica Pinto, Ruzanna Chitchyan, Awais Rashid, Ana Moreira, João Araújo, Paul C. Clements, Elisa L. A. Baniassad, Bedir Tekinerdogan:
Early aspects at ICSE 2008: workshop on aspect-oriented requirements engineering and architecture design. ICSE Companion 2008: 1053-1054 - [c56]Fabiano Cutigi Ferrari, José Carlos Maldonado, Awais Rashid:
Mutation Testing for Aspect-Oriented Programs. ICST 2008: 52-61 - [c55]Danny Hughes, Paul Rayson, James Walkerdine, Kevin Lee, Phil Greenwood, Awais Rashid, Corinne May-Chahal, Margaret Brennan:
Supporting Law Enforcement in Digital Communities through Natural Language Analysis. IWCF 2008: 122-134 - [c54]Muhammad Usman Bhatti, Stéphane Ducasse, Awais Rashid:
Aspect Mining in Procedural Object Oriented Code. ICPC 2008: 230-235 - [c53]Syed Asad Naqvi, Ruzanna Chitchyan, Steffen Zschaler, Awais Rashid, Mario Südholt:
Cross-Document Dependency Analysis for System-of-System Integration. Monterey Workshop 2008: 201-226 - [c52]Nathan Weston, Ruzanna Chitchyan, Awais Rashid:
A Formal Approach to Semantic Composition of Aspect-Oriented Requirements. RE 2008: 173-182 - [c51]Awais Rashid:
Aspect-Oriented Requirements Engineering: An Introduction. RE 2008: 306-309 - [c50]Roberta Coelho, Uirá Kulesza, Awais Rashid, Arndt von Staa, Carlos Lucena:
Unveiling and Taming Liabilities of Aspect Libraries Reuse. SBES 2008: 81-96 - [c49]Raffi Khatchadourian, Awais Rashid:
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. SCAM 2008: 261-262 - [c48]Vander Alves, Christa Schwanninger, Luciano Barbosa, Awais Rashid, Peter Sawyer, Paul Rayson, Christoph Pohl, Andreas Rummler:
An Exploratory Study of Information Retrieval Techniques in Domain Analysis. SPLC 2008: 67-76 - [c47]Vander Alves, Christa Schwanninger, Paul C. Clements, Awais Rashid, Ana Moreira, João Araújo, Elisa L. A. Baniassad, Bedir Tekinerdogan:
Early Aspects: Aspect-Oriented Requirements and Architecture for Product Lines (EA@SPLC.08). SPLC 2008: 382 - 2007
- [c46]Ruzanna Chitchyan, Awais Rashid, Paul Rayson, Robert Waters:
Semantics-based composition for aspect-oriented requirements engineering. AOSD 2007: 36-48 - [c45]Awais Rashid:
Early Aspects: Are There Any Other Kind? EA@AOSD 2007: 195-198 - [c44]Phil Greenwood, Thiago T. Bartolomei, Eduardo Figueiredo, Marcos Dósea, Alessandro F. Garcia, Nélio Cacho, Cláudio Sant'Anna, Sérgio Soares, Paulo Borba, Uirá Kulesza, Awais Rashid:
On the Impact of Aspectual Decompositions on Design Stability: An Empirical Study. ECOOP 2007: 176-200 - [c43]Américo Sampaio, Phil Greenwood, Alessandro F. Garcia, Awais Rashid:
A Comparative Study of Aspect-Oriented Requirements Engineering Approaches. ESEM 2007: 166-175 - [c42]Phil Greenwood, Alessandro F. Garcia, Awais Rashid, Eduardo Figueiredo, Cláudio Sant'Anna, Nélio Cacho, Américo Sampaio, Sérgio Soares, Paulo Borba, Marcos Dósea, Ricardo Argenton Ramos, Uirá Kulesza, Thiago T. Bartolomei, Mónica Pinto, Lidia Fuentes, Nadia Gámez, Ana Moreira, João Araújo, Thaís Batista, Ana Luisa Medeiros, Francisco Dantas, Lyrene Fernandes da Silva, Jan Wloka, Christina Chavez, Robert B. France, Isabel Sofia Brito:
On the Contributions of an End-to-End AOSD Testbed. EA@ICSE 2007: 8 - [c41]Ruzanna Chitchyan, Awais Rashid, Ana Moreira, João Araújo, Paul C. Clements, Elisa L. A. Baniassad, Bedir Tekinerdogan:
