Types of software evolution and software maintenance N Chapin, JE Hale, KM Khan, JF Ramil, WG Tan Journal of software maintenance and evolution: Research and Practice 13 (1 ¡¦, 2001 | 523 | 2001 |
Establishing trust in cloud computing KM Khan, Q Malluhi IT professional 12 (5), 20-27, 2010 | 428 | 2010 |
Composing security-aware software KM Khan, J Han IEEE software 19 (1), 34-41, 2002 | 70 | 2002 |
A security characterisation framework for trustworthy component based software systems KM Khan, J Han Proceedings 27th Annual International Computer Software and Applications ¡¦, 2003 | 51 | 2003 |
Machine learning-based network vulnerability analysis of industrial Internet of Things M Zolanvari, MA Teixeira, L Gupta, KM Khan, R Jain IEEE Internet of Things Journal 6 (4), 6822-6834, 2019 | 49 | 2019 |
Measuring quality metrics for web applications B Lilburne, D Prajwol, KM Khan, M Khosrowpour Proceedings of the 15th Information Resources Management Association ¡¦, 2004 | 42 | 2004 |
Trust in cloud services: providing more controls to clients KM Khan, Q Malluhi Computer, 94-96, 2013 | 39 | 2013 |
Managing Corporate Information Systems Evolution and Maintenance N Chapin Managing Corporate Information Systems Evolution and Maintenance, 1-23, 2005 | 35 | 2005 |
Security-oriented service composition and evolution KM Khan, R Kowalczyk, H Jun 2006 13th Asia Pacific Software Engineering Conference (APSEC'06), 71-78, 2006 | 34 | 2006 |
Addressing non-functional properties in software architecture using adl CVEOH Khaled, M Khan The Sixth Australasian Workshop on Software and System Architectures (AWSA ¡¦, 2005 | 31 | 2005 |
Systematic identification of threats in the cloud: A survey JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan Computer Networks 150, 46-69, 2019 | 26 | 2019 |
Assessing security properties of software components: A software engineer's perspective KM Khan, J Han Australian Software Engineering Conference (ASWEC'06), 10 pp.-210, 2006 | 25 | 2006 |
Addressing cloud computing in enterprise architecture: issues and challenges K Khan, N Gangavarapu Cutter Consortium, 2009 | 24 | 2009 |
Deriving systems level security properties of component based composite systems KM Khan, J Han 2005 Australian Software Engineering Conference, 334-343, 2005 | 22 | 2005 |
A framework for an active interface to characterise compositional security contracts of software components K Khan, J Han, Y Zheng Proceedings 2001 Australian Software Engineering Conference, 117-126, 2001 | 22 | 2001 |
Characterising user data protection of software components KM Khan, J Han, Y Zheng Proceedings 2000 Australian Software Engineering Conference, 3-11, 2000 | 18 | 2000 |
Managing Web Service Quality: Measuring Outcomes and Effectiveness KM Khan Information Science Reference, 2008 | 16* | 2008 |
Cybersecurity for industrial control systems: A survey D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin Computers & Security 89, 101677, 2020 | 15 | 2020 |
Incorporating business requirements and constraints in database conceptual models KM Khan, M Kapurubandara, U Chadha Proceedings of the first Asian-Pacific conference on Conceptual modelling ¡¦, 2004 | 14 | 2004 |
A redefined software life cycle model for improved maintenance T Skramstad, MK Khan Proceedings Conference on Software Maintenance 1992, 193,194,195,196,197-193 ¡¦, 1992 | 14 | 1992 |