팔로우
Armstrong Nhlabatsi
제목
인용
인용
연도
Feature interaction: The security threat from within software systems
A Nhlabatsi, R Laney, B Nuseibeh
Progress in Informatics 5 (75), 1, 2008
592008
Security requirements engineering for evolving software systems: A survey
A Nhlabatsi, B Nuseibeh, Y Yu
Security-aware systems applications and software development methods, 108-128, 2012
472012
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
462019
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
382011
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
222018
Towards a unified framework for contextual variability in requirements
R Ali, Y Yu, R Chitchyan, A Nhlabatsi, P Giorgini
2009 Third International Workshop on Software Product Management, 31-34, 2009
212009
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
192018
Requirements and specifications for adaptive security: concepts and analysis
TT Tun, M Yang, AK Bandara, Y Yu, A Nhlabatsi, N Khan, KM Khan, ...
2018 IEEE/ACM 13th International Symposium on Software Engineering for …, 2018
172018
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong, A Nhlabatsi, N Fetais, KM Khan, DS Kim
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
112019
A process model for customisation of software in multi-tenant SaaS model
KM Khan, A Nhlabatsi, N Khan
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
72015
“Why can’t I do that?”: tracing adaptive security decisions
A Nhlabatsi, T Tun, N Khan, Y Yu, A Bandara, KM Khan, B Nuseibeh
EAI Endorsed Transactions on Self-Adaptive Systems 1 (1), 2015
52015
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
42022
Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe
KM Khan, A Nhlabatsi
International Journal of Humanities and Social Sciences 11 (7), 1821-1824, 2017
42017
Managing security control assumptions using causal traceability
A Nhlabatsi, Y Yu, A Zisman, T Tun, N Khan, A Bandara, KM Khan, ...
2015 IEEE/ACM 8th International Symposium on Software and Systems …, 2015
42015
Traceability for adaptive information security in the cloud
A Nhlabatsi, T Thun, N Khan, Y Yu, A Bandara, K Khan, B Nuseibeh
2014 IEEE 7th International Conference on Cloud Computing, 958-959, 2014
42014
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, N Fetais, KM Khan
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
32018
Initialisation problems in feature composition
A Nhlabatsi
The Open University, 2009
32009
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
A Nhlabatsi, A Hussein, N Fetais, KM Khan
2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020
22020
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
12021
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
12021
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20