Early Aspects at ICSE 2007: Workshop on Aspect-Oriented Requirements Engineering and Architecture Design. ICSE Companion 2007: 127-128 - [c40]Roberta Coelho, Elder Cirilo, Uirá Kulesza, Arndt von Staa, Awais Rashid, Carlos José Pereira de Lucena:
JAT: A Test Automation Framework for Multi-Agent Systems. ICSM 2007: 425-434 - 2006
- [c39]Awais Rashid:
Aspects and Evolution: The Case for Versioned Types and Meta-Aspect Protocols. RAM-SE 2006: 3-5 - [c38]Alessandro Garcia, Christina Chavez, Thaís Vasconcelos Batista, Cláudio Sant'Anna, Uirá Kulesza, Awais Rashid, Carlos José Pereira de Lucena:
On the Modular Representation of Architectural Aspects. EWSA 2006: 82-97 - [c37]Awais Rashid, Alessandro F. Garcia, Ana Moreira:
Aspect-oriented software development beyond programming. ICSE 2006: 1061-1062 - [c36]Awais Rashid, Alessandro F. Garcia, Ana Moreira:
Aspect-Oriented Software Development Beyond Programming. ICSR 2006: 441-442 - [c35]Awais Rashid, Ana Moreira:
Domain Models Are NOT Aspect Free. MoDELS 2006: 155-169 - 2005
- [c34]Ana M. D. Moreira, João Araújo, Awais Rashid:
A Concern-Oriented Requirements Engineering Model. CAiSE 2005: 293-308 - [c33]Nathan Weston, François Taïani, Awais Rashid:
Modular Aspect Verification for Safer Aspect-Based Evolution. RAM-SE 2005: 17-28 - [c32]Ana Moreira, Awais Rashid, João Araújo:
Multi-Dimensional Separation of Concerns in Requirements Engineering. RE 2005: 285-296 - [c31]Ruzanna Chitchyan, Ian Sommerville, Awais Rashid:
CoCA: A Composition-Centric Approach to Requirements Engineering. RE 2005: 475-476 - [c30]Américo Sampaio, Awais Rashid, Paul Rayson:
Early-AIM: An Approach for Identifying Aspects in Requirements. RE 2005: 487-488 - [c29]Neil Loughran, Américo Sampaio, Awais Rashid:
From Requirements Documents to Feature Models for Aspect Oriented Product Line Implementation. MoDELS (Satellite Events) 2005: 262-271 - [c28]Ruzanna Chitchyan, Awais Rashid, Peter Sawyer:
Comparing Requirement Engineering Approaches for Handling Crosscutting Concerns. WER 2005: 1-12 - 2004
- [c27]Awais Rashid, Nicholas A. Leidenfrost:
Supporting Flexible Object Database Evolution with Aspects. GPCE 2004: 75-94 - [c26]Neil Loughran, Awais Rashid:
Framed Aspects: Supporting Variability and Configurability for AOP. ICSR 2004: 127-140 - [c25]Shmuel Katz, Awais Rashid:
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems. RE 2004: 48-57 - 2003
- [c24]Awais Rashid, Ana M. D. Moreira, João Araújo:
Modularisation and composition of aspectual requirements. AOSD 2003: 11-20 - [c23]Awais Rashid, Ruzanna Chitchyan:
Persistence as an aspect. AOSD 2003: 120-129 - [c22]Jan Hannemann, Ruzanna Chitchyan, Awais Rashid:
Analysis of Aspect-Oriented Software. ECOOP Workshops 2003: 154-164 - [c21]Awais Rashid:
A Framework for Customisable Schema Evolution in Object-Oriented Databases. IDEAS 2003: 342-346 - [c20]Weishan Zhang, Stan Jarzabek, Neil Loughran, Awais Rashid:
Reengineering a PC-Based System into the Mobile Device Product Line. IWPSE 2003: 149-160 - 2002
- [c19]Awais Rashid, Neil Loughran:
Relational Database Support for Aspect-Oriented Programming. NetObjectDays 2002: 233-247 - [c18]Awais Rashid, Peter Sawyer, Ana M. D. Moreira, João Araújo:
