Maria Riaz
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
Developing context-aware ubiquitous computing systems with a unified middleware framework
HQ Ngo, A Shehzad, S Liaquat, M Riaz, S Lee
Embedded and Ubiquitous Computing: International Conference EUC 2004, Aizu …, 2004
A legal cross-references taxonomy for reasoning about compliance requirements
JC Maxwell, AI Antón, P Swire, M Riaz, CM McCraw
Requirements Engineering 17, 99-115, 2012
How have we evaluated software pattern application? A systematic mapping study of research design practices
M Riaz, T Breaux, L Williams
Information and Software Technology 65, 14-38, 2015
Security requirements patterns: understanding the science behind the art of pattern writing
M Riaz, L Williams
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 29-34, 2012
A distributed middleware solution for context awareness in ubiquitous systems
SL Kiani, M Riaz, Y Zhung, S Lee, YK Lee
11th IEEE International Conference on Embedded and Real-Time Computing …, 2005
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
MJ Maria Riaz, Jason King, John Slankas, Laurie Williams, Fabio Massacci ...
Empirical Software Engineering, 2016
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014
A grounded analysis of experts’ decision-making during security assessments
H Hibshi, TD Breaux, M Riaz, L Williams
Journal of Cybersecurity 2 (2), 147-163, 2016
Service delivery in context aware environments: Lookup and access control issues
M Riaz, SL Kiani, S Lee, SM Han, YK Lee
11th IEEE International Conference on Embedded and Real-Time Computing …, 2005
To log, or not to log: using heuristics to identify mandatory log events–a controlled experiment
J King, J Stallings, M Riaz, L Williams
Empirical Software Engineering 22, 2684-2717, 2017
Context awareness in large scale ubiquitous environments with a service oriented distributed middleware approach
SL Kiani, M Riaz, S Lee, YK Lee
Fourth Annual ACIS International Conference on Computer and Information …, 2005
Incorporating semantics-based search and policy-based access control mechanism in context service delivery
M Riaz, SL Kiani, S Lee, YK Lee
Fourth Annual ACIS International Conference on Computer and Information …, 2005
Systematically developing prevention, detection, and response patterns for security requirements
M Riaz, S Elder, L Williams
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
Towards a framework to measure security expertise in requirements analysis
H Hibshi, T Breaux, M Riaz, L Williams
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
Grid access middleware for handheld devices
SL Kiani, M Riaz, S Lee, T Jeon, H Kim
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
DIAMOnDS-DIstributed Agents for MObile & Dynamic Services
A Shafi, U Farooq, S Kiani, M Riaz, A Shehzad, A Ali, I Legrand, ...
arXiv preprint cs/0305062, 2003
A unified middleware framework for context aware ubiquitous computing
NQ Hung, A Shehzad, SL Kiani, M Riaz, S Lee
EUC2004, Japan, Aug, 2004
TAMEC: trusted augmented mobile execution on cloud
SL Shah, IA Abbasi, A Bashier Gism Elseed, S Ali, Z Anwar, Q Rajpoot, ...
Scientific Programming 2021, 1-8, 2021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20