Stebėti
Maria Riaz
Pavadinimas
Cituota
Cituota
Metai
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
952014
Developing context-aware ubiquitous computing systems with a unified middleware framework
HQ Ngo, A Shehzad, S Liaquat, M Riaz, S Lee
Embedded and Ubiquitous Computing: International Conference EUC 2004, Aizu …, 2004
752004
A legal cross-references taxonomy for reasoning about compliance requirements
JC Maxwell, AI Antón, P Swire, M Riaz, CM McCraw
Requirements Engineering 17, 99-115, 2012
562012
How have we evaluated software pattern application? A systematic mapping study of research design practices
M Riaz, T Breaux, L Williams
Information and Software Technology 65, 14-38, 2015
492015
Security requirements patterns: understanding the science behind the art of pattern writing
M Riaz, L Williams
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 29-34, 2012
362012
A distributed middleware solution for context awareness in ubiquitous systems
SL Kiani, M Riaz, Y Zhung, S Lee, YK Lee
11th IEEE International Conference on Embedded and Real-Time Computing …, 2005
332005
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
302016
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
MJ Maria Riaz, Jason King, John Slankas, Laurie Williams, Fabio Massacci ...
Empirical Software Engineering, 2016
26*2016
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014
262014
A grounded analysis of experts’ decision-making during security assessments
H Hibshi, TD Breaux, M Riaz, L Williams
Journal of Cybersecurity 2 (2), 147-163, 2016
222016
Service delivery in context aware environments: Lookup and access control issues
M Riaz, SL Kiani, S Lee, SM Han, YK Lee
11th IEEE International Conference on Embedded and Real-Time Computing …, 2005
202005
To log, or not to log: using heuristics to identify mandatory log events–a controlled experiment
J King, J Stallings, M Riaz, L Williams
Empirical Software Engineering 22, 2684-2717, 2017
182017
Context awareness in large scale ubiquitous environments with a service oriented distributed middleware approach
SL Kiani, M Riaz, S Lee, YK Lee
Fourth Annual ACIS International Conference on Computer and Information …, 2005
152005
Incorporating semantics-based search and policy-based access control mechanism in context service delivery
M Riaz, SL Kiani, S Lee, YK Lee
Fourth Annual ACIS International Conference on Computer and Information …, 2005
132005
Systematically developing prevention, detection, and response patterns for security requirements
M Riaz, S Elder, L Williams
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
112016
Towards a framework to measure security expertise in requirements analysis
H Hibshi, T Breaux, M Riaz, L Williams
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
92014
Grid access middleware for handheld devices
SL Kiani, M Riaz, S Lee, T Jeon, H Kim
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
82005
DIAMOnDS-DIstributed Agents for MObile & Dynamic Services
A Shafi, U Farooq, S Kiani, M Riaz, A Shehzad, A Ali, I Legrand, ...
arXiv preprint cs/0305062, 2003
82003
A unified middleware framework for context aware ubiquitous computing
NQ Hung, A Shehzad, SL Kiani, M Riaz, S Lee
EUC2004, Japan, Aug, 2004
72004
TAMEC: trusted augmented mobile execution on cloud
SL Shah, IA Abbasi, A Bashier Gism Elseed, S Ali, Z Anwar, Q Rajpoot, ...
Scientific Programming 2021, 1-8, 2021
52021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20