Early Aspects: A Model for Aspect-Oriented Requirements Engineerin. RE 2002: 199-202 - 2001
- [c17]Awais Rashid, Ruzanna Chitchyan, Andreas Speck, Elke Pulvermüller:
EProMS: An E-commerce Based Process Model for Cooperative Software Development in Small Organisations. EC-Web 2001: 39-48 - [c16]Gerald Kotonya, Awais Rashid:
A Strategy for Managing Risk in Component-Based Software Development. EUROMICRO 2001: 12-21 - [c15]Awais Rashid:
A Database Evolution Approach for Object-Oriented Databases. ICSM 2001: 561-564 - [c14]Awais Rashid:
A Hybrid Approach to Separation of Concerns: The Story of SADES. Reflection 2001: 231-249 - 2000
- [c13]Awais Rashid, Elke Pulvermüller:
From Object-Oriented to Aspect-Oriented Databases. DEXA 2000: 125-134 - [c12]Awais Rashid:
On to Aspect Persistence. GCSE 2000: 26-36 - [c11]Herbert Klaeren, Elke Pulvermüller, Awais Rashid, Andreas Speck:
Aspect Composition Applying the Design by Contract Principle. GCSE 2000: 57-69 - [c10]Awais Rashid, Peter Sawyer, Elke Pulvermüller:
A Flexible Approach for Instance Adaptation During Class Versioning. Objects and Databases 2000: 101-113 - [c9]Awais Rashid, Ruzanna Chitchyan:
Reconfigurability in Object Database Management Systems: An Aspect-Oriented Approach. OOIS 2000: 303-314 - [c8]Elke Pulvermüller, Andreas Speck, Awais Rashid:
Implementing Collaboration-Based Designs Using Aspect-Oriented Programming. TOOLS (34) 2000: 95-104 - 1999
- [c7]Awais Rashid, Peter Sawyer:
Dynamic Relationships in Object Oriented Databases: A Uniform Approach. DEXA 1999: 26-35 - [c6]Simon Lock, Awais Rashid, Peter Sawyer, Gerald Kotonya:
Systematic Change Impact Determination in Complex Object Database Schemata. ECOOP Workshop for PhD Students in OO Systems 1999: 31-40 - [c5]Awais Rashid, David Parsons, Alexandru C. Telea:
9th Workshop for PhD Students in Object Oriented Systems. ECOOP Workshops 1999: 116-135 - [c4]Awais Rashid, Peter Sawyer:
Evaluation for Evolution: How Well Commercial Systems Do. ECOOP Workshops 1999: 210-211 - [c3]David Parsons, Awais Rashid, Andreas Speck, Alexandru C. Telea:
A "Framework" for Object Oriented Frameworks Design. TOOLS (29) 1999: 141-151 - 1998
- [c2]Awais Rashid, Peter Sawyer:
Facilitating Virtual Representation of CAD Data Through A Learning Based Approach to Conceptual Database Evolution Employing Direct Instance Sharing. DEXA 1998: 384-393 - [c1]Awais Rashid:
SADES - a Semi-Autonomous Database Evolution System. ECOOP Workshops 1998: 24-25
Parts in Books or Collections
- 2017
- [p4]Christos Charitonidis, Awais Rashid, Paul J. Taylor:
Predicting Collective Action from Micro-Blog Data. Prediction and Inference from Social Networks and Social Media 2017: 141-170 - 2013
- [p3]Nathan Weston, Ruzanna Chitchyan, Américo Sampaio, Awais Rashid, Phil Greenwood:
Aspect Identification in Textual Requirements with EA-Miner. Aspect-Oriented Requirements Engineering 2013: 3-21 - [p2]Alberto Sardinha, Ruzanna Chitchyan, João Araújo, Ana Moreira, Awais Rashid:
Conflict Identification with EA-Analyzer. Aspect-Oriented Requirements Engineering 2013: 209-224 - 2008
- [p1]Johan Brichau, Ruzanna Chitchyan, Awais Rashid, Theo D'Hondt:
Aspect-Oriented Software Development: an Introduction. Wiley Encyclopedia of Computer Science and Engineering 2008
Editorship
- 2020
- [e11]Awais Rashid, Peter Popov:
Critical Information Infrastructures Security - 15th International Conference, CRITIS 2020, Bristol, UK, September 2-3, 2020, Proceedings. Lecture Notes in Computer Science 12332, Springer 2020, ISBN 978-3-030-58294-4 [contents] - 2018
- [e10]Mathias Payer, Awais Rashid, Jose M. Such:
Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Lecture Notes in Computer Science 10953, Springer 2018, ISBN 978-3-319-94495-1 [contents] - 2017
- [e9]Bhavani Thuraisingham, Rakesh B. Bobba, Awais Rashid:
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5394-6 [contents] - 2013
- [e8]Ana Moreira, Ruzanna Chitchyan, João Araújo, Awais Rashid:
Aspect-Oriented Requirements Engineering. Springer 2013, ISBN 978-3-642-38639-8 [contents] - 2012
- [e7]Awais Rashid, João Araújo, Jörg Kienzle, Bedir Tekinerdogan, Ana Moreira:
Proceedings of the 2012 Workshop on Next Generation Modularity Approaches for Requirements and Architecture, NEMARA '12, Potsdam, Germany, March 27, 2012. ACM 2012, ISBN 978-1-4503-1127-4 [contents] - 2009
- [e6]Awais Rashid, Harold Ossher:
Transactions on Aspect-Oriented Software Development V. Lecture Notes in Computer Science 5490, Springer 2009, ISBN 978-3-642-02058-2 [contents] - 2007
- [e5]Awais Rashid, Mehmet Aksit:
Transactions on Aspect-Oriented Software Development III. Lecture Notes in Computer Science 4620, Springer 2007, ISBN 978-3-540-75161-8 [contents] - [e4]Awais Rashid, Mehmet Aksit:
Transactions on Aspect-Oriented Software Development IV. Lecture Notes in Computer Science 4640, Springer 2007, ISBN 978-3-540-77041-1 [contents] - 2006
- [e3]Awais Rashid, Mehmet Aksit:
Transactions on Aspect-Oriented Software Development I. Lecture Notes in Computer Science 3880, Springer 2006, ISBN 3-540-32972-2 [contents] - [e2]Awais Rashid, Mehmet Aksit:
Transactions on Aspect-Oriented Software Development II. Lecture Notes in Computer Science 4242, Springer 2006, ISBN 3-540-48890-1 [contents] - 1999
- [e1]Awais Rashid, David Parsons, Alexandru C. Telea:
Proceedings of the ECOOP'99 Workshop for PhD Students in OO Systems (PhDOOS '99), Lisbon, Portugal, June 1999. 1999, ISBN 90-386-1471-3 [contents]
Data and Artifacts
- 2020
- [d1]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
SLR_Dataset. IEEE DataPort, 2020
Informal and Other Publications
- 2024
- [i31]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CoRR abs/2405.06371 (2024) - [i30]Lata Nautiyal, Awais Rashid:
A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security. CoRR abs/2406.03322 (2024) - [i29]Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid:
Assessing Effectiveness of Cyber Essentials Technical Controls. CoRR abs/2406.15210 (2024) - [i28]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Saltzer & Schroeder for 2030: Security engineering principles in a world of AI. CoRR abs/2407.05710 (2024) - 2023
- [i27]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - [i26]Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid:
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. CoRR abs/2301.06534 (2023) - [i25]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - [i24]Benjamin Shreeve, Joseph Gardiner, Joseph Hallett, David Humphries, Awais Rashid:
Decisions & Disruptions 2: Decide Harder. CoRR abs/2306.12168 (2023) - [i23]Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid:
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. CoRR abs/2307.02332 (2023) - [i22]Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid:
Towards Equitable Privacy. CoRR abs/2308.00004 (2023) - [i21]Kopo M. Ramokapane, Awais Rashid:
ExD: Explainable Deletion. CoRR abs/2308.13326 (2023) - [i20]Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. CoRR abs/2308.14593 (2023) - 2022
- [i19]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development. CoRR abs/2201.09006 (2022) - [i18]Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. CoRR abs/2202.01604 (2022) - [i17]Matthew Edwards, Emma J. Williams, Claudia Peersman, Awais Rashid:
Characterising Cybercriminals: A Review. CoRR abs/2202.07419 (2022) - [i16]Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo M. Ramokapane, Awais Rashid:
The Political Economy of Privacy Enhancing Technologies. CoRR abs/2202.08548 (2022) - [i15]Andrew C. Dwyer, Joseph Hallett, Claudia Peersman, Matthew Edwards, Brittany I. Davidson, Awais Rashid:
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces. CoRR abs/2203.08557 (2022) - [i14]Claudia Peersman, Emma J. Williams, Matthew Edwards, Awais Rashid:
Understanding motivations and characteristics of financially-motivated cybercriminals. CoRR abs/2203.08642 (2022) - [i13]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
Automatic User Profiling in Darknet Markets: a Scalability Study. CoRR abs/2203.13179 (2022) - [i12]Colin Topping, Ola Aleksandra Michalec, Awais Rashid:
Contrasting global approaches for identifying and managing cybersecurity risks in supply chains. CoRR abs/2208.02244 (2022) - [i11]Karen Li, Kopo M. Ramokapane, Awais Rashid:
"Yeah, it does have a...Windows '98 Vibe": Usability Study of Security Features in Programmable Logic Controllers. CoRR abs/2208.02500 (2022) - [i10]Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges & Solutions. CoRR abs/2208.11898 (2022) - [i9]Partha Das Chowdhury, Mohammad Tahaei, Awais Rashid:
Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j. CoRR abs/2211.02341 (2022) - [i8]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices. CoRR abs/2211.08916 (2022) - [i7]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
A Survey of Relevant Text Mining Technology. CoRR abs/2211.15784 (2022) - 2021
- [i6]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? CoRR abs/2102.09790 (2021) - [i5]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The best laid plans or lack thereof: Security decision-making of different stakeholder groups. CoRR abs/2104.00284 (2021) - [i4]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations. CoRR abs/2105.02031 (2021) - 2020
- [i3]Joseph Gardiner, Awais Rashid:
Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. CoRR abs/2009.03961 (2020) - 2019
- [i2]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. CoRR abs/1905.12593 (2019) - [i1]Eleni Philippou, Sylvain Frey, Awais Rashid:
Contextualising and Aligning Security Metrics and Business Objectives: a GQM-based Methodology. CoRR abs/1910.05263 (2019)
Coauthor Index
aka: Matthew John Edwards
aka: Ana M. D. Moreira
aka: Kopo Marvin Ramokapane
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint